Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,384,924 papers from all fields of science
Search
Sign In
Create Free Account
Java Authentication and Authorization Service
Known as:
JAAS
, Java Authentication and Authorisation Service
Java Authentication and Authorization Service, or JAAS, pronounced "Jazz", is the Java implementation of the standard Pluggable Authentication Module…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Apache Shiro
Authentication
Authorization
Callback (computer programming)
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
An Improved Cloud Storage Access Control using JAAS on Stack of Kerberos Protocol
M. Hasan
,
Utpaul Sarker
,
Md Kislu Noman
2017
Corpus ID: 55297368
Cloud storage service is increasingly important and beneficial to the internet users. Users around the world enjoy the high…
Expand
Review
2013
Review
2013
Developing Web Applications with Oracle ADF Essentials
Sten E. Vesterli
2013
Corpus ID: 57090781
Quickly build attractive, user-friendly web applications using Oracle's free ADF Essentials toolkit Overview Quickly build…
Expand
Review
2011
Review
2011
Tutorial da API Java Authentication and Authorization Service (JAAS)
Carlos M. S. Cabral
2011
Corpus ID: 62508877
Sera apresentado um breve resumo sobre Java Security para depois apresentar um estudo mais aprofundado sobre a API JAAS da…
Expand
2011
2011
DESIGN OF USER IDENTITY AUTHENTICATION IN J2EE WEB SYSTEM BASED ON JAAS SECURITY MECHANISM
Liu Jing-lin
2011
Corpus ID: 63012477
The paper studied the JAAS security authentication machanise intensively,found the dynamic and pluggable authentication module…
Expand
2006
2006
Zás – Aspect-Oriented Authorization Services (first take)
Paulo Zenida
,
M. Sequeira
,
Diogo Henriques
,
C. Serrão
2006
Corpus ID: 60475219
O trabalho descrito neste relatorio deu origem a um artigo apresentado na conferencia ICSOFT 2006.
2006
2006
A Distributed Privacy Enforcement Architecture Based on Kerberos
P. Langendörfer
,
K. Piotrowski
,
M. Maaser
2006
Corpus ID: 14750317
In this paper we propose a distributed privacy enforcement architecture. Each mobile client runs its own privacy negotiation unit…
Expand
2004
2004
The RoleX Environment for Multi-agent Cooperation
Giacomo Cabri
,
L. Ferrari
,
L. Leonardi
International Workshop on Cooperative Information…
2004
Corpus ID: 18610134
In this paper we present the RoleX environment for multi-agent systems. Born to support the management of role-based interactions…
Expand
2004
2004
Towards an Alternative Way of Verifying Proxy Objects in JINI
N. Papamichail
,
L. Vasiu
International Conference on E-Business and…
2004
Corpus ID: 4592461
Jini networking technology represents an exciting paradigm in distributed systems. Its elegant approach in computer networking…
Expand
2002
2002
Java Security Solutions
Rich Helton
,
J. Helton
2002
Corpus ID: 59854274
From the Publisher: In this unique guide, two Java security experts show you how to take full advantage of Java security…
Expand
2001
2001
Java security - writing and deploying secure applications: covers JAAS and JSEE (2. ed.)
S. Oaks
2001
Corpus ID: 5354487
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required