Skip to main content

Advances, Systems and Applications

Fig. 2 | Journal of Cloud Computing

Fig. 2

From: Serverless computing: a security perspective

Fig. 2

This figure illustrates an application composed by various functions chained together. Let us assume that Function 1 is responsible for authenticating the application’s administrators as well as end-users before their requests are passed to other functions. Imagine that the request is passed to Function 2 and Function 3 if the request originates from administrators, while if the request comes from end-users this is handled by Function 4 and Function 5. In such a case, the application’s control flow can easily leak the role of the person issuing the request or the times at which the application is accessed by administrators and end-users

Back to article page