SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
DISTINCT: identity theft using in-browser communications in dual-window single sign-on
Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of
modern web security, and have received much academic attention. Users sign in at a trusted …
modern web security, and have received much academic attention. Users sign in at a trusted …
Combining usability and privacy protection in free-access public cloud storage servers: review of the main threats and challenges
The 21st century belongs to the world of computing, specially as a result of the so-called
cloud computing. This technology enables ubiquitous information management and thus …
cloud computing. This technology enables ubiquitous information management and thus …
Implementasi dan Analisis Attack Tree pada Aplikasi DVWA Berdasar Metrik Time dan Probability
AR Irawan, A Widjajarto… - J-SAKTI (Jurnal Sains …, 2023 - tunasbangsa.ac.id
Perumusan attack tree dapat dilakukan berdasarkan tahapan eksploitasi pada aplikasi
berbasis web. Berdasarkan rumusan tersebut, penelitian ini bertujuan untuk memahami …
berbasis web. Berdasarkan rumusan tersebut, penelitian ini bertujuan untuk memahami …
Automated Security Testing for Identity Management of Large-scale Digital Infrastructures
A Bisegna - 2023 - tesidottorato.depositolegale.it
Ensuring the security of an organization's digital assets against cyber threats is critical in
today's technology-driven world. Regular security testing is one of the measures that can …
today's technology-driven world. Regular security testing is one of the measures that can …
Rhythm Authentication Using Multi-touch Technology: A New Method of Biometric Authentication
N Wongnarukane, P Kuacharoen - … December 17-19, 2016, Proceedings 1, 2017 - Springer
A keystroke authentication method has a lower cost and is more powerful and easier to use
than other biometric authentication methods. However, traditional keystroke authentication …
than other biometric authentication methods. However, traditional keystroke authentication …
Rancang Bangun Library Web Token untuk Enkripsi HTTP Data Menggunakan Eksklusif-OR (XOR)
BD Kurniawan, MA Rosid… - … , Life Science and …, 2023 - digital-science.pubmedia.id
Meningkatnya peretasan data di Indonesia menjadi masalah yang mengkhawatirkan karena
data yang sensitif. Untuk mengamankan pertukaran data, enkripsi data sangat penting, dan …
data yang sensitif. Untuk mengamankan pertukaran data, enkripsi data sangat penting, dan …
Winpen: A fast clustering approach for black-box penetration testing
Ö Özerk - 2021 - research.sabanciuniv.edu
In black-box penetration testing, a payload is a piece of code that potentially enables
unauthorized access to a computer system through an exploit. Grouping payloads based on …
unauthorized access to a computer system through an exploit. Grouping payloads based on …
[PDF][PDF] 국내자바웹응용을위한SAML 소프트웨어의개발
조진용, 채영훈, 공정욱 - 한국정보통신학회논문지, 2019 - koreascience.kr
요 약연합인증은 다수의 보안도메인 간에 적용되는 사용자 인증 및 인가체계이다. 연구 및 교육
분야에서 활용되고 있는 다수의 국외 웹 응용서비스들은 표준화된 사용자 인증방식으로 SAML …
분야에서 활용되고 있는 다수의 국외 웹 응용서비스들은 표준화된 사용자 인증방식으로 SAML …
[PDF][PDF] Shepherd: Enabling Large-Scale Scanning of Websites after Social Single Sign-on
Session security for web applications should keep users safe from session hijacking and
ensure privacy and security in their online lives. A substantial part of their online lives are …
ensure privacy and security in their online lives. A substantial part of their online lives are …