Giacomo Cabri, Luca Ferrari, Letizia Leonardi,
... This paper focuses on how to exploit the Java Authentication and Authorization Service (JAAS) at the role level in order to apply authorizations and local policies to Java agents for controlling the use of their roles.
Tópico(s): Mobile Agent-Based Network Management
2005 - Elsevier BV | Science of Computer Programming
... JDO persistence layer, which is based on the Java Authentication and Authorization Service (JAAS). JDOSecure is based on the dynamic proxy approach and ensures the collaboration with any JDO implementation. It comprises a management solution for users, roles, and permissions and allows storing the authentication and authorization information in any arbitrary JDO resource. Furthermore, a Java-based administration utility with a graphical user interface ...
Tópico(s): Distributed systems and fault tolerance
2007 - Elsevier BV | Science of Computer Programming
Gabriele Piantadosi, Stefano Marrone, Mario Sansone, Carlo Sansone,
... certificate associated with a 3072bit RSA Key Pair. Authentication and authorization procedure is achieved through the services offered by Java JAAS classes.
Tópico(s): Medical Imaging Techniques and Applications
2013 - Springer Science+Business Media | Lecture notes in computer science
... Service Provider and the Service consumer. Usage of Java authentication and authorization services is performed in a pluggable fashion. It permits ...
Tópico(s): Peer-to-Peer Network Technologies
2011 - Science Publications | Journal of Computer Science
... The scheme realizes pluggable Authentication module by JAAS(Java Authentication Authorization Service),and take X509 digital certificate as user's ...
Tópico(s): Cloud Computing and Remote Desktop Technologies
2006 - Computer Application in Sichuan Province | Jisuanji yingyong yanjiu
... working mechanism of DCMS was detailed. By using Java Authentication and Authorization Service(JAAS) provided by J2EE, an implementation method of the system security was presented, and the combination of the Java Message Service(JMS) and system workflow explained the ...
Tópico(s): Web Applications and Data Management
2004 - Elsevier BV | Computer Integrated Manufacturing Systems
Anzar Afaq, A Dolgert, Yining Guo, Chris Jones, S Kosyakov, В. Е. Кузнецов, Lee Lueking, D. Riley, V. Sekhri,
... built as a multi-tier web application with Java servlets running under Tomcat, with connections via JDBC to Oracle or MySQL database backends. Clients connect to the service through HTTP or HTTPS with authentication provided by GRID certificates and authorization through VOMS. DBS is an integral part of ...
Tópico(s): Research Data Management Practices
2008 - IOP Publishing | Journal of Physics Conference Series
A. M. Chavan, L. E. Tacconi‐Garman, Michèle Péron, Fabio Sogni, Tim Canavan, P. Nass,
... collaborator. To application developers, the portal will offer authentication and authorization services, either via database queries or an LDAP server. The User Portal is being developed as a Web application using Java-based technology, including servlets and JSPs.
Tópico(s): Astronomical Observations and Instrumentation
2006 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE
Иван Ганчев, Zhanlin Ji, Máirtín O’Droma, Zhao Li,
... discover and suggest to consumers the `best' mobile services in the emerging ubiquitous consumer wireless world (UCWW). The cloud-based system builds up and dynamically manages personal profiles of consumers with big data processing techniques. A consumer identity module (CIM), based on the Java Card technology, supports a third-party authentication, authorization and accounting procedure (3P-AAA), and provides a ...
Tópico(s): Peer-to-Peer Network Technologies
2017 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Consumer Electronics
J. Vega, E. Sánchez, Alejandro López, A. Portas, M. A. Ochando, E. Ascasíbar, A. Mollinedo, J.A. Muñoz, Alfredo Sánchez, M. Ruíz, E. Barrera, S. López, R. Castro, Diego López,
... TJ-II elements. From the server side, web services are provided by means of resources supplied by JSP pages. The client part makes use of web browsers and ad hoc Java applications. The operation requires the use of a distributed authentication and authorization system. This development employs the PAPI System. At ...
Tópico(s): Particle Detector Development and Performance
2005 - Elsevier BV | Fusion Engineering and Design
The Java Data Objects specification is designed as lightweight persistence approach. Thus, JDO neither supports user authentication nor role-based authorization. Consequently, users are able to query the entire data store as well as to delete persistent objects without any restriction. The novel security approach JDOSecure was developed at the University of Mannheim to prevent unauthorized access to the data store while using the JDO API. Based on the dynamic proxy approach, JDOSecure introduces ...
Tópico(s): Software Engineering and Design Patterns
2006 - Springer Science+Business Media | Lecture notes in computer science
Dongkyoo Shin, Jongil Jeong, Dongil Shin,
... for Web Services, which enables the exchange of authentication, authorization, and profile information between different entities. This provides interoperability between different security services in distributed environments. In this paper, we designed and implemented Java-based SAML APIs to achieve an SSO library.
Tópico(s): Peer-to-Peer Network Technologies
2004 - Springer Science+Business Media | Lecture notes in computer science

Gustavo H. M. B. Motta, S.S. Furuie,
... MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across ...
Tópico(s): Electronic Health Records Systems
2004 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE
J. Vega, E. Sánchez, A. Portas, A. Pereira, Alejandro López, E. Ascasíbar, S. Balme, Y. Buravand, P. Lebourg, Julian Theis, N. Utzel, M. Ruíz, E. Barrera, S. López, D. Machón, R. Castro, Diego López, A. Mollinedo, J.A. Muñoz,
... platform independence, and technological maturity. Web pages and Java applications permit users to access experimental systems, data servers, and the operation logbook. Security resources are provided by the PAPI system, a distributed authentication and authorization system.The TJ-II remote participation tools have allowed us to command and follow the stellarator operation from Cadarache. More than 1000 digitizer channels and more than 20 diagnostic control systems were remotely accessed from Web pages for monitoring/programming purposes. One Java application provided online information about the acquisition status ...
Tópico(s): Nuclear Physics and Applications
2006 - Taylor & Francis | Fusion Science & Technology
Stefan Seltzsam, Stephan Börzsönyi, Alfons Kemper,
... during plan distribution secure communication channels are established, authentication and authorization are performed, and overload situations are avoided by admission control. During plan execution operators are guarded using Java’s security model to prevent unauthorized resource access ...
Tópico(s): Advanced Database Systems and Queries
2001 - Springer Science+Business Media | Lecture notes in computer science
R. Castro, J. Vega, A. Portas, Diego López, S. Balme, Julian Theis, P. Lebourg, H. Fernandes, A. Neto, A. Duarte, Floriano José Godinho de Oliveira, Francisco Everton Uchôa Reis, K. Purahoo, Kirsten Engelund Thomsen, W. Schiller, J. Kadlecsik,
... Access to Providers of Information (PAPI), a distributed authentication and authorization system. PAPI technology gives some important features, such as, single sign on for accessing to different resources, mobility for users, and compatibility with open and standard technologies: Java, JNLP protocol, XML-RPC and web technologies among ...
Tópico(s): Access Control and Trust
2007 - Elsevier BV | Fusion Engineering and Design
... practices to ensure robust, future-proof APIs. Keywords Java Spring Boot, REST, GraphQL, Microservices, Security, Scalability, API Design, Authentication, Authorization, Cloud-Native
Tópico(s): Distributed and Parallel Computing Systems
2025 - | INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
R. Castro, J. Vega, A. Portas, A. Pereira, S. Balme, A. Duarte, H. Fernandes, J. Kadlecsik, P. Lebourg, A. Neto, Floriano José Godinho de Oliveira, K. Purahoo, Francisco Everton Uchôa Reis, C. Rodríguez, J. Signoret, Julian Theis, Kirsten Engelund Thomsen,
... has been implemented based on PAPI as the authentication and authorization infrastructure that provides a security layer for accessing data among organisations. Findings During the implementation of EFDA federation some improvements in distributed single sign on systems have been achieved such as the integration of JAVA applications and a single sign off mechanism. Practical ...
Tópico(s): Cloud Data Security Solutions
2008 - | Campus-Wide Information Systems
Elhadi Shakshuki, Zhonghai Luo, Jing Gong,
... system architecture includes four types of agents: interface, authentication, authorization, and service provider agents (SPAs). The interface agents ... with the users to fulfill their interests. The authentication agents investigate the validity of using keystroke dynamics to strengthen security. The authorization agents make all decisions regarding who can access which resources and for what purposes. The SPAs offer different encryption services to different users. This paper provides the agents' architecture, design and implementations that enable them to cooperate, coordinate, and communicate with each other to provide a secure environment. A prototype of the system is implemented using the Java Agent Development Framework.
Tópico(s): User
2004 - Elsevier BV | Journal of Network and Computer Applications
Jing Jun Zhang, Lei Wang, Hui Li, Guang Yuan Liu,
... this issue, we research the AOP technology of Java Web called Struts interceptor. We show the advantage of this new programming method through an online submission and review system which using AOP method in the authentication and authorization.
Tópico(s): Model-Driven Software Engineering Techniques
2011 - Trans Tech Publications | Advanced materials research
Qing Li, Jian Zhou, Qirui Peng, Canqiang Li, Cheng Wang, Jing Wu, Shao Bei-en,
... mechanism is developed to realize cross-domains identity authentication, service authorization, and information transmission security. Every Web service or SAA in the platform has a unique ID. The interoperating process only relies on IDs, which endows the platform with a loose coupling feature. Aiming at service orchestration, a graphic service process modelling method is developed, with which the developed process model can link atom Web services and form a complex service. The Java based service orchestration tool provides an ESB (Enterprise ...
Tópico(s): Business Process Modeling and Analysis
2009 - Elsevier BV | Computers in Industry
... the Sina server.The system uses the OAuth authentication method for user authorization to complete the login process.The specific functions ...
Tópico(s): Web Data Mining and Analysis
2014 - Global Vision Press | International Journal of Multimedia and Ubiquitous Engineering
... JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give ...
Tópico(s):
2014 - Science and Information Organization | International Journal of Advanced Computer Science and Applications
Boling Cheng, HL Fu, GW Yang, XG Tuo,
... multi-roles customization, dynamic tasks authorization, and the authorization and authentication among multi-roles. In the end, a security ...
Tópico(s):
2005 - Elsevier BV | Computer Integrated Manufacturing Systems
In-Tae Kim, Kyungyong Chung, Kee-Wook Rim, Jung-Hyun Lee,
... 프레임워크를 구현한다. In home network environments, the user authentication and authorization associated user's information and usability may be ...
Tópico(s): Educational Systems and Policies
2009 - Korea Contents Associaition | The Journal of the Korea Contents Association
Miguel Martinez Pedreira, C. Grigoras, Volodymyr Yurchenko, M. M. Storetvedt,
... agents. User jobs will use JAliEn tokens for authentication and authorization by the central JAliEn services. These tokens are ...
Tópico(s): Parallel Computing and Optimization Techniques
2019 - EDP Sciences | EPJ Web of Conferences
Antonio Skármeta, Gregorio Martínez Pérez, Óscar Cánovas,
... security services can also be used to link authorization information to the public keys being certified by the PKI, therefore enabling new opportunities for distributed access control procedures. In this paper, we describe two of these innovative security services built over our own designed and implemented Java IPv6 PKI: a distributed security policy management architecture ...
Tópico(s): Advanced
2003 - Elsevier BV | Future Generation Computer Systems
... protocols. The GIS Server supports a role based authorization model that allows access to services to be controlled, leverages standard web based authentication mechanisms, and allows information to be securely exchanged by leveraging standard transport level security. The GIS Server supports a variety of client architectures including Rich Internet clients based on Flex, Silverlight and Javacript, occasionally connected Mobile Devices that are used for field work, as well as Desktop clients built using .Net and Java. The key to success is simple and elegant ...
Tópico(s): Advanced Computational Techniques and Applications
2009 - Springer Science+Business Media | Lecture notes in computer science
Chang‐Won Jeong, Woo Hong Kim, Kwon‐Ha Yoon, Su Chong Joo,
... mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS ...
Tópico(s): Technology and Data Analysis
2015 - | Journal of Internet Computing and services
Steve Schneider, Peter Y. A. Ryan,
... CORBA security service failsJorge Cuellar, SiemensVerification of an authentication and key agreement protocolVitaly Shmatikov, StanfordAnalysis of abuse-free contract signingRoberto Gorrieri, University of BolognaCoping with denial-of-service due to malicious Java AppletsCathy Meadows, NRLEmerging problems with sceurity protocol analysisVirginie ...
Tópico(s): Network Security and Intrusion Detection
2000 - Elsevier BV | Electronic Notes in Theoretical Computer Science