On technical security issues in cloud computing

M Jensen, J Schwenk, N Gruschka… - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
The Cloud Computing concept offers dynamically scalable resources provisioned as a
service over the Internet. Economic benefits are the main driver for the Cloud, since it …

Survey on delegated and self-contained authorization techniques in CPS and IoT

SV Sudarsan, O Schelén, U Bodin - IEEE Access, 2021 - ieeexplore.ieee.org
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …

Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services

R Wang, S Chen, XF Wang - 2012 IEEE Symposium on …, 2012 - ieeexplore.ieee.org
With the boom of software-as-a-service and social networking, web-based single sign-on
(SSO) schemes are being deployed by more and more commercial websites to safeguard …

A thermal-driven floorplanning algorithm for 3D ICs

J Cong, J Wei, Y Zhang - IEEE/ACM International Conference …, 2004 - ieeexplore.ieee.org
As the technology progresses, interconnect delays have become bottlenecks of chip
performance. 3D integrated circuits are proposed as one way to address this problem …

Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps

A Armando, R Carbone, L Compagna… - Proceedings of the 6th …, 2008 - dl.acm.org
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in
which clients sign in the system once and yet are able to access to services offered by …

Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect

N Naik, P Jenkins - 2017 11th International Conference on …, 2017 - ieeexplore.ieee.org
Access to computer systems and the information held on them, be it commercially or
personally sensitive, is naturally, strictly controlled by both legal and technical security …

Authscan: Automatic extraction of web authentication protocols from implementations

G Bai, J Lei, G Meng, SS Venkatraman, P Saxena… - 2013 - ink.library.smu.edu.sg
Ideally, security protocol implementations should be formally verified before they are
deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have …

SoK: single sign-on security—an evaluation of openID connect

C Mainka, V Mladenov, J Schwenk… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
OpenID Connect is the OAuth 2.0-based replacement for OpenID 2.0 (OpenID) and one of
the most important Single Sign-On (SSO) protocols used for delegated authentication. It is …

An expressive model for the web infrastructure: Definition and application to the browser id sso system

D Fett, R Küsters, G Schmitz - 2014 IEEE Symposium on …, 2014 - ieeexplore.ieee.org
The web constitutes a complex infrastructure and, as demonstrated by numerous attacks,
rigorous analysis of standards and web applications is indispensable. Inspired by successful …

An authentication flaw in browser-based single sign-on protocols: Impact and remediations

A Armando, R Carbone, L Compagna, J Cuéllar… - Computers & …, 2013 - Elsevier
Browser-based Single Sign-On (SSO) protocols relieve the user from the burden of dealing
with multiple credentials thereby improving the user experience and the security. In this …