OAuth+UAO: A Distributed Identification Mechanism for Triplestores
نویسندگان
چکیده
The Semantic Web gives users and applications the ability to access and retrieve decentralized resources which may be stored in triplestores. This paper describes a simple identification protocol dedicated to triplestores which is universal and appropriate for the distributed environment. We propose a mechanism based on the HTTP standard, extended with OAuth Protocol and Semantic Web ontology. One can optionally adopt Transport Layer Security protocol. We present a scalable method that allows user authentication and authorization to triplestores with data integrity and confidentiality. The identification mechanism enables users to access triplestore data without disclosing authentication and authorization data.
منابع مشابه
Security evaluation of the OAuth 2.0 framework
The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third party ap...
متن کاملAssertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
This specification provides a framework for the use of assertions with OAuth 2.0 in the form of a new client authentication mechanism and a new authorization grant type. Mechanisms are specified for transporting assertions during interactions with a token endpoint, as well as general processing rules. The intent of this specification is to provide a common framework for OAuth 2.0 to interwork w...
متن کاملPKAuth: A Social Login Protocol for Unregistered Applications
Social login is a double-redirection mechanism whereby a Web application delegates user authentication to a social site and obtains access to the user’s social context. Today social login is implemented using OAuth, which requires registration of the application with the site for authentication of the application to the site and identification of the application to the user by the site. As soci...
متن کاملA new fuzzy operator and its application to topology design of distributed local area networks
Topology design of distributed local area networks can be classified as a hard combinatorial optimization problem. The problem has several conflicting objectives, such as cost, reliability, network delay, and number of hops between source and destination. These desirable features of a network topology can best be expressed in linguistic terms, which is the basis of fuzzy logic. This paper prese...
متن کاملIncorporating OAuth Protocol into Existing Information Systems
Traditionally, when the user wants to share his resource on one application to another application, the user needs to give his credential to another application that causes the privacy issues. Then OAuth protocol was introduced to solve the problem without providing the user’s credential. The protocol was also designed to support mobile, desktop, and web applications. This makes OAuth protocol ...
متن کامل