Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
RFC 7519: JSON Web Token (JWT)2015 RFC
Reflects downloads up to 11 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.

Cited By

  1. ACM
    Hosseyni P, Küsters R and Würtele T (2024). Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process, ACM Transactions on Privacy and Security, 28:1, (1-36), Online publication date: 28-Feb-2025.
  2. ACM
    Gebhard A and Perouli D Comparing the Security Approaches of CIP and OPC UA Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, (27-36)
  3. Chen M, Chang Y and Wu T (2023). Digital Copyright Management Mechanism Based on Dynamic Encryption for Multiplatform Browsers, International Journal on Semantic Web & Information Systems, 20:1, (1-22), Online publication date: 9-Nov-2024.
  4. Song X, Xu G, Huang Y and Dong J (2024). DID-HVC-based Web3 healthcare data security and privacy protection scheme, Future Generation Computer Systems, 158:C, (267-276), Online publication date: 1-Sep-2024.
  5. ACM
    Nosouhi M, Baig Z, Doss R, Mahansaria D, Prasad Pati D, Gauravaram P, Pan L and Sood K Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments Proceedings of the 19th International Conference on Availability, Reliability and Security, (1-11)
  6. ACM
    Batz M and Zickau S Towards Functions for Verifiable Credentials in a 2-Holder Model Proceedings of the 19th International Conference on Availability, Reliability and Security, (1-8)
  7. ACM
    Thorn S, English K, Butler K and Enck W 5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (66-77)
  8. ACM
    Kong L, Wang J, Zhao Y and Sui T A method for improving the security of blockchain-based cross-domain authentication Proceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology, (177-183)
  9. Howard H, Alder F, Ashton E, Chamayou A, Clebsch S, Costa M, Delignat-Lavaud A, Fournet C, Jeffery A, Kerner M, Kounelis F, Kuppe M, Maffre J, Russinovich M and Wintersteiger C (2023). Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability, Proceedings of the VLDB Endowment, 17:2, (225-240), Online publication date: 1-Oct-2023.
  10. Xu B, Jia S, Lin J, Zheng F, Ma Y, Liu L, Gu X and Song L JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications Computer Security – ESORICS 2023, (263-282)
  11. ACM
    Sharif A, Marino F, Sciarretta G, De Marco G, Carbone R and Ranise S Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities Proceedings of the 18th International Conference on Availability, Reliability and Security, (1-11)
  12. Han J, Yun I, Kim S, Kim T, Son S and Han D (2023). Scalable and Secure Virtualization of HSM With ScaleTrust, IEEE/ACM Transactions on Networking, 31:4, (1595-1610), Online publication date: 1-Aug-2023.
  13. Jansen C, Lindequist B, Strohmenger K, Romberg D, Küster T, Weiss N, Franz M, Schwen L, Evans T, Homeyer A and Zerbe N (2023). The vendor-agnostic EMPAIA platform for integrating AI applications into digital pathology infrastructures, Future Generation Computer Systems, 140:C, (209-224), Online publication date: 1-Mar-2023.
  14. ACM
    Csikor L, Ramachandran S and Lakshminarayanan A ZeroDNS: Towards Better Zero Trust Security using DNS Proceedings of the 38th Annual Computer Security Applications Conference, (699-713)
  15. ACM
    Aydemir B, Basney J, Bockelman B, Gaynor J and Weitzel D SciAuth: A Lightweight End-to-End Capability-Based Authorization Environment for Scientific Computing Practice and Experience in Advanced Research Computing 2022: Revolutionary: Computing, Connections, You, (1-5)
  16. ACM
    Eran H, Fudim M, Malka G, Shalom G, Cohen N, Hermony A, Levi D, Liss L and Silberstein M FlexDriver: a network driver for your accelerator Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, (1115-1129)
  17. Fischer M, Hochman J and Boffa D Privacy-Preserving Data Sharing for Medical Research Stabilization, Safety, and Security of Distributed Systems, (78-89)
  18. Cunha G, Peixoto H and Machado J Improving Performance of Recommendation System Architecture Intelligent Data Engineering and Automated Learning – IDEAL 2020, (495-506)
  19. ACM
    Gao Y, Basney J and Withers A SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments Practice and Experience in Advanced Research Computing 2020: Catch the Wave, (465-468)
  20. Salis A, Jensen J, Bulla R, Mancini G and Cocco P Security and Privacy Management in a Fog-to-Cloud Environment Euro-Par 2019: Parallel Processing Workshops, (99-111)
  21. Eran H, Zeno L, Tork M, Malka G and Silberstein M NICA Proceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference, (345-361)
Contributors
  • Nomura Research Institute, Ltd.
Index terms have been assigned to the content through auto-classification.

Recommendations