The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2009 vol.13)
pp: 91-93
Stephen Farrell , Trinity College Dublin
ABSTRACT
Many Web 2.0 services offer Web 2.0 APIs for developers to use. The author reviews one of the security mechanisms that's often included in such Web 2.0 APIs — the use of API keys — and some of the deployment issues associated with their use.
INDEX TERMS
API keys, Web 2.0 APIs, Web 2.0 security, OAuth
CITATION
Stephen Farrell, "API Keys to the Kingdom", IEEE Internet Computing, vol.13, no. 5, pp. 91-93, September/October 2009, doi:10.1109/MIC.2009.100
REFERENCES
1. C. Pautasso, O. Zimmermann, and F. Leymann, "Restful Web Services vs. Big Web Services: Making the Right Architectural Decision," Proc. 17th Int'l Conf. World Wide Web (WWW 08), ACM Press, 2008, pp. 805–814; http://doi.acm.org/10.11451367497.1367606 .
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool