1![A Comprehensive Formal Security Analysis of OAuth 2.0 arXiv:1601.01229v3 [cs.CR] 27 MayDaniel Fett A Comprehensive Formal Security Analysis of OAuth 2.0 arXiv:1601.01229v3 [cs.CR] 27 MayDaniel Fett](https://www.pdfsearch.io/img/332e30545ccad976bc805167dbd603fd.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2018-06-14 12:33:34
|
---|
2![What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance January 26, 2018 Submission to March 2018 OAuth Security Workshop at Trento, Italy What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance January 26, 2018 Submission to March 2018 OAuth Security Workshop at Trento, Italy](https://www.pdfsearch.io/img/695ac61f02137e104c49b6cce574d5be.jpg) | Add to Reading ListSource URL: self-issued.info- Date: 2018-01-26 21:54:58
|
---|
3![What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance OAuth Security Workshop, March 2018, Trento, Italy What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance OAuth Security Workshop, March 2018, Trento, Italy](https://www.pdfsearch.io/img/accfe68248d819723ae97cbde5f36b0e.jpg) | Add to Reading ListSource URL: self-issued.info- Date: 2018-03-15 08:13:09
|
---|
4![OAuth User Profile Attack How to Sign into One Billion Mobile App Accounts Effortlessly Ronghai Yang, Prof. Wing Cheong Lau and Tianyu Liu The Chinese University of Hong Kong Nov 4, 2016 OAuth User Profile Attack How to Sign into One Billion Mobile App Accounts Effortlessly Ronghai Yang, Prof. Wing Cheong Lau and Tianyu Liu The Chinese University of Hong Kong Nov 4, 2016](https://www.pdfsearch.io/img/a0e0f7efcda150500511f62067d1b832.jpg) | Add to Reading ListSource URL: www.blackhat.com- Date: 2016-11-30 13:13:22
|
---|
5![Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England](https://www.pdfsearch.io/img/290ea7f662559b7c7dfb0bb7dbbd91c8.jpg) | Add to Reading ListSource URL: ietf.orgLanguage: English - Date: 2014-03-02 06:27:58
|
---|
6![PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders](https://www.pdfsearch.io/img/f3e57faf5c061adf399c8c9d57de9c2b.jpg) | Add to Reading ListSource URL: nccoe.nist.govLanguage: English - Date: 2016-07-28 08:23:01
|
---|
7![Computing / Message-oriented middleware / Inter-process communication / Computer access control / Internet protocols / Middleware / Advanced Message Queuing Protocol / JSON Web Token / Message queue / Security token / OAuth Computing / Message-oriented middleware / Inter-process communication / Computer access control / Internet protocols / Middleware / Advanced Message Queuing Protocol / JSON Web Token / Message queue / Security token / OAuth](/pdf-icon.png) | Add to Reading ListSource URL: www.oasis-open.orgLanguage: English |
---|
8![Cloud identity protocols gateway What is it about? There are a lot of different cloud identity protocols (SAML, OAuth, WS-Federation, etc.) on the market. In this project, Cloud identity protocols gateway What is it about? There are a lot of different cloud identity protocols (SAML, OAuth, WS-Federation, etc.) on the market. In this project,](https://www.pdfsearch.io/img/f40f063eaf8b20a5052bd14eb2181546.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.at- Date: 2015-12-01 04:00:02
|
---|
9![Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein](https://www.pdfsearch.io/img/baddc357da7bf33cff8e217fdb479cff.jpg) | Add to Reading ListSource URL: norbert-pohlmann.comLanguage: English - Date: 2015-11-20 14:35:18
|
---|
10![Salesforce Integration User Guide | Version 1.1 Salesforce Integration User Guide | Version 1.1](https://www.pdfsearch.io/img/69539abf09996762ede059860733ce6d.jpg) | Add to Reading ListSource URL: cdn.vanillaforums.comLanguage: English - Date: 2015-12-10 12:30:40
|
---|