• 沒有找到結果。

A P2P blog system with OpenID integration

N/A
N/A
Protected

Academic year: 2022

Share "A P2P blog system with OpenID integration"

Copied!
2
0
0

加載中.... (立即查看全文)

全文

(1)

Accession number:20090111824188

Title:A P2P blog system with OpenID integration

Authors:Lin, Chen-Pu (1); Kao, Yung-Wei (1); Yuan, Shyan-Ming (1) Author affiliation:(1) Department of Computer Science and

Engineering, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu 300, Taiwan; (2) Department of Computer Science, Asia University, Lioufeng Rd., Wufeng, Taichung County, Taiwan

Corresponding author:Lin, C.-P.

(chenpu.w.lin@gmail.com)

Source title:Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 Abbreviated source title:Proc. Int. Conf. Convergence Hybrid Inf.

Technol., ICCIT Volume:1

Monograph title:Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 Issue date:2008

Publication year:2008 Pages:1064-1069

Article number:4682174 Language:English

ISBN-13:9780769534077

Document type:Conference article (CA)

Conference name:3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008

Conference date:November 11, 2008 - November 13, 2008 Conference location:Busan, Korea, Republic of

Conference code:74851

Publisher:Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States Abstract:Blog services become popular in recently years. Web users can post their articles through the services. On the other hand, the users do not have full control of the articles after posted while the services are built with client/server model. Therefore, we propose to use peer-to-peer (P2P) technology to establish blog services.

However, the anonymous feature disables the P2P technology to conduct user identification. The OpenID provides secure and unified

(2)

authentication mechanism to improve the anonymity. In addition, the OpenID has the single sign on procedure to reduce redundant, multiple accounts and passwords. The paper presents a blog service platform which integrates the P2P networks and the OpenID

authentication mechanism together. Therefore, users can establish their own blogs easily with full control. The platform can be utilized for other Internet applications as well. © 2008 IEEE.

Number of references:7 Main heading:Internet

Controlled terms:Access control - Authentication - Distributed computer systems - Information technology - Technology

Uncontrolled terms:Authentication mechanisms - Client/server models - Full controls - Internet applications - Multiple accounts - P2p networks - P2P technologies - Peer to peers - Service platforms - Single sign on - Unified authentications - User identifications - Web users

Classification code:901 Engineering Profession - 723.5 Computer Applications - 723 Computer Software, Data Handling and

Applications - 903 Information Science - 722.4 Digital Computers and Systems - 717 Optical Communication - 716

Telecommunication; Radar, Radio and Television - 718 Telephone Systems and Related Technologies; Line Communications

DOI:10.1109/ICCIT.2008.75 Database:Compendex

Compilation and indexing terms, Copyright 2009 Elsevier Inc.

參考文獻

相關文件

 Local, RADIUS, LDAP authentication presents user with a login page.  On successful authentication the user is redirected to

• A cell array is a data type with indexed data containers called cells, and each cell can contain any type of data. • Cell arrays commonly contain either lists of text

Note that if the server-side system allows conflicting transaction instances to commit in an order different from their serializability order, then each client-side system must apply

However, if the EAP Identity does match a client Identifier and the CredentialState is Accepted the EAP server proceeds with the authentication process and verifies the credential

Such analysis enables valuable applications including social entity search en- gines and substitution recommendation systems. For a social entity search engine, existing work such

[r]

Multiple images from a sequence tracked with 6DOF SLAM on a client, while a localization server provides the global pose used to overlay the building outlines with transparent

Unlike the client-server model, BitTorrent divides a file into a number of equal-sized pieces, where each peer simultaneously downloads and uploads via its neighbors that