OAuth

Results: 220



#Item
1Computer access control / Computer security / Identity management / Federated identity / Cloud standards / OAuth / Identity provider / OpenID / Single sign-on / Authentication / Relying party / SAML-based products and services

A Comprehensive Formal Security Analysis of OAuth 2.0 arXiv:1601.01229v3 [cs.CR] 27 MayDaniel Fett

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-06-14 12:33:34
2

What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance January 26, 2018 Submission to March 2018 OAuth Security Workshop at Trento, Italy

Add to Reading List

Source URL: self-issued.info

- Date: 2018-01-26 21:54:58
    3

    What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance OAuth Security Workshop, March 2018, Trento, Italy

    Add to Reading List

    Source URL: self-issued.info

    - Date: 2018-03-15 08:13:09
      4

      OAuth User Profile Attack How to Sign into One Billion Mobile App Accounts Effortlessly Ronghai Yang, Prof. Wing Cheong Lau and Tianyu Liu The Chinese University of Hong Kong Nov 4, 2016

      Add to Reading List

      Source URL: www.blackhat.com

      - Date: 2016-11-30 13:13:22
        5Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

        Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

        Add to Reading List

        Source URL: ietf.org

        Language: English - Date: 2014-03-02 06:27:58
        6Computer access control / Computer security / Computing / Single sign-on / Multi-factor authentication / Authentication / OAuth / Mobile app / Electronic authentication / Accounts & SSO

        PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders

        Add to Reading List

        Source URL: nccoe.nist.gov

        Language: English - Date: 2016-07-28 08:23:01
        7Computing / Message-oriented middleware / Inter-process communication / Computer access control / Internet protocols / Middleware / Advanced Message Queuing Protocol / JSON Web Token / Message queue / Security token / OAuth

        Advanced Message Queuing Protocol (AMQP) Claims-based Security Version 1.0 Working DraftAugust 2013

        Add to Reading List

        Source URL: www.oasis-open.org

        Language: English
        8

        Cloud identity protocols gateway What is it about? There are a lot of different cloud identity protocols (SAML, OAuth, WS-Federation, etc.) on the market. In this project,

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        - Date: 2015-12-01 04:00:02
          9Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

          Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

          Add to Reading List

          Source URL: norbert-pohlmann.com

          Language: English - Date: 2015-11-20 14:35:18
          10Computing / Software / Salesforce.com / Vanilla Forums / OAuth / Document management systems

            Salesforce Integration User Guide | Version 1.1    

          Add to Reading List

          Source URL: cdn.vanillaforums.com

          Language: English - Date: 2015-12-10 12:30:40
          UPDATE