{"id":"https://openalex.org/W2048184694","doi":"https://doi.org/10.1109/eidwt.2013.101","title":"Design and Implementation of Authentication and Authorization Flow in ESCP System","display_name":"Design and Implementation of Authentication and Authorization Flow in ESCP System","publication_year":2013,"publication_date":"2013-09-01","ids":{"openalex":"https://openalex.org/W2048184694","doi":"https://doi.org/10.1109/eidwt.2013.101","mag":"2048184694"},"language":"en","primary_location":{"id":"doi:10.1109/eidwt.2013.101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eidwt.2013.101","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101615008","display_name":"Chundong Wang","orcid":"https://orcid.org/0000-0001-9069-2650"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chundong Wang","raw_affiliation_strings":["Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, Tianjin, China","Tianjin Key Lab. of Intell. Comput. & Novel software Technol., Tianjin Univ. of Technol., Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]},{"raw_affiliation_string":"Tianjin Key Lab. of Intell. Comput. & Novel software Technol., Tianjin Univ. of Technol., Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012645591","display_name":"Guangming Bo","orcid":null},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangming Bo","raw_affiliation_strings":["Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin, China","Key Lab. of Comput. Vision & Syst., Tianjin Univ. of Technol. Tianjin, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]},{"raw_affiliation_string":"Key Lab. of Comput. Vision & Syst., Tianjin Univ. of Technol. Tianjin, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101784166","display_name":"Yaohui Zhang","orcid":"https://orcid.org/0000-0002-6101-8680"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"education","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaohui Zhang","raw_affiliation_strings":["Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin, China","Key Lab. of Comput. Vision & Syst., Tianjin Univ. of Technol. Tianjin, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]},{"raw_affiliation_string":"Key Lab. of Comput. Vision & Syst., Tianjin Univ. of Technol. Tianjin, Tianjin, China","institution_ids":["https://openalex.org/I136765683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101615008"],"corresponding_institution_ids":["https://openalex.org/I136765683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10819733,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1321","issue":null,"first_page":"564","last_page":"568"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.940500020980835,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7135372161865234},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6444324851036072},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6125785708427429},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5880546569824219},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5671520233154297},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5081288814544678},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.43338561058044434},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.39621075987815857}],"concepts":[{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7135372161865234},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6444324851036072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6125785708427429},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5880546569824219},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5671520233154297},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5081288814544678},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.43338561058044434},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.39621075987815857}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eidwt.2013.101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eidwt.2013.101","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2112578244","https://openalex.org/W2138749659","https://openalex.org/W2916086000","https://openalex.org/W3145042860","https://openalex.org/W4245820541","https://openalex.org/W6675220417","https://openalex.org/W6677109490"],"related_works":["https://openalex.org/W2123296434","https://openalex.org/W2555738791","https://openalex.org/W2104547074","https://openalex.org/W4298042445","https://openalex.org/W2586694115","https://openalex.org/W2132693790","https://openalex.org/W2367441718","https://openalex.org/W2017616439","https://openalex.org/W2017675414","https://openalex.org/W1593822213"],"abstract_inverted_index":{"ESCP":[0,9],"is":[1,12,19],"short":[2],"for":[3,109],"Enterprise":[4],"Social":[5],"collaboration":[6],"Platform.":[7],"The":[8,75],"system,":[10],"which":[11,22],"also":[13],"known":[14],"as":[15],"enterprise":[16],"social":[17,29],"networking,":[18],"a":[20,70],"platform":[21],"translates":[23],"the":[24,28,64,79,92,96,102,105,110],"basic":[25,76],"elements":[26],"of":[27,35,91,104,107],"networking":[30],"and":[31,41,54,67,78,89,95,118],"twitter":[32],"into":[33],"tools":[34],"productivity.":[36],"For":[37],"system":[38],"security,":[39],"authentication":[40,77,81,112],"authorization":[42,108],"management":[43],"should":[44],"be":[45],"on":[46],"its":[47],"priorities.":[48],"It":[49],"verifies":[50],"user's":[51],"identity":[52],"effectively":[53],"allows":[55],"authorized":[56],"users":[57],"to":[58],"access":[59,73],"protected":[60],"resources":[61],"stored":[62],"in":[63,72],"service":[65],"provider,":[66],"thus":[68],"plays":[69],"role":[71],"control.":[74],"digest":[80],"are":[82,116],"described,":[83],"specifically":[84],"this":[85],"paper":[86],"emphasizes":[87],"design":[88],"implementation":[90],"Form-based":[93],"Authentication":[94],"improved":[97],"OAuth":[98,111],"Authentication.":[99],"Aiming":[100],"at":[101],"problem":[103],"granularity":[106],"method,":[113],"improvement":[114],"measures":[115],"proposed":[117],"implemented.":[119]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
