{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:06:36Z","timestamp":1773194796815,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00061","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"523-530","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-Cloud Framework for Zero Trust Workload Authentication"],"prefix":"10.1109","author":[{"given":"Saurabh","family":"Deochake","sequence":"first","affiliation":[{"name":"SentinelOne,Mountain View,USA"}]},{"given":"Ryan","family":"Murphy","sequence":"additional","affiliation":[{"name":"SentinelOne,Mountain View,USA"}]},{"given":"Jeremiah","family":"Gearheart","sequence":"additional","affiliation":[{"name":"SentinelOne,Mountain View,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23418","article-title":"How bad can it git? characterizing secret leakage in public github repositories","volume-title":"Proceedings 2019 Network and Distributed System Security Symposium","author":"Meli"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-207"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174679"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544896"},{"key":"ref6","article-title":"Bigbird: Big data storage and analytics at scale in hybrid cloud","author":"Deochake","year":"2022"},{"key":"ref7","article-title":"Workload identity federation","year":"2025"},{"key":"ref8","article-title":"OpenID Connect Core 1.0","author":"Sakimura","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152010"},{"issue":"01","key":"ref10","first-page":"31","article-title":"Public key infrastructure: A survey","volume-title":"Journal of Information Security","volume":"06","author":"Albarqi","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.55621\/idpro.80"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2670559"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61117-9_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"ref15","article-title":"SPIRE Concepts","year":"2025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-204d"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5220\/0013018500003825"},{"issue":"5","key":"ref18","first-page":"537","article-title":"Software supply chain attacks, a threat to global cybersecurity: Solarwinds\u2019 case study","volume-title":"International Journal of Safety and Security Engineering","volume":"11","author":"Mart\u00ednez","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6476274"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7519","article-title":"Json web token (jwt)","volume-title":"Internet Engineering Task Force","author":"Jones","year":"2015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8673-9_9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"ref25","volume-title":"I can OIDC you clearly now: How we made static credentials a thing of the past","author":"Lane","year":"2024"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.4519171","article-title":"Cloud cost optimization: A comprehensive review of strategies and case studies","author":"Deochake","year":"2023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1477076"},{"key":"ref28","article-title":"The economic impact of cyber-attacks","volume":"2","author":"Cashell","year":"2004","journal-title":"Congressional research service documents, CRS RL32331 (Washington DC)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-1431-9.ch005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT63348.2025.10989392"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5165-2_14"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418055.pdf?arnumber=11418055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:28:50Z","timestamp":1773120530000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00061","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}