期刊文献+

基于OAuth2.0的资源共享机制RSBO 被引量:1

The Resource Sharing Mechanism Based on OAuth2.0 (RSBO)
下载PDF
导出
摘要 共享资源重要的问题就是安全,本文针对目前主流的资源共享机制存的安全问题,如身份认证授权安全问题、用户信息泄露等问题,同时当资源在不同用户不同平台间进行共享时,用户需对资源进行分散重复存储等,造成冗余存储及空间浪费。本文针这些问题,提出了一种基于OAuth2.0协议的资源共享机制RSBO(Resource Sharing based OAuth2.0)并对其进行阐述,RSBO利用OAuth2.0协议认证授权的访问令牌原理,为共享资源创建资源令牌,该机制解决了用户信息泄露及冗余存储等问题,一次授权,实现多用户跨平台的资源共享。 Safety is a key problem to resource sharing. This article analyses safety problems of popular resource sharing mechanisms. To solve these problems, such as identity authorization, account information leak (username and passwords), and duplication of storage, this article brings forward a resource sharing mechanism named RSBO based on OAuth2.0 protocols, and defines the process of resource sharing. This new mechanism utilizes OAuth2.0 protocols' authentication-authorization access token mechanism to create resource token for sharing resource, which solves identity authentication, authorization (without users' personal information) and redundant storage problems, and realizes resources sharing among different users and systems without involving user's private information.
出处 《软件》 2012年第9期58-60,共3页 Software
关键词 信息安全 资源共享 OAuth2 0协议 令牌 Information Safety Resource Sharing OAuth2.0 protocol Token
  • 相关文献

参考文献7

二级参考文献13

  • 1孙育华.从Napster到Grokster——对网络版权保护间接责任的一些讨论[J].嘉兴学院学报,2006,18(1):96-100. 被引量:2
  • 2周亚建,杨义先.与P2P技术相关的信息安全问题[J].电信工程技术与标准化,2006,19(5):1-7. 被引量:13
  • 3谢惠加.试论著作权间接侵权规则的法定化——兼论著作权间接侵权规则的经济分析[J].河北法学,2007,25(2):101-106. 被引量:8
  • 4谢亮.P2P技术与互联网安全[J].电信网技术,2007(3):7-10. 被引量:3
  • 5HYPPONEN M. Malware goes mobile[J]. Scientific America, 2006, 11: 70-77.
  • 6THOMMES R, COATES M. Epidemiological modeling of Peer-to-Peer viruses and pollution[C]//Proceedings of the 25th Annual IEEE Conference on Computer Communications. Barcelona, Spain: IEEE Press, 2006: 15-26.
  • 7CHEN G L, GRAY R S. Simulating non-scanning worms on Peer-to-Peer networks[C]//Proceedings of the I st International Conference on Scalable Information Systems. Hong Kong, China: ACM, 2006.
  • 8MA J, CHEN X M, XIANG G L. Modeling passive worm propagation in Peer-to-Peer system[C]//Proceedings of the 2006 International Conference on Computational Intelligence and Security. Guangzhou, China: IEEE, 2006: 1129-1132.
  • 9SU J, CHAN K K W, MIKLAS A et al. A preliminary investigation of worm infections in a bluetooth environment[C]//Proceedings of the 4th ACM Workshop on Recurring Malcode (WORM'06) Co-located with the 13th ACM Conference on Computer and Communications Security (CCS'06). Alexandria, VA, USA: ACM, 2006: 9-16.
  • 10ZHENG HUI, LI DONG, GAO ZHUO. An epidemic model of mobile phone virus[C]//Proceedings of the 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA'06). Urumchi, China: IEEE Computer Society, 2006: 534-538.

共引文献4

同被引文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部