作者: John Y-C. Chang , Ki Hong Park , Ching-Yun Chao , Bertrand Be-Chung Chiu
DOI:
关键词:
摘要: Exposure of sensitive information to users is controlled using a first security token containing user identity and credentials represent the who requests services, second two other identities, one identifying issuer owning process. When requesting token-owning process sends indicate making request, uses its key digitally sign request. The signs request that it endorses A receiving server accepts if (1) by signing request; (2) valid (token signed digital signature verified unexpired); (3) entity, which can be real or deployment process, represented has authorization access specified resources; (4) authorized endorse entity resources.