Show simple item record

dc.contributor.authorPolitze, Marius
dc.contributor.authorDecker, Bernd
dc.contributor.editorMüller, Paul
dc.contributor.editorNeumair, Bernhard
dc.contributor.editorRaiser, Helmut
dc.contributor.editorDreo Rodosek, Gabi
dc.date.accessioned2017-06-20T11:04:53Z
dc.date.available2017-06-20T11:04:53Z
dc.date.issued2017
dc.identifier.isbn978-3-88579-665-7
dc.identifier.issn1617-5468
dc.description.abstractThe increasing amount and heterogeneity of devices demands changes in IT infrastructure. Many web service architectures used to meet these demands use the OAuth2 workflow to secure their interfaces. These implementations usually tightly couple web services and an OAuth2 authorization service. The presented extension to the OAuth2 workflow is capable handling authorizations for multiple attached services and therefore combines existing services of a central IT service provider but also allows other services running in a cooperative model with only a single instance ofthe authorization server. Based on auditing parameters it is possible to present access per resource or per method giving service providers and application developers more insight in how their services are used and show users by whom their personal data is used.
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartof10. DFN-Forum Kommunikationstechnologien
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-271
dc.subjectauthorization
dc.subjectmicro services
dc.subjectmobile
dc.subjectOAuth2
dc.subjectprivacy
dc.subjectsecurity
dc.subjectSOA
dc.subjecttransparency
dc.titleExtending the 0Auth2 Workflow to Audit Data Usage for Users and Service Providers In a Cooperative Scenario
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages41-50
mci.conference.sessiontitleSicherheit
mci.conference.locationBerlin
mci.conference.date30.-31. Mai 2017


Files in this item

Thumbnail

Show simple item record