Results 21 to 30 of about 252,498 (298)
A flexible architecture for privacy-aware trust management [PDF]
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors,
Böhm, Klemens +6 more
core +6 more sources
Blockchain-Based Context-Aware Authorization Management as a Service in IoT
Internet of Things (IoT) applications bring evolved and intelligent services that can help improve users’ daily lives. These applications include home automation, health care, and smart agriculture.
Tidiane Sylla +3 more
doaj +1 more source
Inter-ReBAC:Inter-operation of Relationship-Based Access Control Model Instances [PDF]
Part 3: Access ControlInternational audienceRelationship-based access control (ReBAC) models define authorization policies and make authorization decisions on the basis of relationships between the entities in a system.
Crampton, Jason, Sellwood, James
core +3 more sources
The aim of the article was to perform a comparative analysis of the Net 6 and NestJS programming framework in terms of their suitability for user authentication and authorization.
Przemysław Rodzik
doaj +1 more source
Operational-Investigative Activities of Judicial Authorization: Features of Performance [PDF]
The scientific article is devoted to the study of issues related to the peculiarities of performing operational-investigative activities of judicial authorization enshrined in the Federal Law “On operational-investigative activities” The questions of ...
Ahmedov Ahmed Guseinovich +3 more
doaj +1 more source
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +9 more sources
Research and application of cross-domain data authorization and operation
With the development of big data and cloud computing, data management is breaking down "data silos" and developing from isolated services for single domain to cross-domain data sharing and collaborative services.Based on the public data ...
Jilin ZHANG +4 more
doaj
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core +2 more sources
Creating Objects in the Flexible Authorization Framework [PDF]
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not sufficient. Actually, IT systems can manipulate data to provide services to users.
Zannone, Nicola +2 more
openaire +3 more sources
Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies.
Muhammad Asif +5 more
doaj +1 more source

