Token-based access to digital information

被引:0
|
作者
Holmquist, LE [1 ]
Redström, J [1 ]
Ljungstrand, P [1 ]
机构
[1] Viktoria Inst, PLAY Appl Res Art & Technol, SE-40530 Gothenburg, Sweden
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several systems have been designed where a physical object is used to access digital information that is stored outside the object, but as yet no common vocabulary exists to describe such systems. We introduce a schema with three types of physical objects that can be linked to digital information: Containers are generic objects used to move information between different devices or platforms; tokens are used to access stored information, the nature of which is physically reflected in the token in some way; and tools are used to manipulate digital information. This paper gives special notice to token-based access system, and design implications for such systems are discussed. As an example of token-based access we have implemented WebStickers, where physical objects can be coupled with WWW pages. We present some examples of how tokens are used to access digital information in this system, and discuss future work in this area.
引用
收藏
页码:234 / 245
页数:12
相关论文
共 50 条
  • [1] Token-Based Access Control
    Gan, Guohua
    Chen, E.
    Zhou, Zhiyuan
    Zhu, Yan
    [J]. IEEE ACCESS, 2020, 8 (08): : 54189 - 54199
  • [2] Token-based information security for commercial and federal information networks
    Rohland, B
    [J]. INFORMATION PROTECTION AND NETWORK SECURITY, 1996, 2616 : 2 - 13
  • [3] An Updateable Token-Based Schema for Authentication and Access Management in Clouds
    Emadinia, Tayyebe
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Dabbaghi, Shirin
    Yahyapour, Ramin
    [J]. 2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, : 50 - 56
  • [4] WiCTP: A token-based access control protocol for wireless networks
    Goff, R
    Datta, A
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 1, 2005, 3480 : 87 - 96
  • [5] A comparison of location and token-based interaction techniques for point-of-care access to medical information
    Yngve Dahl
    Dag Svanæs
    [J]. Personal and Ubiquitous Computing, 2008, 12 : 459 - 478
  • [6] A comparison of location and token-based interaction techniques for point-of-care access to medical information
    Dahl, Yngve
    Svanaes, Dag
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2008, 12 (06) : 459 - 478
  • [7] Enhancing Microservices Security with Token-Based Access Control Method
    Venckauskas, Algimantas
    Kukta, Donatas
    Grigaliunas, Sarunas
    Bruzgiene, Rasa
    [J]. SENSORS, 2023, 23 (06)
  • [8] Token-based platform governance
    Abadi, Joseph
    Brunnermeier, Markus
    [J]. JOURNAL OF FINANCIAL ECONOMICS, 2024, 162
  • [9] Token-based Authentication for Smartphones
    Koschuch, Manuel
    Hudler, Matthias
    Eigner, Hubert
    Saffer, Zsolt
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING (DCNET 2013), 2013, : 49 - 54
  • [10] TOKEN-BASED MEDIUM ACCESS CONTROL SOLUTION FOR UNDERWATER ACOUSTIC BROADCAST
    Egbo, H. N.
    Hallin, N. J.
    Ray, P. L.
    O'Rourke, M.
    Frenzel, J. F.
    Edwards, D. B.
    [J]. OCEANS 2009, VOLS 1-3, 2009, : 1769 - 1777