{"id":"https://openalex.org/W2402530981","doi":"https://doi.org/10.5220/0004795700170026","title":"Authentication and Authorisation for Widget-based Applications in a Loosely-coupled Web eLearning Environment","display_name":"Authentication and Authorisation for Widget-based Applications in a Loosely-coupled Web eLearning Environment","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2402530981","doi":"https://doi.org/10.5220/0004795700170026","mag":"2402530981"},"language":"en","primary_location":{"id":"doi:10.5220/0004795700170026","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0004795700170026","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Web Information Systems and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0004795700170026","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051188027","display_name":"Jean-No\u00ebl Colin","orcid":"https://orcid.org/0000-0003-4754-7671"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jean-No\u00ebl Colin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5087348439","display_name":"Minh Tien Hoang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minh Tien Hoang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051188027"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40845046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9678000211715698,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.7499249577522278},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.746924877166748},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6377900838851929},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5437875390052795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.343707799911499}],"concepts":[{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.7499249577522278},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.746924877166748},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6377900838851929},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5437875390052795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.343707799911499}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0004795700170026","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0004795700170026","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Web Information Systems and Technologies","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.unamur.be:openaire/47be654b-6c0f-4c02-aa12-775e56e6acd0","is_oa":false,"landing_page_url":"https://researchportal.unamur.be/en/publications/47be654b-6c0f-4c02-aa12-775e56e6acd0","pdf_url":null,"source":{"id":"https://openalex.org/S4406922457","display_name":"Repository of the University of Namur","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Colin, J-N & Hoang, M T 2014, Authentication and authorisation for widget-based applications in a loosely-coupled web eLearning environment. in Proceedings of the 10th International Conference on Web Information Systems and Technologies (WEBIST 2014)., 24, 10th International Conference on Web Information Systems and Technologies, WEBIST 2014, Barcelona, Spain, 3/04/14.","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"doi:10.5220/0004795700170026","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0004795700170026","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Web Information Systems and Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2912135041"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,58,63],"discuss":[4],"the":[5,51,61],"mechanisms":[6],"used":[7,53],"for":[8],"authentication":[9],"and":[10,34,71,93],"authorisation":[11],"of":[12,89],"users":[13],"in":[14,68,87],"a":[15,78],"widget-based":[16],"web":[17],"environment":[18],"that":[19,60],"integrates":[20],"multiple":[21,24,28],"components":[22],"from":[23],"providers":[25],"running":[26],"at":[27],"locations.":[29],"Users":[30],"are":[31,55],"typically":[32],"teachers":[33,83],"pupils":[35],"who":[36],"access":[37],"our":[38],"platform":[39],"either":[40],"directly":[41],"or":[42],"through":[43],"their":[44,69,85],"usual":[45],"Learning":[46],"Management":[47],"System":[48],"(LMS).":[49],"Although":[50],"technologies":[52],"themselves":[54],"not":[56],"new,":[57],"believe":[59],"approach":[62,74],"follow":[64],"is":[65,75],"innovative":[66],"enough":[67],"integration":[70],"use.":[72],"Our":[73],"based":[76],"on":[77],"survey":[79],"ran":[80],"among":[81],"european":[82],"about":[84],"practices":[86],"terms":[88],"user":[90],"credentials":[91],"usage":[92],"sharing.":[94]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
