[3] 沈海波,洪帆. 基于属性的授权和访问控制研究[J]. 计算机应用, 2007,27(1):114-117.
[4] Gusmeroli S, Piccione S, Rotondi D. A capability-based security approach to manage access control in the Internet of Things[J]. Mathematical and Computer Modelling, 2013,58(5-6):1189-1205.
[6] 袁家斌,魏利利,曾青华. 面向移动终端的云计算跨域访问委托模型[J]. 软件学报, 2013,24(3):564-574.
[8] RFC 6749, The OAuth 2.0 Authorization Framework[S].
[9] 时子庆,刘金兰,谭晓华. 基于OAuth2.0的认证授权技术[J]. 计算机系统应用, 2012,21(3):260-264.
[10] 卢慧锋,赵文涛,孙志峰,等. 社会化网络服务中OAuth 2.0的应用研究与实现[J]. 计算机应用, 2014,34(S1):50-54.
[11] RFC 6750, The OAuth 2.0 Authorization Framework: Bearer Token Usage[S].
[12] RFC 6819, OAuth 2.0 Threat Model and Security Considerations[S].
[13] WS-Trust 1.4, Web Services Trust Language (WS-Trust) 1.4[S].
[15] RFC 7159, The JavaScript Object Notation (JSON) Data Interchange Format[S].
[16] RFC 7523, JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants[S].
[17] RFC 7517, JSON Web Key (JWK)[S].
[18] RFC 7518, JSON Web Algorithms (JWA)[S]. |