Authentication through Claims-Based Authentication
P. Gatty. International Journal of Trend in Scientific Research and Development, 2 (4):
2664-2666(June 2018)
Abstract
Thinking as far as claims and issuers is an effective reflection that backs better approaches for securing your application. Claims have an understanding with the issuer and allow the claims of the user to be accepted only if the claims are issued by a trusted issuer. Authentication and authorization is explicit in CBAC as compared to other approaches. 1. Pawan Patil | Ankit Ayyar | Vaishali GattyÄuthentication through Claims-Based Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15644.pdf http://www.ijtsrd.com/engineering/software-engineering/15644/authentication-through-claims-based-authentication/pawan-patil
%0 Journal Article
%1 noauthororeditor
%A Gatty, Pawan Patil Ankit Ayyar Vaishali
%D 2018
%J International Journal of Trend in Scientific Research and Development
%K Access Auth Authentication Claims Engineering ID Identity O Open RBAC Server Software Tokens
%N 4
%P 2664-2666
%T Authentication through Claims-Based Authentication
%U http://www.ijtsrd.com/engineering/software-engineering/15644/authentication-through-claims-based-authentication/pawan-patil
%V 2
%X Thinking as far as claims and issuers is an effective reflection that backs better approaches for securing your application. Claims have an understanding with the issuer and allow the claims of the user to be accepted only if the claims are issued by a trusted issuer. Authentication and authorization is explicit in CBAC as compared to other approaches. 1. Pawan Patil | Ankit Ayyar | Vaishali GattyÄuthentication through Claims-Based Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15644.pdf http://www.ijtsrd.com/engineering/software-engineering/15644/authentication-through-claims-based-authentication/pawan-patil
@article{noauthororeditor,
abstract = {Thinking as far as claims and issuers is an effective reflection that backs better approaches for securing your application. Claims have an understanding with the issuer and allow the claims of the user to be accepted only if the claims are issued by a trusted issuer. Authentication and authorization is explicit in CBAC as compared to other approaches. [1]. Pawan Patil | Ankit Ayyar | Vaishali Gatty"Authentication through Claims-Based Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15644.pdf http://www.ijtsrd.com/engineering/software-engineering/15644/authentication-through-claims-based-authentication/pawan-patil
},
added-at = {2018-09-11T09:04:35.000+0200},
author = {Gatty, Pawan Patil Ankit Ayyar Vaishali},
biburl = {https://www.bibsonomy.org/bibtex/2650d5b9014b17fece8650af3b399e5bb/ijtsrd},
interhash = {dee4e0951f428bfbb134a89ef62078b0},
intrahash = {650d5b9014b17fece8650af3b399e5bb},
issn = {2456-6470},
journal = {International Journal of Trend in Scientific Research and Development},
keywords = {Access Auth Authentication Claims Engineering ID Identity O Open RBAC Server Software Tokens},
language = {English},
month = {June},
number = 4,
pages = {2664-2666},
timestamp = {2018-10-02T11:01:27.000+0200},
title = {Authentication through Claims-Based Authentication
},
url = {http://www.ijtsrd.com/engineering/software-engineering/15644/authentication-through-claims-based-authentication/pawan-patil},
volume = 2,
year = 2018
}