2017
DOI: 10.2197/ipsjjip.25.766
|View full text |Cite
|
Sign up to set email alerts
|

Authorization by Documents

Abstract: These days, ICT service environments have dramatically changed in their complexity. Accordingly, related business logics for business processes such as provisioning, resource limit, conditional authorization and delegation have grown in its complexity. In this paper, we generalize the idea of access tokens of OAuth, and propose "authorization by documents." In our model, a user submits a document as evidence of privilege claim, and a server verifies the document to prove the appropriateness of the user's privi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 20 publications
0
0
0
Order By: Relevance