token exchange
Recently Published Documents


TOTAL DOCUMENTS

33
(FIVE YEARS 16)

H-INDEX

9
(FIVE YEARS 2)

2022 ◽  
Author(s):  
giovanni bartolomeo

<p>We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a common web token exchange flow plus a HTTP basic authentication. As such, it may easily map to Cloud computing SaaS paradigms, enabling services integration into a single authorization-centric ecosystem even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.</p>


2021 ◽  
Vol 0 (0) ◽  
pp. 1-23
Author(s):  
Wei-Yuan Wang ◽  
Yeh-Cheng Yang ◽  
Chun-Yueh Lin

This research presents procedures for determining the optimal solution of token exchanges platform for investors in Taiwan via integrating the best-worst method (BWM) and the technique for ordering preference by similarity to the ideal solution (TOPSIS). Firstly, this research applies the modified Delphi method to develop the perspectives and factors via literature review and experts opinion. Secondly, the BWM is implemented to obtain weights of perspectives and factors on the linear programming concept. Thirdly, the TOPSIS model is used to rank the optimal solution of the token exchange for investors or corporations. Finally, the proposed model BWMTOPSIS-based procedures will list the optimal token exchanges platform on the three token exchange platforms to investors or corporations in Taiwan on the basis of their rankings in the architecture. The proposed combination framework is able to provide academic and commerce support to investors or corporations in implementing the token into their portfolio as a valuable objective guide to determine the optimal token exchange platform.


2021 ◽  
Author(s):  
giovanni bartolomeo

<p>We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a common web token exchange flow plus a HTTP basic authentication. As such, it may easily map to Cloud computing SaaS paradigms, enabling services integration into a single authorization-centric ecosystem even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.</p>


2021 ◽  
Vol 83 (10) ◽  
Author(s):  
Meghan J. Sosnowski ◽  
Lindsey A. Drayton ◽  
Laurent Prétôt ◽  
Jodi Carrigan ◽  
Tara S. Stoinski ◽  
...  

2021 ◽  
Author(s):  
giovanni bartolomeo

We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a developer familiar web token exchange flow plus a HTTP basic authentication flow. As such, it may map to Cloud computing SaaS paradigm, enabling microservices integration into a single, authorization-centric digital ecosystem, even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.


2021 ◽  
Author(s):  
giovanni bartolomeo

We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a developer familiar web token exchange flow plus a HTTP basic authentication flow. As such, it may map to Cloud computing SaaS paradigm, enabling microservices integration into a single, authorization-centric digital ecosystem, even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.


2021 ◽  
Author(s):  
giovanni bartolomeo

We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a developer familiar web token exchange flow plus a HTTP basic authentication flow. As such, it may map to Cloud computing SaaS paradigm, enabling microservices integration into a single, authorization-centric digital ecosystem, even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.


2020 ◽  
Vol 1 (1-2) ◽  
pp. 100001
Author(s):  
Xuan Luo ◽  
Zehua Wang ◽  
Wei Cai ◽  
Xiuhua Li ◽  
Victor C.M. Leung
Keyword(s):  

2020 ◽  
Author(s):  
M. Jones ◽  
A. Nadalin ◽  
J. Bradley ◽  
C. Mortimore
Keyword(s):  

Author(s):  
Maneesh Darisi ◽  
Janhavi Savla ◽  
Mahesh Shirole ◽  
Sunil Bhirud
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document