Skip to search formSkip to main contentSkip to account menu

Access token

Known as: Token, Token (Windows NT architecture) 
In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
..................................................................................................................... IV… 
2017
2017
With the development of mobile communication, users put forward a higher security requirement in the process of intelligent… 
2016
2016
Twitter provides an extremely rich and open source of data for studying human behaviour at scale. It has been used to advance our… 
2014
2014
Kahn process networks are a popular programming model for programming multi-core systems. They ensure determinacy of applications… 
2013
2013
Hadoop is a distributed Big Data storage and processing framework hugely adopted in different sectors from online media… 
2013
2013
This project explores interoperability at the IaaS and PaaS layers of the Cloud Computing stack by contributing to two ongoing… 
2012
2012
University of Minnesota Ph.D. dissertation. July 2012. Major: Computer science. Advisor:Prof. Nicholas Hopper. 1 computer file… 
2009
2009
We take a look into the REST architectural style of making scalable web applications and find out the critical requirements that… 
Review
1997
Review
1997
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The…