More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations

E Shernan, H Carter, D Tian, P Traynor… - Detection of Intrusions and …, 2015 - Springer
OAuth 2.0 provides an open framework for the authorization of users across the web. While
the standard enumerates mandatory security protections for a variety of attacks, many …

Characterization of web single sign-on protocols

V Beltran - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
Single Sign On (SSO) protocols are today integrated in millions of web services so end
users can authenticate to a third-party identity provider (IdP) to access multiple services …

A cloud based dual-root trust model for secure mobile online transactions

L Li, D Huang, Z Shen… - 2013 IEEE Wireless …, 2013 - ieeexplore.ieee.org
With rapid growth of mobile devices and the emergency of mobile cloud services, it is a trend
to use mobile devices for mobile-centric applications, and expand the mobile capabilities …

Authentication and authorization for native mobile applications using OAuth 2.0

DI Aas - 2013 - ntnuopen.ntnu.no
OAuth 2.0 has in the recent years become the de-facto standard of doing API authorization
and authentication on mobile devices. However, recent critics have claimed that OAuth does …

TSSDroid: realization of an efficient and usable TSS API for the Android software stack

S Khan, M Nauman, AT Othman… - Security and …, 2016 - Wiley Online Library
The advancement in smartphones capabilities has attracted malware writers to build more
sophisticated attacks on these devices. Traditional software‐based security mechanisms …

[PDF][PDF] Security Assessment OAuth 2.0 System

B Talaviya, N Shroff - ijeebs.com
OAuth 2.0 System aims to unify the experience and implementation of delegated web
service authentication into a single, community-driven protocol. The OAuth protocol enables …

Effective construction of data aggregation services in Java

F Andersson, S Cedergren Malmqvist - 2015 - diva-portal.org
Stora mängder data genereras dagligen av slutanvändare hos olika tjänster. Denna data
tenderar att tillhandahållas av olika aktörer, vilket skapar en fragmenterad marknad där …