Skip to search formSkip to main contentSkip to account menu

Access token

Known as: Token, Token (Windows NT architecture) 
In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
2017
2017
..................................................................................................................... IV… 
Highly Cited
2016
2016
2016
OAuth 2.0 is a delegated authorization framework enabling secure authorization for applications running on various kinds of… 
Highly Cited
2016
Highly Cited
2016
This paper presents the design and implementation of an authorization mechanism for MQTT-based Internet of Things (IoT). The… 
2015
2015
This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as… 
Highly Cited
2013
Highly Cited
2013
Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud… 
Highly Cited
2013
Highly Cited
2013
The OAuth 2.0 authorization protocol standardises delegated authorization on the Web. Popular social networks such as Facebook… 
2010
2010
Current challenges on the markets cause companies to interact with one another and strive after becoming members of virtual…