The eIDAS regulation: a survey of technological trends for European electronic identity schemes

A Sharif, M Ranzi, R Carbone, G Sciarretta, FA Marino… - Applied Sciences, 2022 - mdpi.com
The eIDAS regulation aims to provide an interoperable European framework to enable EU
citizens to authenticate and communicate with services of other Member States by using …

An Investigation into Misuse of Java Security APIs by Large Language Models

Z Mousavi, C Islam, K Moore, A Abuadbba… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …

SoK: A Survey on Technological Trends for (pre) Notified eIDAS Electronic Identity Schemes

A Sharif, M Ranzi, R Carbone, G Sciarretta… - Proceedings of the 17th …, 2022 - dl.acm.org
The eIDAS Regulation aims to provide an interoperable European framework to enable EU
citizens to authenticate and communicate with services of other Member States by using …

T-FIM: Transparency in Federated Identity Management for Decentralized Trust and Forensics Investigation

B Xu, Z Zhang, A Sun, J Guo, Z Wang, B Li, J Dong… - Electronics, 2023 - mdpi.com
Federated Identity Management (FIM) has gained significant adoption as a means to simplify
user authentication and service authorization across diverse domains. It serves as a …

BISON: Blind Identification through Stateless scOpe-specific derivatioN

J Heher, L Heimberger, S More - arXiv preprint arXiv:2406.01518, 2024 - arxiv.org
Delegating authentication to identity providers like Google or Facebook, while convenient,
compromises user privacy. Global identifiers enable internet-wide tracking; furthermore …

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

B Xu, S Jia, J Lin, F Zheng, Y Ma, L Liu, X Gu… - … on Research in …, 2023 - Springer
Abstract JSON Web Token (JWT) has been widely adopted to increase the security of
authentication and authorization scenarios. However, how to manage the JWT key during its …

Banff scoring of kidney allograft biopsies:“Manual” application vs software-assisted sign-out

AJ Demetris, AJ Lesniak, BA Popp… - American Journal of …, 2024 - academic.oup.com
Objectives Pathologists interpreting kidney allograft biopsies using the Banff system usually
start by recording component scores (eg, i, t, cg) using histopathologic criteria committed to …

Augmenting OAuth 2.0 for securing Internet of Things

S Kalra, A Chhabra - Authorea Preprints, 2023 - essopenarchive.org
Internet of things (IoT) has made human life more convenient by adding millions of devices.
As the number of smart devices increases so is the concern towards security of these …

Preventing Data-Security Breaches and Patient-Safety Risks in Cross-Blockchain e-Healthcare Systems

A Kormiltsyn, A Norta, S Nisar, V Dwivedi - International Conference on …, 2023 - Springer
Blockchain-based person-centric services aim to solve main healthcare problems such as
high costs and low service availability. The complex architecture of integrated blockchain …

[PDF][PDF] Mejora de los sistemas de gestión de identidades federados mediante técnicas de análisis de comportamientos

A García de Marina Martín - 2022 - burjcdigital.urjc.es
En primer lugar, me gustaría agradecer a mis directores de tesis, Marta e Isaac, sin vuestra
confianza este trabajo no hubiese sido posible. Habéis sido fuentes de inspiración y me …