Limpar
30 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Giacomo Cabri, Luca Ferrari, Letizia Leonardi,

... This paper focuses on how to exploit the Java Authentication and Authorization Service (JAAS) at the role level in order to apply authorizations and local policies to Java agents for controlling the use of their roles.

Tópico(s): Mobile Agent-Based Network Management

2005 - Elsevier BV | Science of Computer Programming

Artigo Revisado por pares

Matthias Merz,

... JDO persistence layer, which is based on the Java Authentication and Authorization Service (JAAS). JDOSecure is based on the dynamic proxy approach and ensures the collaboration with any JDO implementation. It comprises a management solution for users, roles, and permissions and allows storing the authentication and authorization information in any arbitrary JDO resource. Furthermore, a Java-based administration utility with a graphical user interface ...

Tópico(s): Distributed systems and fault tolerance

2007 - Elsevier BV | Science of Computer Programming

Capítulo de livro Revisado por pares

Gabriele Piantadosi, Stefano Marrone, Mario Sansone, Carlo Sansone,

... certificate associated with a 3072bit RSA Key Pair. Authentication and authorization procedure is achieved through the services offered by Java JAAS classes.

Tópico(s): Medical Imaging Techniques and Applications

2013 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto

Jayasudha,

... Service Provider and the Service consumer. Usage of Java authentication and authorization services is performed in a pluggable fashion. It permits ...

Tópico(s): Peer-to-Peer Network Technologies

2011 - Science Publications | Journal of Computer Science

Artigo

Cheng Wen-qing,

... The scheme realizes pluggable Authentication module by JAAS(Java Authentication Authorization Service),and take X509 digital certificate as user's ...

Tópico(s): Cloud Computing and Remote Desktop Technologies

2006 - Computer Application in Sichuan Province | Jisuanji yingyong yanjiu

Artigo

HU Ying-bing,

... working mechanism of DCMS was detailed. By using Java Authentication and Authorization Service(JAAS) provided by J2EE, an implementation method of the system security was presented, and the combination of the Java Message Service(JMS) and system workflow explained the ...

Tópico(s): Web Applications and Data Management

2004 - Elsevier BV | Computer Integrated Manufacturing Systems

Artigo Acesso aberto Revisado por pares

Anzar Afaq, A Dolgert, Yining Guo, Chris Jones, S Kosyakov, В. Е. Кузнецов, Lee Lueking, D. Riley, V. Sekhri,

... built as a multi-tier web application with Java servlets running under Tomcat, with connections via JDBC to Oracle or MySQL database backends. Clients connect to the service through HTTP or HTTPS with authentication provided by GRID certificates and authorization through VOMS. DBS is an integral part of ...

Tópico(s): Research Data Management Practices

2008 - IOP Publishing | Journal of Physics Conference Series

Artigo

A. M. Chavan, L. E. Tacconi‐Garman, Michèle Péron, Fabio Sogni, Tim Canavan, P. Nass,

... collaborator. To application developers, the portal will offer authentication and authorization services, either via database queries or an LDAP server. The User Portal is being developed as a Web application using Java-based technology, including servlets and JSPs.

Tópico(s): Astronomical Observations and Instrumentation

2006 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE

Artigo Revisado por pares

Иван Ганчев, Zhanlin Ji, Máirtín O’Droma, Zhao Li,

... discover and suggest to consumers the `best' mobile services in the emerging ubiquitous consumer wireless world (UCWW). The cloud-based system builds up and dynamically manages personal profiles of consumers with big data processing techniques. A consumer identity module (CIM), based on the Java Card technology, supports a third-party authentication, authorization and accounting procedure (3P-AAA), and provides a ...

Tópico(s): Peer-to-Peer Network Technologies

2017 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Consumer Electronics

Artigo Revisado por pares

J. Vega, E. Sánchez, Alejandro López, A. Portas, M. A. Ochando, E. Ascasíbar, A. Mollinedo, J.A. Muñoz, Alfredo Sánchez, M. Ruíz, E. Barrera, S. López, R. Castro, Diego López,

... TJ-II elements. From the server side, web services are provided by means of resources supplied by JSP pages. The client part makes use of web browsers and ad hoc Java applications. The operation requires the use of a distributed authentication and authorization system. This development employs the PAPI System. At ...

Tópico(s): Particle Detector Development and Performance

2005 - Elsevier BV | Fusion Engineering and Design

Capítulo de livro Revisado por pares

Matthias Merz, Markus Aleksy,

The Java Data Objects specification is designed as lightweight persistence approach. Thus, JDO neither supports user authentication nor role-based authorization. Consequently, users are able to query the entire data store as well as to delete persistent objects without any restriction. The novel security approach JDOSecure was developed at the University of Mannheim to prevent unauthorized access to the data store while using the JDO API. Based on the dynamic proxy approach, JDOSecure introduces ...

Tópico(s): Software Engineering and Design Patterns

2006 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

Dongkyoo Shin, Jongil Jeong, Dongil Shin,

... for Web Services, which enables the exchange of authentication, authorization, and profile information between different entities. This provides interoperability between different security services in distributed environments. In this paper, we designed and implemented Java-based SAML APIs to achieve an SSO library.

Tópico(s): Peer-to-Peer Network Technologies

2004 - Springer Science+Business Media | Lecture notes in computer science

Artigo Brasil Produção Nacional

Gustavo H. M. B. Motta, S.S. Furuie,

... MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across ...

Tópico(s): Electronic Health Records Systems

2004 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE

Artigo Revisado por pares

J. Vega, E. Sánchez, A. Portas, A. Pereira, Alejandro López, E. Ascasíbar, S. Balme, Y. Buravand, P. Lebourg, Julian Theis, N. Utzel, M. Ruíz, E. Barrera, S. López, D. Machón, R. Castro, Diego López, A. Mollinedo, J.A. Muñoz,

... platform independence, and technological maturity. Web pages and Java applications permit users to access experimental systems, data servers, and the operation logbook. Security resources are provided by the PAPI system, a distributed authentication and authorization system.The TJ-II remote participation tools have allowed us to command and follow the stellarator operation from Cadarache. More than 1000 digitizer channels and more than 20 diagnostic control systems were remotely accessed from Web pages for monitoring/programming purposes. One Java application provided online information about the acquisition status ...

Tópico(s): Nuclear Physics and Applications

2006 - Taylor & Francis | Fusion Science & Technology

Capítulo de livro Revisado por pares

Stefan Seltzsam, Stephan Börzsönyi, Alfons Kemper,

... during plan distribution secure communication channels are established, authentication and authorization are performed, and overload situations are avoided by admission control. During plan execution operators are guarded using Java’s security model to prevent unauthorized resource access ...

Tópico(s): Advanced Database Systems and Queries

2001 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

R. Castro, J. Vega, A. Portas, Diego López, S. Balme, Julian Theis, P. Lebourg, H. Fernandes, A. Neto, A. Duarte, Floriano José Godinho de Oliveira, Francisco Everton Uchôa Reis, K. Purahoo, Kirsten Engelund Thomsen, W. Schiller, J. Kadlecsik,

... Access to Providers of Information (PAPI), a distributed authentication and authorization system. PAPI technology gives some important features, such as, single sign on for accessing to different resources, mobility for users, and compatibility with open and standard technologies: Java, JNLP protocol, XML-RPC and web technologies among ...

Tópico(s): Access Control and Trust

2007 - Elsevier BV | Fusion Engineering and Design

Artigo Acesso aberto

Popatrao N. Bhosale,

... practices to ensure robust, future-proof APIs. Keywords Java Spring Boot, REST, GraphQL, Microservices, Security, Scalability, API Design, Authentication, Authorization, Cloud-Native

Tópico(s): Distributed and Parallel Computing Systems

2025 - | INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT

Artigo

R. Castro, J. Vega, A. Portas, A. Pereira, S. Balme, A. Duarte, H. Fernandes, J. Kadlecsik, P. Lebourg, A. Neto, Floriano José Godinho de Oliveira, K. Purahoo, Francisco Everton Uchôa Reis, C. Rodríguez, J. Signoret, Julian Theis, Kirsten Engelund Thomsen,

... has been implemented based on PAPI as the authentication and authorization infrastructure that provides a security layer for accessing data among organisations. Findings During the implementation of EFDA federation some improvements in distributed single sign on systems have been achieved such as the integration of JAVA applications and a single sign off mechanism. Practical ...

Tópico(s): Cloud Data Security Solutions

2008 - | Campus-Wide Information Systems

Artigo Revisado por pares

Elhadi Shakshuki, Zhonghai Luo, Jing Gong,

... system architecture includes four types of agents: interface, authentication, authorization, and service provider agents (SPAs). The interface agents ... with the users to fulfill their interests. The authentication agents investigate the validity of using keystroke dynamics to strengthen security. The authorization agents make all decisions regarding who can access which resources and for what purposes. The SPAs offer different encryption services to different users. This paper provides the agents' architecture, design and implementations that enable them to cooperate, coordinate, and communicate with each other to provide a secure environment. A prototype of the system is implemented using the Java Agent Development Framework.

Tópico(s): User

2004 - Elsevier BV | Journal of Network and Computer Applications

Artigo Revisado por pares

Jing Jun Zhang, Lei Wang, Hui Li, Guang Yuan Liu,

... this issue, we research the AOP technology of Java Web called Struts interceptor. We show the advantage of this new programming method through an online submission and review system which using AOP method in the authentication and authorization.

Tópico(s): Model-Driven Software Engineering Techniques

2011 - Trans Tech Publications | Advanced materials research

Artigo Revisado por pares

Qing Li, Jian Zhou, Qirui Peng, Canqiang Li, Cheng Wang, Jing Wu, Shao Bei-en,

... mechanism is developed to realize cross-domains identity authentication, service authorization, and information transmission security. Every Web service or SAA in the platform has a unique ID. The interoperating process only relies on IDs, which endows the platform with a loose coupling feature. Aiming at service orchestration, a graphic service process modelling method is developed, with which the developed process model can link atom Web services and form a complex service. The Java based service orchestration tool provides an ESB (Enterprise ...

Tópico(s): Business Process Modeling and Analysis

2009 - Elsevier BV | Computers in Industry

Artigo Acesso aberto

Li Ma, Lei Gu, Jin Wang,

... the Sina server.The system uses the OAuth authentication method for user authorization to complete the login process.The specific functions ...

Tópico(s): Web Data Mining and Analysis

2014 - Global Vision Press | International Journal of Multimedia and Ubiquitous Engineering

Artigo Acesso aberto

Ban Sharief, Najla Aldabagh,

... JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give ...

Tópico(s):

2014 - Science and Information Organization | International Journal of Advanced Computer Science and Applications

Artigo

Boling Cheng, HL Fu, GW Yang, XG Tuo,

... multi-roles customization, dynamic tasks authorization, and the authorization and authentication among multi-roles. In the end, a security ...

Tópico(s):

2005 - Elsevier BV | Computer Integrated Manufacturing Systems

Artigo Acesso aberto

In-Tae Kim, Kyungyong Chung, Kee-Wook Rim, Jung-Hyun Lee,

... 프레임워크를 구현한다. In home network environments, the user authentication and authorization associated user's information and usability may be ...

Tópico(s): Educational Systems and Policies

2009 - Korea Contents Associaition | The Journal of the Korea Contents Association

Artigo Acesso aberto Revisado por pares

Miguel Martinez Pedreira, C. Grigoras, Volodymyr Yurchenko, M. M. Storetvedt,

... agents. User jobs will use JAliEn tokens for authentication and authorization by the central JAliEn services. These tokens are ...

Tópico(s): Parallel Computing and Optimization Techniques

2019 - EDP Sciences | EPJ Web of Conferences

Artigo Revisado por pares

Antonio Skármeta, Gregorio Martínez Pérez, Óscar Cánovas,

... security services can also be used to link authorization information to the public keys being certified by the PKI, therefore enabling new opportunities for distributed access control procedures. In this paper, we describe two of these innovative security services built over our own designed and implemented Java IPv6 PKI: a distributed security policy management architecture ...

Tópico(s): Advanced

2003 - Elsevier BV | Future Generation Computer Systems

Capítulo de livro Acesso aberto Revisado por pares

Sudhakar Menon,

... protocols. The GIS Server supports a role based authorization model that allows access to services to be controlled, leverages standard web based authentication mechanisms, and allows information to be securely exchanged by leveraging standard transport level security. The GIS Server supports a variety of client architectures including Rich Internet clients based on Flex, Silverlight and Javacript, occasionally connected Mobile Devices that are used for field work, as well as Desktop clients built using .Net and Java. The key to success is simple and elegant ...

Tópico(s): Advanced Computational Techniques and Applications

2009 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto

Chang‐Won Jeong, Woo Hong Kim, Kwon‐Ha Yoon, Su Chong Joo,

... mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS ...

Tópico(s): Technology and Data Analysis

2015 - | Journal of Internet Computing and services

Artigo Acesso aberto

Steve Schneider, Peter Y. A. Ryan,

... CORBA security service failsJorge Cuellar, SiemensVerification of an authentication and key agreement protocolVitaly Shmatikov, StanfordAnalysis of abuse-free contract signingRoberto Gorrieri, University of BolognaCoping with denial-of-service due to malicious Java AppletsCathy Meadows, NRLEmerging problems with sceurity protocol analysisVirginie ...

Tópico(s): Network Security and Intrusion Detection

2000 - Elsevier BV | Electronic Notes in Theoretical Computer Science