OAuth

Results: 220



#Item
31User-centered Security Management of API-based Data Integration Workflows

User-centered Security Management of API-based Data Integration Workflows

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-05-12 06:20:07
32Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov  Jörg Schwenk

Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-04-20 11:46:50
33Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – Multi-connection and authentication

Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – Multi-connection and authentication

Add to Reading List

Source URL: www.mediascapeproject.eu

Language: English - Date: 2015-11-20 12:57:38
34The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley  ABSTRACT

The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

Add to Reading List

Source URL: npdoty.name

Language: English - Date: 2014-03-25 02:38:49
35GoCoin: Merchant integration guide More information can be found at help.gocoin.com Preface This guide is intended for Merchants who wish to use the GoCoin API to accept and process payments in Cryptocurrency. Depending

GoCoin: Merchant integration guide More information can be found at help.gocoin.com Preface This guide is intended for Merchants who wish to use the GoCoin API to accept and process payments in Cryptocurrency. Depending

Add to Reading List

Source URL: www.gocoin.com

Language: English - Date: 2015-03-17 19:42:54
36Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London  This paper is included in the Proceedings of

Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

Add to Reading List

Source URL: www.defensivejs.com

Language: English - Date: 2013-08-15 09:17:30
37Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May

Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May

Add to Reading List

Source URL: www.xmlgrrl.com

Language: English - Date: 2012-11-17 22:42:46
38Identity Management Hannes Tschofenig Motivation • OAuth was created to allow secure and privacy friendly sharing of data.

Identity Management Hannes Tschofenig Motivation • OAuth was created to allow secure and privacy friendly sharing of data.

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-03-25 19:14:39
    39Computer access control / Computing / Computer security / OAuth / Authorization / HTTP cookie / Session / Web application / One-time authorization code / User-Managed Access

    Authorization and Bulk Transfer in Green Button Connect My Data:19:22 PM Table of Contents Table of Contents ii Table of Figures iii

    Add to Reading List

    Source URL: osgug.ucaiug.org

    Language: English - Date: 2015-07-27 21:23:51
    40Application Impersonation: Problems of OAuth and API Design in Online Social Networks Pili Hu1 , Ronghai Yang1 , Yue Li2 and Wing Cheong Lau1 1  Department of Information Engineering, The Chinese University of Hong Kong

    Application Impersonation: Problems of OAuth and API Design in Online Social Networks Pili Hu1 , Ronghai Yang1 , Yue Li2 and Wing Cheong Lau1 1 Department of Information Engineering, The Chinese University of Hong Kong

    Add to Reading List

    Source URL: cosn.acm.org

    Language: English - Date: 2014-09-11 04:01:07