[1]涂增英. 零信任架构中的统一权限管理方案[J]. 信息安全研究, 2021, 7(11): 10471051[2]郭丞乾, 蔡权伟, 林璟锵, 等. 单点登录协议实现的安全分析[J]. 信息安全研究, 2019, 5(1): 5967[3]HammerLahav E. RFC 5849 The OAuth 1.0 Protocol[S]. Fremont, CA: IETF, 2010[4]Hardt D. RFC 6749 The OAuth 2.0 Authorization Framework[S]. Fremont, CA: IETF, 2012[5]Lodderstedt T, Parecki A, Hardt D. The OAuth 2.1 Authorization Framework: Draftietfoauthv2104[S]. Fremont, CA: IETF, 2021[6]Sakimura N, Bradley J, Agarwal N. RFC 7636 Proof Key for Code Exchange by OAuth Public Clients[S]. Fremont, CA: IETF, 2015[7]李烨. 基于多应用系统下统一用户认证的研究与实现[J]. 网络安全技术与应用, 2019 (12): 2629 [8]Yang S, Hu J. Research on unified authentication and authorization in microservice architecture[C] Proc of the 20th IEEE Int Conf on Communication Technology (ICCT). Piscataway, NJ: IEEE, 2020: 11691173[9]Wang Y, Tian J, Yang C, et al. The research and design of unified authentication system based on CAS[C] Proc of the 2nd IEEE Int Conf on Computational Intelligence and Applications (ICCIA). Piscataway, NJ: IEEE, 2017: 528532[10]Gao B, Du S, Li X, et al. Research on an OAuth2.0based unified authentication system in the smart campus environment[J]. Journal of University of Science and Technology of China, 2019, 49(7): 564571[11]Zhen P, Wang D, Ji C. Unifiedidentity authentication scheme based on UAF protocol[C] Proc of the 19th IEEE Int Conf on Communication Technology (ICCT). Piscataway, NJ: IEEE, 2019: 415419 |