More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
OAuth 2.0 provides an open framework for the authorization of users across the web. While
the standard enumerates mandatory security protections for a variety of attacks, many …
the standard enumerates mandatory security protections for a variety of attacks, many …
Characterization of web single sign-on protocols
V Beltran - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
Single Sign On (SSO) protocols are today integrated in millions of web services so end
users can authenticate to a third-party identity provider (IdP) to access multiple services …
users can authenticate to a third-party identity provider (IdP) to access multiple services …
A cloud based dual-root trust model for secure mobile online transactions
L Li, D Huang, Z Shen… - 2013 IEEE Wireless …, 2013 - ieeexplore.ieee.org
With rapid growth of mobile devices and the emergency of mobile cloud services, it is a trend
to use mobile devices for mobile-centric applications, and expand the mobile capabilities …
to use mobile devices for mobile-centric applications, and expand the mobile capabilities …
Authentication and authorization for native mobile applications using OAuth 2.0
DI Aas - 2013 - ntnuopen.ntnu.no
OAuth 2.0 has in the recent years become the de-facto standard of doing API authorization
and authentication on mobile devices. However, recent critics have claimed that OAuth does …
and authentication on mobile devices. However, recent critics have claimed that OAuth does …
TSSDroid: realization of an efficient and usable TSS API for the Android software stack
The advancement in smartphones capabilities has attracted malware writers to build more
sophisticated attacks on these devices. Traditional software‐based security mechanisms …
sophisticated attacks on these devices. Traditional software‐based security mechanisms …
[PDF][PDF] Security Assessment OAuth 2.0 System
B Talaviya, N Shroff - ijeebs.com
OAuth 2.0 System aims to unify the experience and implementation of delegated web
service authentication into a single, community-driven protocol. The OAuth protocol enables …
service authentication into a single, community-driven protocol. The OAuth protocol enables …
Effective construction of data aggregation services in Java
F Andersson, S Cedergren Malmqvist - 2015 - diva-portal.org
Stora mängder data genereras dagligen av slutanvändare hos olika tjänster. Denna data
tenderar att tillhandahållas av olika aktörer, vilket skapar en fragmenterad marknad där …
tenderar att tillhandahållas av olika aktörer, vilket skapar en fragmenterad marknad där …