International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124

Informative Article | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014


Open Authorization with Recommendation Service

Pranita M. Trivedi | N. M. Kandoi


Abstract: OAuth is an open standard for authorization. OAuth provides client applications a secure delegated access to server resources on behalf of a resource owner. It specifies a process for resource owners to authorize third-party access to their server resources without sharing their credentials. The proposed multicriteria recommender model with open authorization system is to have the modules includes End Users; Permission Guide; Recommendation Service; Authorization server. OAuth uses a mechanism where the roles of third-party applications and resource owners are separated. It does not require users to share their private credentials with third-party applications; instead it issues a new set of credentials for each application.


Keywords: Privacy, OAuth, collaboration, Recommendation social networks


Edition: Volume 3 Issue 5, May 2014,


Pages: 436 - 438


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Pranita M. Trivedi, N. M. Kandoi, "Open Authorization with Recommendation Service", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 436-438, https://www.ijsr.net/get_abstract.php?paper_id=20131654

Similar Articles with Keyword 'Privacy'

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar [11] | Hima Saxena [2] | Dr. Suman Sharma [5]

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article
Top