2018
DOI: 10.1177/1550147718801535
|View full text |Cite
|
Sign up to set email alerts
|

An analysis on the revoking mechanisms for JSON Web Tokens

Abstract: JSON Web Tokens provide a scalable solution with significant performance benefits for user access control in decentralized, large-scale distributed systems. Such examples would entail cloud-based, micro-services styled systems or typical Internet of Things solutions. One of the obstacles still preventing the wide-spread use of JSON Web Token–based access control is the problem of invalidating the issued tokens upon clients leaving the system. Token invalidation presently takes a considerable processing overhea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 5 publications
0
4
0
1
Order By: Relevance
“…If a token is revoked in a group, only tokens signed with the group secret will be revoked, instead of all the tokens. As logouts are typically infrequent events, one can use statistical methods as described in [7] to calculate an optimal group size, which minimizes the number of unnecessary revocations while maintaining a manageable number of secrets.…”
Section: Basic Principlementioning
confidence: 99%
See 1 more Smart Citation
“…If a token is revoked in a group, only tokens signed with the group secret will be revoked, instead of all the tokens. As logouts are typically infrequent events, one can use statistical methods as described in [7] to calculate an optimal group size, which minimizes the number of unnecessary revocations while maintaining a manageable number of secrets.…”
Section: Basic Principlementioning
confidence: 99%
“…The mathematical framework is then validated with measurements on a real application. We also further elaborate on our novel solution, first introduced in [7]. After its brief introduction, our method is compared with the other strategies using the common mathematical framework.…”
Section: Introductionmentioning
confidence: 99%
“…After login, the Back-End issues a JSON web token (Jánoky et al, 2018) for the Front-End. All sensitive API endpoints of the Back-End are protected and require a valid JSON web token in the request's body.…”
Section: Container-based Architecturementioning
confidence: 99%
“…After successful authentication, user access details are packaged in JWT token encrypted by a common encryption key called the bearer token. 27 This key is sent each time the user requests the data and is retrieved by the decryption service.…”
Section: Providing the Structure Of The Security Servicesmentioning
confidence: 99%