Academic literature on the topic 'Authentication and Authorization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authentication and Authorization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Authentication and Authorization"
Shivanna, Preetha, and Sheela Samudrala Venkatesiah. "Secure Multimodal Authentication Scheme for Wireless Sensor Networks." International Journal of Safety and Security Engineering 11, no. 6 (2021): 653–61. http://dx.doi.org/10.18280/ijsse.110605.
Full textB, Vinay Kumar. "Authorization and Authentication in Mobile Devices." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1733–38. http://dx.doi.org/10.22214/ijraset.2022.41610.
Full textB, Vinay Kumar. "Authorization and Authentication in Mobile Devices." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1739–44. http://dx.doi.org/10.22214/ijraset.2022.41611.
Full textNeedleman, Mark. "The Shibboleth Authentication/Authorization System." Serials Review 30, no. 3 (2004): 252–53. http://dx.doi.org/10.1080/00987913.2004.10764917.
Full textAnugrah, Indra Gita, and Muhamad Aldi Rifai Imam Fakhruddin. "Development Authentication and Authorization Systems of Multi Information Systems Based REst API and Auth Token." INNOVATION RESEARCH JOURNAL 1, no. 2 (2020): 127. http://dx.doi.org/10.30587/innovation.v1i2.1927.
Full textKang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.
Full textIstiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, and Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction." Sensors 21, no. 15 (2021): 5122. http://dx.doi.org/10.3390/s21155122.
Full textXu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (2023): 782. http://dx.doi.org/10.3390/electronics12040782.
Full textLiu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.
Full textEigeles, Dan. "Intelligent authentication, authorization, and administration (I3A)." Information Management & Computer Security 13, no. 5 (2005): 419–34. http://dx.doi.org/10.1108/09685220510627296.
Full textDissertations / Theses on the topic "Authentication and Authorization"
Hakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.
Full textHamedtoolloei, Hamidreza. "A service-oriented architecture for authentication and authorization." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p1460003.
Full textYao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.
Full textSubils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.
Full textTran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.
Full textAas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.
Full textDasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.
Full textAlenius, Fabian. "Authentication and Authorization : Achieving Single Sign-on in an Erlang Environment." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129523.
Full textSandberg, Joakim. "Network Authentication to the Physical World." Thesis, KTH, Kommunikationssystem, CoS, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221177.
Full textMensah, Francis. "Framework to Implement Authentication, Authorization and Secure Communications in a Multiuser Collaborative CAx Environment." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4314.
Full textBooks on the topic "Authentication and Authorization"
Saracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93747-8.
Full textSaracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39749-4.
Full textSaracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04372-8.
Full textSaracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64455-0.
Full textSaracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25467-3.
Full textCorporation, Microsoft, ed. Building secure Microsoft ASP.NET applications: Authentication, authorization, and secure communication : patterns & practices. Microsoft Press, 2003.
Find full textSecurity controls for Sarbanes-Oxley section 404 IT compliance: Authorization, authentication, and access. Wiley, 2005.
Find full textGuide to claims-based identity and access control: Authentication and authorization for services and the web. Microsoft Press, 2010.
Find full textBook chapters on the topic "Authentication and Authorization"
Norberg, Scott. "Authentication and Authorization." In Advanced ASP.NET Core 3 Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_7.
Full textCalles, Miguel A. "Authentication and Authorization." In Serverless Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6100-2_9.
Full textLopez, Daniel Andres Pelaez. "Authentication and Authorization." In Full-Stack Web Development with Jakarta EE and Vue.js. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6342-6_10.
Full textFreeman, Adam, and Steven Sanderson. "Authentication and Authorization." In Pro ASP.NET MVC 3 Framework. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3405-0_22.
Full textFreeman, Adam. "Authentication and Authorization." In Applied ASP .NET 4 in Context. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3468-5_34.
Full textSinha, Sanjib. "Authentication and Authorization." In Beginning Laravel. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2538-7_14.
Full textMüller, Michael. "Authentication and Authorization." In Practical JSF in Java EE 8. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3030-5_32.
Full textBressoud, Thomas, and David White. "Authentication and Authorization." In Introduction to Data Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54371-6_24.
Full textBaker, Matthew. "Authentication and Authorization." In Secure Web Application Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8596-1_10.
Full textFreeman, Adam. "Authentication and Authorization." In Pro ASP.NET 4.5 in C#. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4255-0_25.
Full textConference papers on the topic "Authentication and Authorization"
Ferrari, Elena. "Session details: Authorization and Authentication." In SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies. ACM, 2017. http://dx.doi.org/10.1145/3254590.
Full textToseef, Umar, and Kostas Pentikousis. "Authentication and Authorization in FELIX." In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC). IEEE, 2015. http://dx.doi.org/10.1109/ucc.2015.98.
Full textEd Dawson, J. Lopez, J. A. Montenegro, and E. Okamoto. "BAAI: biometric authentication and authorization infrastructure." In International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003. IEEE, 2003. http://dx.doi.org/10.1109/itre.2003.1270620.
Full textAli, Wasan Ahmed, Naji Mutar Sahib, and Jumana Waleed. "Preservation Authentication and Authorization on Blockchain." In 2019 2nd International Conference on Engineering Technology and its Applications (IICETA). IEEE, 2019. http://dx.doi.org/10.1109/iiceta47481.2019.9012996.
Full textHernandez, Santiago Zapata, and Antonio F. Gomez Skarmeta. "Virtual identities in authentication and authorization scenarios." In the 2006 International Conference. ACM Press, 2006. http://dx.doi.org/10.1145/1501434.1501502.
Full textBoehm, Oliver, Jörg Caumanns, Markus Franke, and Oliver Pfaff. "Federated Authentication and Authorization: A Case Study." In 2008 12th International IEEE Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2008. http://dx.doi.org/10.1109/edoc.2008.36.
Full textEzawa, Yuki, Makoto Takita, Yoshiaki Shiraishi, et al. "Designing Authentication and Authorization System with Blockchain." In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2019. http://dx.doi.org/10.1109/asiajcis.2019.00006.
Full textLaferriere and Charland. "Authentication and authorization techniques in distributed systems." In Proceedings of IEEE International Carnahan Conference on Security Technology. IEEE, 1993. http://dx.doi.org/10.1109/ccst.1993.386805.
Full textKreutz, Diego, Alysson Bessani, Eduardo Feitosa, and Hugo Cunha. "Towards Secure and Dependable Authentication and Authorization Infrastructures." In 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2014. http://dx.doi.org/10.1109/prdc.2014.14.
Full textKim, Hyunwoo, and Steven C. Timm. "X.509 Authentication and Authorization in Fermi Cloud." In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC). IEEE, 2014. http://dx.doi.org/10.1109/ucc.2014.119.
Full textReports on the topic "Authentication and Authorization"
Mitton, D., M. St.Johns, S. Barkley, et al. Authentication, Authorization, and Accounting: Protocol Evaluation. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3127.
Full textGlass, S., T. Hiller, S. Jacobs, and C. Perkins. Mobile IP Authentication, Authorization, and Accounting Requirements. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2977.
Full textAboba, B., and J. Wood. Authentication, Authorization and Accounting (AAA) Transport Profile. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3539.
Full textBormann, C. An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9237.
Full textHousley, R., and B. Aboba. Guidance for Authentication, Authorization, and Accounting (AAA) Key Management. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4962.
Full textGiaretta, G., I. Guardini, E. Demaria, J. Bournelle, and R. Lopez. Authentication, Authorization, and Accounting (AAA) Goals for Mobile IPv6. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5637.
Full textSelander, G., M. Mani, and S. Kumar. Use Cases for Authentication and Authorization in Constrained Environments. Edited by L. Seitz and S. Gerdes. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7744.
Full textPerkins, C., and P. Calhoun. Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3957.
Full textChandramouli, Ramaswamy, and Teresa Schwarzhoff. Framework for emergency response official (ERO) authentication and authorization infrastructure. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7601.
Full textCampbell, B., C. Mortimore, M. Jones, and Y. Goland. Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7521.
Full text