Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,388,979 papers from all fields of science
Search
Sign In
Create Free Account
Access token
Known as:
Token
, Token (Windows NT architecture)
In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Access control
Application programming interface
Background Intelligent Transfer Service
Capability-based security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Power- and performance-aware on-chip interconnection architectures for many-core systems
Hemanta Kumar Mondal
,
Sujay Deb
2017
Corpus ID: 64533606
..................................................................................................................... IV…
Expand
2016
2016
Detecting the Age of Twitter Users
B. Chamberlain
,
C. Humby
,
M. Deisenroth
arXiv.org
2016
Corpus ID: 14998461
Twitter provides an extremely rich and open source of data for studying human behaviour at scale. It has been used to advance our…
Expand
2014
2014
Deterministic memory sharing in Kahn process networks: Ultrasound imaging as a case study
Andreas Tretter
,
Harshavardhan Pandit
,
Pratyush Kumar
,
L. Thiele
IEEE Workshop on Embedded Systems for Real-Time…
2014
Corpus ID: 7628932
Kahn process networks are a popular programming model for programming multi-core systems. They ensure determinacy of applications…
Expand
2014
2014
Building a connected Web Observatory: architecture and challenges
T. Tiropanis
,
Xin Wang
,
Ramine Tinati
,
W. Hall
2014
Corpus ID: 5710724
An increasing number of datasets and analytics resources have been made available on the Web. Often, those resources are hosted…
Expand
2013
2013
On Access Control Schemes for Hadoop Data Storage
Chunming Rong
,
Zhou Quan
,
Antorweep Chakravorty
International Conference on Cloud Computing and…
2013
Corpus ID: 15740557
Hadoop is a distributed Big Data storage and processing framework hugely adopted in different sectors from online media…
Expand
2011
2011
Privacy enabled web service access control using SAML and XACML for home automation gateways
Markus Jung
,
Georg Kienesberger
,
W. Granzer
,
Martin Unger
,
W. Kastner
International Conference for Internet Technology…
2011
Corpus ID: 5274743
A recent trend in home automation are gateways that offer a Web service based Application Programming Interface (API) to access…
Expand
2011
2011
Data and access management using access tokens for delegating authority to persons and software
Hidehito Gomi
Proceedings of the International Conference on…
2011
Corpus ID: 2044985
Delegation of authority is an act whereby an entity delegates his or her rights to use personal information to another entity. It…
Expand
2010
2010
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution
Christoph Fritsch
,
G. Pernul
Trust and Privacy in Digital Business
2010
Corpus ID: 15296872
Current challenges on the markets cause companies to interact with one another and strive after becoming members of virtual…
Expand
2009
2009
RESTful Security
D. Forsberg
2009
Corpus ID: 12940384
We take a look into the REST architectural style of making scalable web applications and find out the critical requirements that…
Expand
2005
2005
Authorization of data access in distributed storage systems
D. Feichtinger
,
A. Peters
The 6th IEEE/ACM International Workshop on Grid…
2005
Corpus ID: 27011260
This paper describes an efficient method for access authorization in distributed (grid) storage systems. Client applications…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE