Return to Article Details Comparison of authorization protocols for large requests in the operation queue environment Download Download PDF