Ensuring Only Ada Can Access her GHC Proposal

2:10 pm - 2:30 pm

Objective: Guidance
Audience Level: Beginner/Intermediate
Session Type: Presentation

Securing objects within an application is one important aspect to cloud security - only the right people should be able to access any given piece of information. In this talk, I will discuss some of the common access control methods, why we chose to use Attribute Based Access Control (or ABAC) and the high level architecture of an ABAC system.


, Staff Software Engineer, Box