Binding Obligations on User-Managed Access (UMA) Participants. Maler, E. Internet Draft draft-maler-oauth-umatrust-02, January, 2014. abstract bibtex User-Managed Access (UMA) is a profile of OAuth 2.0. UMA defines how resource owners can control protected-resource access by clients operated by arbitrary requesting parties, where the resources reside on any number of resource servers, and where a centralized authorization server governs access based on resource owner policy. This document provides a contractual framework that defines the minimum obligations of parties that operate and use UMA-conforming software programs and services. The goal of this framework is to support end-to-end legal enforceability of the terms and conditions of access sharing relationships between authorizing and requesting sides that use UMA. The audience for this document includes technologists, legal professionals, and operators of UMA-conforming services.
@misc{ mal14,
author = {Eve Maler},
title = {Binding Obligations on User-Managed Access (UMA) Participants},
howpublished = {Internet Draft draft-maler-oauth-umatrust-02},
month = {January},
year = {2014},
topic = {uma[1] oauth[0.9]},
uri = {https://datatracker.ietf.org/drafts/draft-maler-oauth-umatrust},
abstract = {User-Managed Access (UMA) is a profile of OAuth 2.0. UMA defines how resource owners can control protected-resource access by clients operated by arbitrary requesting parties, where the resources reside on any number of resource servers, and where a centralized authorization server governs access based on resource owner policy. This document provides a contractual framework that defines the minimum obligations of parties that operate and use UMA-conforming software programs and services. The goal of this framework is to support end-to-end legal enforceability of the terms and conditions of access sharing relationships between authorizing and requesting sides that use UMA. The audience for this document includes technologists, legal professionals, and operators of UMA-conforming services.}
}
Downloads: 0
{"_id":{"_str":"53ff72c57c90ec6e13001d89"},"__v":0,"authorIDs":[],"author_short":["Maler, E."],"bibbaseid":"maler-bindingobligationsonusermanagedaccessumaparticipants-2014","bibdata":{"downloads":0,"role":"author","bibbaseid":"maler-bindingobligationsonusermanagedaccessumaparticipants-2014","year":"2014","uri":"https://datatracker.ietf.org/drafts/draft-maler-oauth-umatrust","type":"misc","topic":"uma[1] oauth[0.9]","title":"Binding Obligations on User-Managed Access (UMA) Participants","month":"January","key":"mal14","id":"mal14","howpublished":"Internet Draft draft-maler-oauth-umatrust-02","bibtype":"misc","bibtex":"@misc{ mal14,\n author = {Eve Maler},\n title = {Binding Obligations on User-Managed Access (UMA) Participants},\n howpublished = {Internet Draft draft-maler-oauth-umatrust-02},\n month = {January},\n year = {2014},\n topic = {uma[1] oauth[0.9]},\n uri = {https://datatracker.ietf.org/drafts/draft-maler-oauth-umatrust},\n abstract = {User-Managed Access (UMA) is a profile of OAuth 2.0. UMA defines how resource owners can control protected-resource access by clients operated by arbitrary requesting parties, where the resources reside on any number of resource servers, and where a centralized authorization server governs access based on resource owner policy. This document provides a contractual framework that defines the minimum obligations of parties that operate and use UMA-conforming software programs and services. The goal of this framework is to support end-to-end legal enforceability of the terms and conditions of access sharing relationships between authorizing and requesting sides that use UMA. The audience for this document includes technologists, legal professionals, and operators of UMA-conforming services.}\n}","author_short":["Maler, E."],"author":["Maler, Eve"],"abstract":"User-Managed Access (UMA) is a profile of OAuth 2.0. UMA defines how resource owners can control protected-resource access by clients operated by arbitrary requesting parties, where the resources reside on any number of resource servers, and where a centralized authorization server governs access based on resource owner policy. This document provides a contractual framework that defines the minimum obligations of parties that operate and use UMA-conforming software programs and services. The goal of this framework is to support end-to-end legal enforceability of the terms and conditions of access sharing relationships between authorizing and requesting sides that use UMA. The audience for this document includes technologists, legal professionals, and operators of UMA-conforming services."},"bibtype":"misc","biburl":"http://dret.net/biblio/dret.bib","creationDate":"2014-08-28T18:19:49.249Z","downloads":0,"keywords":[],"search_terms":["binding","obligations","user","managed","access","uma","participants","maler"],"title":"Binding Obligations on User-Managed Access (UMA) Participants","year":2014,"dataSources":["mL7NKvaepNEWFcMvG"]}