Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Web Authorization Protocols

Web Authorization Protocols
View Sample PDF
Author(s): Demetrios Georgios Syropoulos-Harissis (Greek Molecular Computing Group, Greece)and Apostolos Syropoulos (Greek Molecular Computing Group, Greece)
Copyright: 2021
Pages: 7
Source title: Encyclopedia of Information Science and Technology, Fifth Edition
Source Author(s)/Editor(s): Mehdi Khosrow-Pour D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-7998-3479-3.ch035


View Web Authorization Protocols on the publisher's website for pricing and purchasing information.


The proliferation of the use of websites and their counterparts for mobile devices has created a number of problems that did not occur in the past. Typically, one needs to create many and different accounts for all websites and apps she wants to use. However, this means one has to do a lot of booking work. Fortunately, authentication and authorization protocols can be used to solve this and other related problems (e.g., what kind of data can be shared between apps and sites and what kind or data can be made publicly available to anybody). However, even this is not enough so one has to use additional tools to be absolutely sure data are exchanged in a safe way. All these are documented here.

Related Content

Yair Wiseman. © 2021. 11 pages.
Mário Pereira Véstias. © 2021. 15 pages.
Mahfuzulhoq Chowdhury, Martin Maier. © 2021. 15 pages.
Gen'ichi Yasuda. © 2021. 12 pages.
Alba J. Jerónimo, María P. Barrera, Manuel F. Caro, Adán A. Gómez. © 2021. 19 pages.
Gregor Donaj, Mirjam Sepesy Maučec. © 2021. 14 pages.
Udit Singhania, B. K. Tripathy. © 2021. 11 pages.
Body Bottom