Implementation of Authentication and Authorization System based on Digital Object Architecture

被引:1
|
作者
Sazonov, Dmitriy [1 ]
Kirichek, Ruslan [1 ]
Borodin, Alexey [2 ]
机构
[1] Bonch Bruevich St Petersburg State Univ Telecommu, Dept Commun Networks & Data Transmiss, St Petersburg, Russia
[2] ITU PJSC Rostelecom, Moscow, Russia
来源
2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT) | 2019年
关键词
Digital Object Architecture; Handle System; authorization; seamless network;
D O I
10.1109/icumt48472.2019.8970804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The analysis of the possibility of building an automatic authorization system based on the Digital Objects Architecture is given. A detailed review of the developed test system for automatic client authorization on a web resource is given. The process of user interaction with the test system is demonstrated. In conclusion, an assessment of the possible continuation of work to create a seamless network system based on the Digital Object Architecture is given.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Blockchain based solutions for privacy-preserving authentication and authorization in networks
    Julian, Anitha
    Mary, Gerardine Immaculate
    Selvi, S.
    Rele, Mayur
    Vaithianathan, Muthukumaran
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 797 - 808
  • [32] Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion
    Haidar, Ali Nasrat
    Abdallah, Ali E.
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION, PROCEEDINGS, 2008, 17 : 831 - 846
  • [33] A content-based authorization model for digital libraries
    Adam, NR
    Atluri, V
    Bertino, E
    Ferrari, E
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2002, 14 (02) : 296 - 315
  • [34] Enhancing Cloud based Data Platforms for Smart Cities with Authentication and Authorization Features
    Laemmel, Philipp
    Tcholtchev, Nikolay
    Schieferdecker, Ina
    COMPANION PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC'17 COMPANION), 2017, : 167 - 172
  • [35] An Investigation on Jawi CAPTCHA Based Security for Login Authentication and Authorization: Is It an Alternative Solution?
    Pitchay, Sakinah Ali
    Suhaimi, Nur Nabihah Mohd
    Saudi, Madihah Mohd
    Ridzuan, Farida
    Basir, Nurlida
    Nabila, N. F.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 348 - 354
  • [36] An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach
    Fayad, Achraf
    Hammi, Badis
    Khatoun, Rida
    2018 THIRD INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2018,
  • [37] Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History
    Bucko, Ahmet
    Vishi, Kamer
    Krasniqi, Bujar
    Rexha, Blerim
    COMPUTERS, 2023, 12 (04)
  • [38] 3AS: Authentication, Authorization, and Accountability for SDN-Based Smart Grids
    Soares, Arthur A. Z.
    Lopes, Yona
    Passos, Diego
    Fernandes, Natalia C.
    Muchaluat-Saade, Debora C.
    IEEE ACCESS, 2021, 9 (09): : 88621 - 88640
  • [39] A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services
    Yu, Linsheng
    He, Mingxing
    Liang, Hongbin
    Xiong, Ling
    Liu, Yang
    SENSORS, 2023, 23 (03)
  • [40] Converged PKI-Based Authorization, Authentication Management and Delegation for an E-Business
    Anand, Mani K. P.
    Narayanasamy, P.
    DFMA 2008: FIRST INTERNATIONAL CONFERENCE ON DISTRIBUTED FRAMEWORKS & APPLICATIONS, PROCEEDINGS, 2008, : 121 - 125