On technical security issues in cloud computing
The Cloud Computing concept offers dynamically scalable resources provisioned as a
service over the Internet. Economic benefits are the main driver for the Cloud, since it …
service over the Internet. Economic benefits are the main driver for the Cloud, since it …
Survey on delegated and self-contained authorization techniques in CPS and IoT
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …
secure digital systems. In this, authorization is a key component for regulating the detailed …
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
With the boom of software-as-a-service and social networking, web-based single sign-on
(SSO) schemes are being deployed by more and more commercial websites to safeguard …
(SSO) schemes are being deployed by more and more commercial websites to safeguard …
A thermal-driven floorplanning algorithm for 3D ICs
As the technology progresses, interconnect delays have become bottlenecks of chip
performance. 3D integrated circuits are proposed as one way to address this problem …
performance. 3D integrated circuits are proposed as one way to address this problem …
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in
which clients sign in the system once and yet are able to access to services offered by …
which clients sign in the system once and yet are able to access to services offered by …
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Access to computer systems and the information held on them, be it commercially or
personally sensitive, is naturally, strictly controlled by both legal and technical security …
personally sensitive, is naturally, strictly controlled by both legal and technical security …
Authscan: Automatic extraction of web authentication protocols from implementations
Ideally, security protocol implementations should be formally verified before they are
deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have …
deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have …
SoK: single sign-on security—an evaluation of openID connect
OpenID Connect is the OAuth 2.0-based replacement for OpenID 2.0 (OpenID) and one of
the most important Single Sign-On (SSO) protocols used for delegated authentication. It is …
the most important Single Sign-On (SSO) protocols used for delegated authentication. It is …
An expressive model for the web infrastructure: Definition and application to the browser id sso system
The web constitutes a complex infrastructure and, as demonstrated by numerous attacks,
rigorous analysis of standards and web applications is indispensable. Inspired by successful …
rigorous analysis of standards and web applications is indispensable. Inspired by successful …
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
Browser-based Single Sign-On (SSO) protocols relieve the user from the burden of dealing
with multiple credentials thereby improving the user experience and the security. In this …
with multiple credentials thereby improving the user experience and the security. In this …