Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,571 papers from all fields of science
Search
Sign In
Create Free Account
Access token
Known as:
Token
, Token (Windows NT architecture)
In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Access control
Application programming interface
Background Intelligent Transfer Service
Capability-based security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Power- and performance-aware on-chip interconnection architectures for many-core systems
Hemanta Kumar Mondal
,
Sujay Deb
2017
Corpus ID: 64533606
..................................................................................................................... IV…
Expand
2017
2017
Cross-domain Authentication Mechanism Design and Research Based on the Mobile Internet
Xiao-hui Cheng
,
Ming-yue Li
,
Li-yun Zhang
2017
Corpus ID: 55762510
With the development of mobile communication, users put forward a higher security requirement in the process of intelligent…
Expand
2016
2016
Detecting the Age of Twitter Users
B. Chamberlain
,
C. Humby
,
M. Deisenroth
arXiv.org
2016
Corpus ID: 14998461
Twitter provides an extremely rich and open source of data for studying human behaviour at scale. It has been used to advance our…
Expand
2016
2016
Integration of REST Web Service with Social Media API
Aschalew Gebremichael
2016
Corpus ID: 62804518
2014
2014
Deterministic memory sharing in Kahn process networks: Ultrasound imaging as a case study
Andreas Tretter
,
Harshavardhan Pandit
,
Pratyush Kumar
,
L. Thiele
IEEE Workshop on Embedded Systems for Real-Time…
2014
Corpus ID: 7628932
Kahn process networks are a popular programming model for programming multi-core systems. They ensure determinacy of applications…
Expand
2013
2013
On Access Control Schemes for Hadoop Data Storage
Chunming Rong
,
Zhou Quan
,
Antorweep Chakravorty
International Conference on Cloud Computing and…
2013
Corpus ID: 15740557
Hadoop is a distributed Big Data storage and processing framework hugely adopted in different sectors from online media…
Expand
2013
2013
Extending Cloud Management Tools at the IaaS and PaaS Layers for Cloud Interoperabitliy
O. Martin
2013
Corpus ID: 107423042
This project explores interoperability at the IaaS and PaaS layers of the Cloud Computing stack by contributing to two ongoing…
Expand
2012
2012
Toward Building Practical Privacy Enhancing Technologies
Zi Lin
2012
Corpus ID: 60445137
University of Minnesota Ph.D. dissertation. July 2012. Major: Computer science. Advisor:Prof. Nicholas Hopper. 1 computer file…
Expand
2009
2009
RESTful Security
D. Forsberg
2009
Corpus ID: 12940384
We take a look into the REST architectural style of making scalable web applications and find out the critical requirements that…
Expand
Review
1997
Review
1997
The Saga Security System: a security architecture for open distributed systems
Masakazu Soshi
,
M. Maekawa
Proceedings of the Sixth IEEE Computer Society…
1997
Corpus ID: 15205435
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The…
Expand