Centralized Authorization Service (CAuthS) or Authorization as a Service (AuthaaS)-A Conceptual Architecture

Absence of architecture to describe how to implement authorization as a centralized service, in a way similar to authentication, has been causing redundant deployment of computing resources, lack of standard practices, and never-ending learning curve in maintaining proprietary or ad hoc authorization solutions. The paper develops an architecture, which focuses on centralization of authorization, to be called Centralized Authorization Service (CAuthS) or Authorization-as-a-Service (AuthaaS), when deployed as a service, and is targeted to substitute platform-based ad hoc authorization solutions.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Computer Applications
Topic:
Security
Format:
PDF