OAuth Technology and its Application in the Cloud Computing
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Cloud computing is a complex network environment, and traditional applications use authorization and authentication based on a single security domain mode, it does not meet the requirements of cloud computing, cloud computing needs to establish cross-domain security access control policy. Based on the analysis of the challenges of data security and privacy protection in the cloud computing, this paper introduces the principle and function of the OAuth2.0 protocol, and points out the OAuth2.0 advantage of open license technology and its application in the cloud computing. Finally, through a cloud computing example, the implementation methods and development ideas had been discussed.

    Reference
    Related
    Cited by
Get Citation

李馥娟.基于OAuth的开放授权技术及在云计算中的应用.计算机系统应用,2015,24(4):228-232

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 04,2014
  • Revised:October 16,2014
  • Adopted:
  • Online: April 24,2015
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063