OAuth+UAO: A Distributed Identification Mechanism for Triplestores

نویسندگان

  • Dominik Tomaszuk
  • Henryk Rybinski
چکیده

The Semantic Web gives users and applications the ability to access and retrieve decentralized resources which may be stored in triplestores. This paper describes a simple identification protocol dedicated to triplestores which is universal and appropriate for the distributed environment. We propose a mechanism based on the HTTP standard, extended with OAuth Protocol and Semantic Web ontology. One can optionally adopt Transport Layer Security protocol. We present a scalable method that allows user authentication and authorization to triplestores with data integrity and confidentiality. The identification mechanism enables users to access triplestore data without disclosing authentication and authorization data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security evaluation of the OAuth 2.0 framework

The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third party ap...

متن کامل

Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants

This specification provides a framework for the use of assertions with OAuth 2.0 in the form of a new client authentication mechanism and a new authorization grant type. Mechanisms are specified for transporting assertions during interactions with a token endpoint, as well as general processing rules. The intent of this specification is to provide a common framework for OAuth 2.0 to interwork w...

متن کامل

PKAuth: A Social Login Protocol for Unregistered Applications

Social login is a double-redirection mechanism whereby a Web application delegates user authentication to a social site and obtains access to the user’s social context. Today social login is implemented using OAuth, which requires registration of the application with the site for authentication of the application to the site and identification of the application to the user by the site. As soci...

متن کامل

A new fuzzy operator and its application to topology design of distributed local area networks

Topology design of distributed local area networks can be classified as a hard combinatorial optimization problem. The problem has several conflicting objectives, such as cost, reliability, network delay, and number of hops between source and destination. These desirable features of a network topology can best be expressed in linguistic terms, which is the basis of fuzzy logic. This paper prese...

متن کامل

Incorporating OAuth Protocol into Existing Information Systems

Traditionally, when the user wants to share his resource on one application to another application, the user needs to give his credential to another application that causes the privacy issues. Then OAuth protocol was introduced to solve the problem without providing the user’s credential. The protocol was also designed to support mobile, desktop, and web applications. This makes OAuth protocol ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011