Risk-adaptive authorization in zero trust with dynamic trust and tokens
The article addresses the problem of risk-adaptive authorization in a Zero Trust architecture using a mechanism of dynamic trust assessment and adaptive access token management. The relevance of the study is driven by the increasing number of attacks related to credential compromise, session hijacki...
Saved in:
| Date: | 2026 |
|---|---|
| Main Authors: | Kostiuk, Yu.V., Skladannyi, P.M., Hnatchenko, D.D. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2026
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/892 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Conflict controlled network modeling: evolutionary games approach
by: Ignatenko, O.P., et al.
Published: (2019)
by: Ignatenko, O.P., et al.
Published: (2019)
Implementation the concept of adaptive broadcast system and automatic preparation of content
by: Provotar, O.I., et al.
Published: (2025)
by: Provotar, O.I., et al.
Published: (2025)
Game model of user interaction in heterogeneous distributed environments
by: Ignatenko, O.P., et al.
Published: (2017)
by: Ignatenko, O.P., et al.
Published: (2017)
Fluid models of dynamic scheduling in computer networks
by: Іgnatenko, O.P.
Published: (2025)
by: Іgnatenko, O.P.
Published: (2025)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Control models of data flows in Internet under instability
by: Ignatenko, O.P.
Published: (2025)
by: Ignatenko, O.P.
Published: (2025)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Programming of one-dimansional and two-dimensional tokens for tokenization of land plots
by: Strutynskyi, S. V., et al.
Published: (2024)
by: Strutynskyi, S. V., et al.
Published: (2024)
Development of access management methods to information from WIKI resources
by: Rogushina, J.V., et al.
Published: (2020)
by: Rogushina, J.V., et al.
Published: (2020)
Application of small language models for semantic analysis of Web interface accessibility
by: Kuzikov, B.O., et al.
Published: (2025)
by: Kuzikov, B.O., et al.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Overview of global open access resource aggregation services and their requirements for data providers
by: Proskudina, G.Yu., et al.
Published: (2025)
by: Proskudina, G.Yu., et al.
Published: (2025)
Global open access resource aggregation services and their requirements for data providers
by: Proskudina, G.Yu., et al.
Published: (2024)
by: Proskudina, G.Yu., et al.
Published: (2024)
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
OVERVIEW OF EUROPEAN UNION POLICIES AND CURRENT INITIATIVES ON ENERGY SECTOR ADAPTATION TO CLIMATE CHANGE
by: Balabukh, Vira, et al.
Published: (2025)
by: Balabukh, Vira, et al.
Published: (2025)
Authors index
Published: (2020)
Published: (2020)
Authors index 2019
Published: (2019)
Published: (2019)
Authors Index 2021
Published: (2021)
Published: (2021)
Transforming governance: enabling scalable and adaptable decentralized networks on EVM-compatible blockchain
by: Katerynych, L.O., et al.
Published: (2024)
by: Katerynych, L.O., et al.
Published: (2024)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
WEB-system for the level of regional development evaluation
by: Pursky, O.I., et al.
Published: (2020)
by: Pursky, O.I., et al.
Published: (2020)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Trust in the modern society
by: O. M. Kozhemiakina
Published: (2011)
by: O. M. Kozhemiakina
Published: (2011)
Author Index
Published: (2018)
Published: (2018)
Trust Marketing in the Stakeholder Network: Mechanism, Sources and Process of Forming Trust Relationships
by: L. V. Bazaliieva
Published: (2021)
by: L. V. Bazaliieva
Published: (2021)
The global crisis of trust as a factor of transformation of the trust to competition policy in Ukraine
by: Yu. M. Umantsiv
Published: (2011)
by: Yu. M. Umantsiv
Published: (2011)
Effect of trust and trust relations on formation of novel social institution of volunteering in contemporary Ukraine
by: N. Chernysh
Published: (2016)
by: N. Chernysh
Published: (2016)
Effect of trust and trust relations on formation of novel social institution of volunteering in contemporary Ukraine
by: N. Chernysh
Published: (2016)
by: N. Chernysh
Published: (2016)
The modern trust: contents and crisis
by: V. N. Tarasevich
Published: (2011)
by: V. N. Tarasevich
Published: (2011)
Trust factors: conceptualization and hypothesis
by: R. Goch
Published: (2013)
by: R. Goch
Published: (2013)
Trust factors: conceptualization and hypothesis
by: R. Hoch
Published: (2013)
by: R. Hoch
Published: (2013)
The problem of interpretation of trust in sociology
by: T. Stetsenko
Published: (2010)
by: T. Stetsenko
Published: (2010)
The expert analytic process for the choice of the organization management actions using corporative knowledge. Part II. Methods and Models of the Expert Methodology
by: Ilina, E.P.
Published: (2018)
by: Ilina, E.P.
Published: (2018)
Similar Items
-
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018) -
Conflict controlled network modeling: evolutionary games approach
by: Ignatenko, O.P., et al.
Published: (2019) -
Implementation the concept of adaptive broadcast system and automatic preparation of content
by: Provotar, O.I., et al.
Published: (2025) -
Game model of user interaction in heterogeneous distributed environments
by: Ignatenko, O.P., et al.
Published: (2017) -
Fluid models of dynamic scheduling in computer networks
by: Іgnatenko, O.P.
Published: (2025)