Results 21 to 30 of about 252,498 (298)

A flexible architecture for privacy-aware trust management [PDF]

open access: yes, 2010
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors,
Böhm, Klemens   +6 more
core   +6 more sources

Blockchain-Based Context-Aware Authorization Management as a Service in IoT

open access: yesSensors, 2021
Internet of Things (IoT) applications bring evolved and intelligent services that can help improve users’ daily lives. These applications include home automation, health care, and smart agriculture.
Tidiane Sylla   +3 more
doaj   +1 more source

Inter-ReBAC:Inter-operation of Relationship-Based Access Control Model Instances [PDF]

open access: yes, 2016
Part 3: Access ControlInternational audienceRelationship-based access control (ReBAC) models define authorization policies and make authorization decisions on the basis of relationships between the entities in a system.
Crampton, Jason, Sellwood, James
core   +3 more sources

Comparative Analysis of Selected Programming Frameworks in terms of their Suitability for User Authentication and Authorization

open access: yesJournal of Computer Sciences Institute, 2023
The aim of the article was to perform a comparative analysis of the Net 6 and NestJS programming framework in terms of their suitability for user authentication and authorization.
Przemysław Rodzik
doaj   +1 more source

Operational-Investigative Activities of Judicial Authorization: Features of Performance [PDF]

open access: yesSHS Web of Conferences, 2021
The scientific article is devoted to the study of issues related to the peculiarities of performing operational-investigative activities of judicial authorization enshrined in the Federal Law “On operational-investigative activities” The questions of ...
Ahmedov Ahmed Guseinovich   +3 more
doaj   +1 more source

On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]

open access: yes, 2008
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core   +9 more sources

Research and application of cross-domain data authorization and operation

open access: yes大数据, 2023
With the development of big data and cloud computing, data management is breaking down "data silos" and developing from isolated services for single domain to cross-domain data sharing and collaborative services.Based on the public data ...
Jilin ZHANG   +4 more
doaj  

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]

open access: yes, 2018
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core   +2 more sources

Creating Objects in the Flexible Authorization Framework [PDF]

open access: yes, 2006
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not sufficient. Actually, IT systems can manipulate data to provide services to users.
Zannone, Nicola   +2 more
openaire   +3 more sources

Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities

open access: yesSensors, 2022
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies.
Muhammad Asif   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy