Implementation of Authentication and Authorization System based on Digital Object Architecture

被引:1
|
作者
Sazonov, Dmitriy [1 ]
Kirichek, Ruslan [1 ]
Borodin, Alexey [2 ]
机构
[1] Bonch Bruevich St Petersburg State Univ Telecommu, Dept Commun Networks & Data Transmiss, St Petersburg, Russia
[2] ITU PJSC Rostelecom, Moscow, Russia
来源
2019 11TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT) | 2019年
关键词
Digital Object Architecture; Handle System; authorization; seamless network;
D O I
10.1109/icumt48472.2019.8970804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The analysis of the possibility of building an automatic authorization system based on the Digital Objects Architecture is given. A detailed review of the developed test system for automatic client authorization on a web resource is given. The process of user interaction with the test system is demonstrated. In conclusion, an assessment of the possible continuation of work to create a seamless network system based on the Digital Object Architecture is given.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] A Distributed Digital Object Architecture to Support Secure IoT Ecosystems
    Ruiz-Zafra, Angel
    Magan-Carrion, Roberto
    OPTIMIZATION AND LEARNING, 2020, 1173 : 195 - 205
  • [42] A Secure Network Architecture for the Internet of Things Based on Local Authorization Entities
    Kim, Hokeun
    Wasicek, Armin
    Mehne, Benjamin
    Lee, Edward A.
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 114 - 122
  • [43] A network access control approach based on the AAA architecture and authorization attributes
    Lopez, Gabriel
    Canovas, Oscar
    Gomez, Antonio F.
    Jimenez, Jesus D.
    Marin, Rafael
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 900 - 919
  • [44] Unified Implementation and Simplification for Task-Based Authorization Security in Workflows
    Zhong, Wenjing
    Zhao, Jinjing
    Hu, Hesuan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3796 - 3811
  • [45] Implementation of Open Authentication Protocol for IoT Based Application
    Kinikar, Swati
    Terdal, Sujatha
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 524 - 527
  • [46] An Immunology-Based Security System Model for Authorization
    Liu, Tong
    Wang, Yazhe
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1033 - 1037
  • [47] Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations
    Marin-Lopez, Rafael
    Pereniguez, Fernando
    Lopez, Gabriel
    Perez-Mendez, Alejandro
    COMPUTER STANDARDS & INTERFACES, 2011, 33 (05) : 494 - 504
  • [48] ECC based inter-device authentication and authorization scheme using MQTT for IoT networks
    Lohachab, Ankur
    Karambir
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 1 - 12
  • [49] Embedding X. 509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data
    Hedberg, Thomas D., Jr.
    Krima, Sylvere
    Camelio, Jaime A.
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2017, 17 (01)
  • [50] MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications
    Seker, Oezlem
    Dalkilic, Goekhan
    cabuk, Umut Can
    SENSORS, 2023, 23 (12)