Implementation of Authentication and Authorization System based on Digital Object Architecture

被引:1
|
作者
Sazonov, Dmitriy [1 ]
Kirichek, Ruslan [1 ]
Borodin, Alexey [2 ]
机构
[1] Bonch Bruevich St Petersburg State Univ Telecommu, Dept Commun Networks & Data Transmiss, St Petersburg, Russia
[2] ITU PJSC Rostelecom, Moscow, Russia
来源
2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT) | 2019年
关键词
Digital Object Architecture; Handle System; authorization; seamless network;
D O I
10.1109/icumt48472.2019.8970804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The analysis of the possibility of building an automatic authorization system based on the Digital Objects Architecture is given. A detailed review of the developed test system for automatic client authorization on a web resource is given. The process of user interaction with the test system is demonstrated. In conclusion, an assessment of the possible continuation of work to create a seamless network system based on the Digital Object Architecture is given.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A VO-based Security Architecture for Authentication and Authorization in Grid
    Yang, Yan
    Chen, Xingyuan
    Zhang, Bin
    Li, Binglong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 986 - 990
  • [2] Authentication and Authorization in Microservices Architecture: A Systematic Literature Review
    de Almeida, Murilo Goes
    Canedo, Edna Dias
    APPLIED SCIENCES-BASEL, 2022, 12 (06):
  • [3] An integrated authentication and authorization approach for the network of information architecture
    Aiash, Mahdi
    Loo, Jonathan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 50 : 73 - 79
  • [4] Authentication and authorization architecture design for hybrid mesh networks
    Lupu, Radu
    Stanciu, Mihai
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 301 - 304
  • [5] An authentication and authorization system for virtual organizations
    Zhou, Wei
    Raja, Vinesh H.
    Meinel, Christoph
    WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 7, 2005, : 150 - 155
  • [6] Designing Authentication and Authorization System with Blockchain
    Ezawa, Yuki
    Takita, Makoto
    Shiraishi, Yoshiaki
    Kakei, Shohei
    Hirotomo, Masanori
    Fukuta, Youji
    Mohri, Masami
    Morii, Masakatu
    2019 14TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2019), 2019, : 111 - 118
  • [7] An authentication and authorization infrastructure:: The PAPI system
    Castro, R.
    Lopez, D. R.
    Vega, J.
    FUSION ENGINEERING AND DESIGN, 2006, 81 (15-17) : 2057 - 2061
  • [8] Authentication, Authorization, Administration and Audit Impact on Digital Security
    Conejo Navarro, Fauricio Alban
    Garcia, Melvin
    Jadan-Guerrero, Janio
    INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, WORLDCIST 2023, 2024, 799 : 187 - 193
  • [9] Managing Enterprise Authentication and Authorization Permissions in Digital Ecosystem
    Pranata, Ilung
    Skinner, Geoff
    2009 3RD IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2009, : 51 - 56
  • [10] A Model for Delegation Based on Authentication and Authorization
    Chandersekaran, Coimbatore
    Simpson, William R.
    ADVANCED COMPUTING, PT III, 2011, 133 : 217 - +