期刊文献+

OAuth2.0协议在科研项目管理系统的设计与实现

Design and Practice of OAuth2.0 in Scientific Research Project Management System
下载PDF
导出
摘要 目前科研项目管理体系内存在不同级别、不同类型的子系统,用户需要在各子系统上分别从事不同的科研工作。为简化切换用户、频繁登录的过程,本文设计了基于OAuth2.0协议在科研项目管理体系中的统一身份认证系统,为体系内各子系统提供一个统一访问授权的接口,极大地节约科研人员人力成本,推进技术创新。 There are types of systems in the scientific research project management system resently,and researchers need to carry out different scientific research work in each subsystem.In order to simplify the process of switching users and logining frequently,an unified identity authentication system based on OAuth2.0 protocol in the scientific research project management system is presented,which provides a unified access interface for each subsystem.the results shows that the method can saves the human cost of researchers and promotes technological innovation.
作者 龙辉 LONG Hui(Institute of Scientific and Technical Information of Sichuan,Sichuan Chengdu 610016,China)
出处 《新一代信息技术》 2021年第20期28-30,共3页 New Generation of Information Technology
关键词 OAuth2.0 数据共享 授权 HTTP协议 OAuth 2.0 data sharing authorization HTTP protocol
  • 相关文献

参考文献5

二级参考文献32

  • 1肖美华,薛锦云.时态逻辑形式化描述并发系统性质[J].海军工程大学学报,2004,16(5):10-13. 被引量:12
  • 2Gonzalez JF, Rodriguez MC, Nistal ML, et al. Reverse OAuth: A solution to achieve deleated authorizations in single sign-on e-learning systems. Computers & Security, 2009,28:43-856.
  • 3The OAuth 2.0 Authorization Protocol (dmfl-ietf-oauth -v2-16),http://tools.ietf.org/html/draR-ietf-oauth-v2-16,2011.5.
  • 4The OAuth 1.0 Protocol. http://tools.ietf.org/html/rfc5849, 2010.4.
  • 5Hardt D. The OAuth 2.0 Authorization Framework. IETF RFC 6749. http://tools.ietf.org/html/rfc6749.
  • 6Chari S, Jutla CS, Roy A. Universally Composable Security Analysis of OAuth v2. 0. IACR Cryptology ePrint Archive, 2011, 2011: 526.
  • 7Corella F, Karen R Lewison. security analysis of double redirection protocols. 2011. http://pomcor.corn/techreports/ DoubleRedirection.pdf.
  • 8Xu XD, Niu LY, Meng B. Automatic verification of security properties of OAuth2.0 protocol with cryptoverif in computational model. Information Technology Journal, 2013, (12): 2273-2285.
  • 9Dolev D, Yao A. On the security of public key protocols. IEEE Trans. on Information Theory, 1983, 29(2): 198-208.
  • 10Blanchet B. A computationally sound mechanized prover for security protocols. IEEE Symposium on Security and Privacy. 2006. 140-154.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部