Academic literature on the topic 'Google OAuth'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Google OAuth.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Google OAuth"

1

Srikanth, V., Jupalli Sneha Latha, Dinne Ajay Kumar, and Kakarla Uma Maheswari. "A survey on OAUTH protocol for security." International Journal of Engineering & Technology 7, no. 1.1 (2017): 692. http://dx.doi.org/10.14419/ijet.v7i1.1.10834.

Full text
Abstract:
Web is a dangerous place. For each administration, each API’s, there are clients who might love simply to get through the different layers of security you've raised. It is one of the most powerful open standard authorization protocols available to all API developers today. Most of the popular social network API’s like Google, Twitter and Facebook uses OAuth 2.0 protocol to intensify user experience while sign-ing-on and social sharing. The code written for authorization may be leaked during transmission which then may lead to misuse. This paper uses an attacker model to study the security vuln
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Dr C. Srinivasa. "A Novel Approach in Developing a Web Application for Food Delivery System Along with Nutritional Tracking." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50036.

Full text
Abstract:
Abstract—This paper introduces a full-stack web application that seamlessly merges food delivery and nutrition tracking, providing a unified platform for modern dietary needs. The system allows users to place orders from a variety of restaurants while concurrently logging their nutritional intake. Unlike existing solutions, this application provides real-time macronutrient analysis of ordered meals. Built with Flask, MySQL, and Google OAuth 2.0, the backend handles user management, dynamic content rendering, and secure authentication. The frontend employs HTML, JavaScript for an interactive an
APA, Harvard, Vancouver, ISO, and other styles
3

Musliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.

Full text
Abstract:
Abstract : Google Apps is a service provided by Google that allows users to use Google products with their own domain names. Among the products offered by Google Apps are email (Gmail), Docs (Google Drive), and Classroom services. In addition, Google Apps also provides Application Programming Interface (API) services that can be used by developers to take advantage of various features provided by Google. Universitas Ubudiyah Indonesia (UUI) is one of the universities that use Google Apps service for managing student emails. At present, UUI student email management through Google Apps is still
APA, Harvard, Vancouver, ISO, and other styles
4

Ferry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.

Full text
Abstract:
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard wa
APA, Harvard, Vancouver, ISO, and other styles
5

Chirag, Amrutlal Pethad. "How to Subscribe to Google Pub/Sub Topic from Salesforce using Pull Mechanism with Apex." Journal of Scientific and Engineering Research 7, no. 3 (2020): 318–23. https://doi.org/10.5281/zenodo.13753514.

Full text
Abstract:
The document outlines the integration of Google Cloud Pub/Sub with Salesforce using a push mechanism. Key steps include setting up a Pub-Sub topic and subscription, creating an Apex REST service in Salesforce to handle incoming messages, and implementing OAuth 2.0 for secure authentication. It emphasizes security considerations, testing, and best practices for error handling and scalability, ultimately enhancing Salesforce applications' responsiveness and reliability through real-time messaging.
APA, Harvard, Vancouver, ISO, and other styles
6

Radivilova, Tamara, Lyudmyla Kirichenko, Vadym Pantelieiev, Artem Mazepa, and Volodymyr Bilodid. "Analysis of authentication methods for full-stack applications and implementation of a web application with an integrated authentication system." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 3 (29) (September 30, 2024): 76–90. http://dx.doi.org/10.30837/2522-9818.2024.3.076.

Full text
Abstract:
The subject of research is methods and techniques for secure user authentication in web applications. The goal of the work is to analyse authentication methods and implement a web application with an authentication system integrating JWT tokens and the OAuth v2.0 standard. The article solves the tasks of analysis of the main protocols and methods of user authentication in web applications, implementation of authentication based on the OAuth 2.0 standard and JWT access/refresh token, and analysis of the risks of vulnerabilities and attacks for the implemented web applications. Methods used: com
APA, Harvard, Vancouver, ISO, and other styles
7

Kishore, Rhythm. "Gradlink Connect." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49313.

Full text
Abstract:
Abstract— In this paper, we present GradLink, an innovative and scalable web-based networking platform developed to enhance engagement between undergraduate students and alumni. The system facilitates seamless, real-time interaction that supports mentorship, career development, and collaborative learning. GradLink provides a feature-rich environment that promotes meaningful networking through department-specific communities, academic background filters, and personalized suggestions based on user interests. The platform is equipped with a multilingual interface, allowing accessibility for users
APA, Harvard, Vancouver, ISO, and other styles
8

Prof., V. V. Jikar Mr. Rahul Bansod Mr. Dipak Raosaheb Mr. Lokeshwar Vairagade Mr. Rupesh chopde Mr. Vishal Goupale. "Drive Resume: Customized Web Application for Attractive CV Creation Using AI." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 124–27. https://doi.org/10.5281/zenodo.15411367.

Full text
Abstract:
This paper provides Job seekers need effective tools to create, manage, and distribute professional resumes in the current digital era. The Drive Resume Builder is an online tool that integrates with Google Drive to make resume creation and storage easier. Utilizing React.js for front-end development, Node.js with Express for back-end processing, Firebase for authentication, and Google Drive API for smooth document storage and retrieval, this project makes use of these technologies. With the help of the system's numerous editable resume templates, users can enter their information in a dynamic
APA, Harvard, Vancouver, ISO, and other styles
9

Corre, Kevin, Olivier Barais, Gerson Sunyé, Vincent Frey, and Jean-Michel Crom. "Why can’t users choose their identity providers on the web?" Proceedings on Privacy Enhancing Technologies 2017, no. 3 (2017): 75–89. http://dx.doi.org/10.1515/popets-2017-0029.

Full text
Abstract:
Abstract Authentication delegation is a major function of the modern web. Identity Providers (IdP) acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue tha
APA, Harvard, Vancouver, ISO, and other styles
10

KRISHNAN P, ADITHYA, and ABHINAV S. "Community Crime Reporting and Alert System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44332.

Full text
Abstract:
The Community Crime Reporting and Alert System is a web-based application designed to facilitate real-time crime reporting and awareness through modern web technologies. Built using HTML, CSS, JavaScript (React.js or Vue.js for frontend), and Node.js with Express.js for backend, the system ensures a seamless user experience. It employs MongoDB or MySQL as the database to store user reports, authentication details, and crime statistics securely. The system supports user authentication (JWT or OAuth 2.0), allowing registered users to report crimes while also providing an option for anonymous sub
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Google OAuth"

1

Mancuso, Antonio. "Sistema di fatturazione collegato a Google Drive." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6601/.

Full text
Abstract:
L'obbiettivo della tesi è quello di sviluppare una semplice web application per la creazione di fatture. La caratteristica principale è l'integrazione delle funzionalità di Google Drive permettendo all'utente di archiviare e condividere con pochi click le fatture con i clienti. L'utente potrà creare, personalizzare, salvare, archiviare e condividere le proprie ricevute in tempo reale. In questo documento verrà analizzato il processo di sviluppo del software che comprenderà: analisi dei requisiti, progettazione, sviluppo (scelte implementative), test e sviluppi futuri. Verranno anche docume
APA, Harvard, Vancouver, ISO, and other styles
2

Josefsson, Ågren Fredrik, and Oscar Järpehult. "Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178035.

Full text
Abstract:
Third-party authentication services are becoming more common since it eases the login procedure by not forcing users to create a new login for every website thatuses authentication. Even though it simplifies the login procedure the users still have to be conscious about what data is being shared between the identity provider (IDP) and the relying party (RP). This thesis presents a tool for collecting data about third-party authentication that outperforms previously made tools with regards to accuracy, precision and recall. The developed tool was used to collect information about third-party au
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Google OAuth"

1

Bihis, Charles. Mastering OAuth 2. 0: Create Powerful Applications to Interact with Popular Service Providers Such As Facebook, Google, Twitter, and More by Leveraging the OAuth 2. 0 Authorization Framework. Packt Publishing, Limited, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Google OAuth"

1

Prakash, Vijay, Kirtan Dua, Lalit Garg, and Varun Shukla. "Web Application Authentication Using Google OAuth, Express, and MongoDB." In Cryptology and Network Security with Machine Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0641-9_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trung, Hung Nguyen, Quang Khanh Le, Tieu My Lam, Kim Duy Vu, and Le The Dung. "EcoSentry: A Cost-Effective IoT System for Efficient Real-Time Forest Monitoring." In Lecture Notes in Mechanical Engineering. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-93891-7_17.

Full text
Abstract:
Abstract Nowadays, climate change is a severe issue that is attracting global attention. Effective forest monitoring is vital among various methods to cope with climate change. Unfortunately, current approaches to forest monitoring are costly and sophisticated, making them difficult to apply widely or affordable for developing countries. In this paper, we propose a cost-effective Internet of Things (IoT) system called EcoSentry, which is low-cost and straightforward but still provides reasonably accurate, real-time data for efficient forest monitoring. The proposed system is comprised of two m
APA, Harvard, Vancouver, ISO, and other styles
3

Muñoz Domínguez, Miguel Omar, and Nydia Leticia Olvera Castillo. "Google Workspace (Meet y Drive)." In Explorando el aprendizaje digital. Guía de plugins esenciales para Moodle. Astra Ediciones, 2024. http://dx.doi.org/10.61728/ae24320054.

Full text
Abstract:
En el proceso de gestión de un sitio de Moodle, existen diferentes configuraciones para su funcionamiento como servidor de Sistemas Gestores de Aprendizaje (LMS por sus siglas en inglés). Una de ellas es el protocolo de Autorización OAuth 2 (autorización abierta) que habilita a que usuarios puedan ingresar con cuentas de servicios de grandes empresas de tecnología. Esto es, se utiliza para permitir que diversas aplicaciones de terceros accedan a los recursos de un usuario en un servicio en línea, sin que se muestren sus credenciales.
APA, Harvard, Vancouver, ISO, and other styles
4

MacDonald, Scott. "Laura Poitras." In The Sublimity of Document. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190052126.003.0004.

Full text
Abstract:
This is the first career interview with Academy Award–winner, Pulitzer Prize–winner, MacArthur Fellow Laura Poitras, whose shift from cooking to filmmaking brought her first into contact with the avant-garde filmmaking community in the Bay Area, and in particular, with Ernie Gehr; then into contact with Linda Goode Bryant, with whom she made Flag Wars (2003), an Emmy-winning documentary about ethnic collisions in a Columbus, Ohio, neighborhood. Her reaction to the American response to 9/11 instigated her celebrated post-9/11 trilogy of films: My Country, My Country (2006), which explores event
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!