期刊文献+

基于OAuth2.0协议的智慧校园认证系统研究 被引量:7

Research on an OAuth2.0-based unified authentication system in the smart campus environment
下载PDF
导出
摘要 以山东师范大学智慧校园建设为切入点,基于OAuth2.0协议设计并实现智慧校园认证系统.首先介绍了OAuth2.0认证授权技术的系统角色和授权流程;然后分析了智慧校园认证系统的设计和具体实现功能;最后通过理论分析和流程实验对系统进行测试,改善了校园数据获取的安全性和可靠性. Based on the construction of Shandong Normal University’s smart campus system, this paper summarizes the research methods of building the smart campus authentication system, which introduces the system role and authorization procedure of OAuth2.0-Based authentication and authorization technology, and analyzes the concrete implementation of the smart campus authentication platform. By conducting security experiments and theoretical analysis, the security and reliability of campus data acquisition has been improved.
作者 高保忠 杜首燕 李信治 王新华 GAO Baozhong;DU Shouyan;LI Xinzhi;WANG Xinhua(Institute of Information Science and Technology,Shandong Normal University,Jinan,250358;Computer Network Information Center,Chinese Academy of Science,Beijing,100190;School of Information Science and Engineering,Yunnan University,Kunming,650500)
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2019年第7期564-571,共8页 JUSTC
基金 国家自然科学基金(90612003,61602282) 中国博士后科学基金(2016M602181) 山东省自然科学基金(ZR2013FM008) 山东省科技发展计划项目(2011GGH20123)资助.
关键词 OAuth2.0协议 智慧校园 用户认证和授权 开放平台 开放API OAuth2.0 smart campus authentication and authorization open platform open API
  • 相关文献

参考文献4

二级参考文献20

  • 1王春枝,唐俊武.关于IoC模式及轻量级容器的研究[J].湖北工业大学学报,2006,21(4):52-54. 被引量:2
  • 2蒋纬,马光思.Spring与其他框架整合及流程分析[J].计算机工程,2007,33(14):79-81. 被引量:13
  • 3Dolev D, Yao A C. On the security of public key protocols[ J]. Information Theory, IEEE Transactions on, 1983, 29 (2) 198-208.
  • 4Sun S T, Hawkey K, Bezn,sov K. Systematically breaking and fixing OpenlD security: Formal analysis, semi-automated em- pirical evaluation, and praetical countermeasures[ J]. Computers & Security, 2012, 31 (4) : 465-483.
  • 5Tassanaviboon A, Gong G. OAuth and ABE based authorization in semi-trusted cloud computing: aauth[ C ]//Proceedings of the second international wor kshop on Data intensive computing in the clouds. 2011 : 41-50.
  • 6Pal S, Sharma Y, Kumar S, et al. Formal verification of OAuth 2.0 using Alloy framework [ C ]//Communication Systems and Network Technologies (CSNT) , 2011 International Conference on. 2011: 655-659.
  • 7Chari S, Jutla C S, Roy A Universally Composable Security Analysis of OAuth v2. 0[J]. IACR Cryptology ePrint Archive, 2011 : 526-527.
  • 8Sun S T, Beznosov K. The devil is in the (implementation) details: an empirical analysis of oauth sso systems[ C ]//Proceed- ings of the 2012.ACM cont) rence on Computer and communications security. 2012: 378-390.
  • 9Sun San-Tsai. Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems [ D]. U- niversity of British Columbi, Vancouver, 2012.
  • 10Armando A, Basin D, Boichut Y, et al. The AVISPA tool for the automated validation of internet security protocols and appli- cations[ C 1//Computer Aided Verification. 2005 : 281-285.

共引文献49

同被引文献68

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部