International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 286

Informative Article | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.2 / 10


     

Open Authorization with Recommendation Service

Pranita M. Trivedi, N. M. Kandoi


Abstract: OAuth is an open standard for authorization. OAuth provides client applications a secure delegated access to server resources on behalf of a resource owner. It specifies a process for resource owners to authorize third-party access to their server resources without sharing their credentials. The proposed multicriteria recommender model with open authorization system is to have the modules includes End Users; Permission Guide; Recommendation Service; Authorization server. OAuth uses a mechanism where the roles of third-party applications and resource owners are separated. It does not require users to share their private credentials with third-party applications; instead it issues a new set of credentials for each application.


Keywords: Privacy, OAuth, collaboration, Recommendation social networks


Edition: Volume 3 Issue 5, May 2014


Pages: 436 - 438



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Pranita M. Trivedi, N. M. Kandoi, "Open Authorization with Recommendation Service", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 436-438, https://www.ijsr.net/getabstract.php?paperid=20131654, DOI: https://www.doi.org/10.21275/20131654



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top