To see the other types of publications on this topic, follow the link: Google OAuth.

Journal articles on the topic 'Google OAuth'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 45 journal articles for your research on the topic 'Google OAuth.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Srikanth, V., Jupalli Sneha Latha, Dinne Ajay Kumar, and Kakarla Uma Maheswari. "A survey on OAUTH protocol for security." International Journal of Engineering & Technology 7, no. 1.1 (2017): 692. http://dx.doi.org/10.14419/ijet.v7i1.1.10834.

Full text
Abstract:
Web is a dangerous place. For each administration, each API’s, there are clients who might love simply to get through the different layers of security you've raised. It is one of the most powerful open standard authorization protocols available to all API developers today. Most of the popular social network API’s like Google, Twitter and Facebook uses OAuth 2.0 protocol to intensify user experience while sign-ing-on and social sharing. The code written for authorization may be leaked during transmission which then may lead to misuse. This paper uses an attacker model to study the security vuln
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Dr C. Srinivasa. "A Novel Approach in Developing a Web Application for Food Delivery System Along with Nutritional Tracking." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50036.

Full text
Abstract:
Abstract—This paper introduces a full-stack web application that seamlessly merges food delivery and nutrition tracking, providing a unified platform for modern dietary needs. The system allows users to place orders from a variety of restaurants while concurrently logging their nutritional intake. Unlike existing solutions, this application provides real-time macronutrient analysis of ordered meals. Built with Flask, MySQL, and Google OAuth 2.0, the backend handles user management, dynamic content rendering, and secure authentication. The frontend employs HTML, JavaScript for an interactive an
APA, Harvard, Vancouver, ISO, and other styles
3

Musliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.

Full text
Abstract:
Abstract : Google Apps is a service provided by Google that allows users to use Google products with their own domain names. Among the products offered by Google Apps are email (Gmail), Docs (Google Drive), and Classroom services. In addition, Google Apps also provides Application Programming Interface (API) services that can be used by developers to take advantage of various features provided by Google. Universitas Ubudiyah Indonesia (UUI) is one of the universities that use Google Apps service for managing student emails. At present, UUI student email management through Google Apps is still
APA, Harvard, Vancouver, ISO, and other styles
4

Ferry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.

Full text
Abstract:
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard wa
APA, Harvard, Vancouver, ISO, and other styles
5

Chirag, Amrutlal Pethad. "How to Subscribe to Google Pub/Sub Topic from Salesforce using Pull Mechanism with Apex." Journal of Scientific and Engineering Research 7, no. 3 (2020): 318–23. https://doi.org/10.5281/zenodo.13753514.

Full text
Abstract:
The document outlines the integration of Google Cloud Pub/Sub with Salesforce using a push mechanism. Key steps include setting up a Pub-Sub topic and subscription, creating an Apex REST service in Salesforce to handle incoming messages, and implementing OAuth 2.0 for secure authentication. It emphasizes security considerations, testing, and best practices for error handling and scalability, ultimately enhancing Salesforce applications' responsiveness and reliability through real-time messaging.
APA, Harvard, Vancouver, ISO, and other styles
6

Radivilova, Tamara, Lyudmyla Kirichenko, Vadym Pantelieiev, Artem Mazepa, and Volodymyr Bilodid. "Analysis of authentication methods for full-stack applications and implementation of a web application with an integrated authentication system." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 3 (29) (September 30, 2024): 76–90. http://dx.doi.org/10.30837/2522-9818.2024.3.076.

Full text
Abstract:
The subject of research is methods and techniques for secure user authentication in web applications. The goal of the work is to analyse authentication methods and implement a web application with an authentication system integrating JWT tokens and the OAuth v2.0 standard. The article solves the tasks of analysis of the main protocols and methods of user authentication in web applications, implementation of authentication based on the OAuth 2.0 standard and JWT access/refresh token, and analysis of the risks of vulnerabilities and attacks for the implemented web applications. Methods used: com
APA, Harvard, Vancouver, ISO, and other styles
7

Kishore, Rhythm. "Gradlink Connect." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49313.

Full text
Abstract:
Abstract— In this paper, we present GradLink, an innovative and scalable web-based networking platform developed to enhance engagement between undergraduate students and alumni. The system facilitates seamless, real-time interaction that supports mentorship, career development, and collaborative learning. GradLink provides a feature-rich environment that promotes meaningful networking through department-specific communities, academic background filters, and personalized suggestions based on user interests. The platform is equipped with a multilingual interface, allowing accessibility for users
APA, Harvard, Vancouver, ISO, and other styles
8

Prof., V. V. Jikar Mr. Rahul Bansod Mr. Dipak Raosaheb Mr. Lokeshwar Vairagade Mr. Rupesh chopde Mr. Vishal Goupale. "Drive Resume: Customized Web Application for Attractive CV Creation Using AI." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 124–27. https://doi.org/10.5281/zenodo.15411367.

Full text
Abstract:
This paper provides Job seekers need effective tools to create, manage, and distribute professional resumes in the current digital era. The Drive Resume Builder is an online tool that integrates with Google Drive to make resume creation and storage easier. Utilizing React.js for front-end development, Node.js with Express for back-end processing, Firebase for authentication, and Google Drive API for smooth document storage and retrieval, this project makes use of these technologies. With the help of the system's numerous editable resume templates, users can enter their information in a dynamic
APA, Harvard, Vancouver, ISO, and other styles
9

Corre, Kevin, Olivier Barais, Gerson Sunyé, Vincent Frey, and Jean-Michel Crom. "Why can’t users choose their identity providers on the web?" Proceedings on Privacy Enhancing Technologies 2017, no. 3 (2017): 75–89. http://dx.doi.org/10.1515/popets-2017-0029.

Full text
Abstract:
Abstract Authentication delegation is a major function of the modern web. Identity Providers (IdP) acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue tha
APA, Harvard, Vancouver, ISO, and other styles
10

KRISHNAN P, ADITHYA, and ABHINAV S. "Community Crime Reporting and Alert System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44332.

Full text
Abstract:
The Community Crime Reporting and Alert System is a web-based application designed to facilitate real-time crime reporting and awareness through modern web technologies. Built using HTML, CSS, JavaScript (React.js or Vue.js for frontend), and Node.js with Express.js for backend, the system ensures a seamless user experience. It employs MongoDB or MySQL as the database to store user reports, authentication details, and crime statistics securely. The system supports user authentication (JWT or OAuth 2.0), allowing registered users to report crimes while also providing an option for anonymous sub
APA, Harvard, Vancouver, ISO, and other styles
11

Todingbua, Devylia, and Nina Setiyawati. "Pengintegrasian Penyimpanan Google Drive Pada Pembangunan Aplikasi Monitoring Project Menggunakan pyDrive." JURIKOM (Jurnal Riset Komputer) 9, no. 4 (2022): 800. http://dx.doi.org/10.30865/jurikom.v9i4.4452.

Full text
Abstract:
In a company that works on many projects, a system that can be used to monitor progress is needed. Monitoring is an assessment activity that is carried out continuously to see the progress of a task. Monitoring is important to make sure the project that is being carried out can run well. In this research, a Monitoring Project application was built using the Agile Software Development method. The application is made to make data managing and progress monitoring easier. In addition, a feature will be added to store and share project file access rights to the team members so that the files relate
APA, Harvard, Vancouver, ISO, and other styles
12

Triveni, Gedela. "AI PLACE FINDER." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48026.

Full text
Abstract:
Abstract The AI Place Finder is a web application built on top of the MERN stack (MongoDB, Express. js, React. js, Node. js) which simplifies and personalizes travel planning by using Artificial Intelligence and real-time data. It requires users to input their preferences (like where to go, how many people will be with you and what the budget will be), and is based on the Gemini AI API. With the help of one’s preferences in order to show the most appropriate places to visit, the app makes recommending travel destinations easier and more personal. In addition, the app integrates with Google Map
APA, Harvard, Vancouver, ISO, and other styles
13

Kurniawan, Wawan, Ifan Prihandi, and Nurullah Husufa. "PROTOTYPE FIREBASE AUTHENTICATION MENGGUNAKAN FITUR FIREBASE PADA APLIKASI ANDROID." JURNAL SATYA INFORMATIKA 4, no. 1 (2023): 71–78. http://dx.doi.org/10.59134/jsk.v4i1.406.

Full text
Abstract:
Mengembangkan sistem otentikasi untuk aplikasi merupakan suatu hal yang relatif sulit. Akan tetapi, para developer tidak memiliki pilihan selain untuk melakukannya, dan harus siap dengan segala konsekuensi jika terjadi sebuah kesalahan dalam pembangunan sistem tersebut. Selain itu, belum terdapat perusahaan yang mau membayar pajak dan membangun aplikasi hanya untuk membuat sebuah sistem login yang baik. Firebase Authentication menawarkan kemudahan untuk para developer dalam membangun aplikasi yang memiliki proses masuk ke akun tanpa perlu mengerti permasalahan kompleks yang terjadi dibelakang
APA, Harvard, Vancouver, ISO, and other styles
14

Носко, C. В., С. С. Бульба, О. В. Коломійцев, Д. О. Лисиця та Г. І. Молчанов. "ПРОПОЗИЦІЇ ЩОДО АВТОРИЗАЦІЇ В САЙДКАР КОМПОНЕНТІ МІКРОСЕРВІСНОЇ АРХІТЕКРУРИ". Системи управління, навігації та зв’язку. Збірник наукових праць 1, № 79 (2025): 116–23. https://doi.org/10.26906/sunz.2025.1.116-123.

Full text
Abstract:
У статті розроблено пропозиції щодо доцільності реалізації авторизації у сайдкар компоненті мікросервісу, що дозволяє відокремити бізнес-логіку від завдань авторизації, ведення журналів, кешування тощо. Така реалізація дозволяє основним бізнес-модулям залишатися сфокусованими виключно на своїй бізнес-логіці, змінюючись лише тоді, коли є оновлення у бізнес-процедурах, а задачі, які є загальними майже для будь-якого сучасного рішення,передавати допоміжним компонентам таким як сайдкар. Правильна реалізація авторизації виступає ключовим аспектом будь-якої системи, є дуже важливим та вимагає врахув
APA, Harvard, Vancouver, ISO, and other styles
15

Mohammed Mudassir and Mohammed Mushtaq. "The role of APIs in modern software development." World Journal of Advanced Engineering Technology and Sciences 13, no. 1 (2024): 1045–47. http://dx.doi.org/10.30574/wjaets.2024.13.1.0515.

Full text
Abstract:
Application Programming Interfaces (APIs) play a critical role in modern software development, enabling seamless communication between disparate systems and enhancing the scalability, modularity, and security of applications. This research investigates the impact of APIs on software architecture, focusing on their use in facilitating interoperability across distributed environments. Using a mixed-methods approach, the study combines a literature review, a survey of 50 software developers, and case studies from industry leaders such as Amazon Web Services (AWS), Google, and Facebook. The findin
APA, Harvard, Vancouver, ISO, and other styles
16

Jayasiri K.C.N., Thathsarani W.R.V.K., De Silva D.I., and Vidhanaarachchi S. "Design and Implementation of an Automated Hospital Management System with MERN Stack." International Journal of Engineering and Management Research 12, no. 5 (2022): 197–202. http://dx.doi.org/10.31033/ijemr.12.5.24.

Full text
Abstract:
A hospital is a place that needs more effective and efficient management of information, people, and assets. This paper demonstrates the design and implementation of an autonomous system with mern stack that can manage doctor information, patient information, inventory information, and administrative functionalities in a hospital environment. This was written with the intention of eliminating the problems of manual hospital management systems such as data redundancy, data inaccuracy, poor accesibility and lack of data security. The paper addressed the problems of time consumption of storing, r
APA, Harvard, Vancouver, ISO, and other styles
17

R. Chinchwadkar, Piyush Wagh, Roshan Suryawanshi, and Amanpreet Ruppyal. "Analyzing Results using Machine Learning Techniques." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 865–68. https://doi.org/10.47392/irjaeh.2025.0123.

Full text
Abstract:
"Analyzing results using machine Learning techniques" is an innovative, web-based platform designed to transform the management and analysis of academic results in engineering institutions through advanced machine learning algorithms. This project integrates modern front-end technologies with a robust Flask back-end and a PostgreSQL database, ensuring a secure, scalable, and user-friendly system. At its core, the platform features dual access portals tailored for both students and staff. Students can easily retrieve their examination results by entering their unique PRN number, while staff mem
APA, Harvard, Vancouver, ISO, and other styles
18

Schmitz, Guido. "Privacy-preserving Web single sign-on: Formal security analysis and design." it - Information Technology 64, no. 1-2 (2022): 43–48. http://dx.doi.org/10.1515/itit-2022-0003.

Full text
Abstract:
Abstract Single sign-on (SSO) systems, such as OpenID and OAuth, allow Web sites to delegate user authentication to third parties, such as Facebook or Google. These systems provide a convenient mechanism for users to log in and ease the burden of user authentication for Web sites. Conversely, by integrating such SSO systems, they become a crucial part of the security of the modern Web. So far, it has been hard to prove if Web standards and protocols actually meet their security goals. SSO systems, in particular, need to satisfy strong security and privacy properties. In this thesis, we develop
APA, Harvard, Vancouver, ISO, and other styles
19

JASMEET, SINGH, and KUMAR PURWAR RAVINDRA. "RESTFUL COMMUNICATION APPROACH." IJIERT - International Journal of Innovations in Engineering Research and Technology 5, no. 6 (2018): 1–10. https://doi.org/10.5281/zenodo.1445473.

Full text
Abstract:
<strong>There are devices performing various function s and providing services to other devices. These devices provide output in various formats like xml,html,csv,pdf etc. It becomes difficult to parse this data into required format as it requires extra overhead.To send th is data we are considering two options namely SOAP services or RESTful Services. RESTful services are replacing SOAP services because of their various advantages described further in this paper,So to provide the interoperability between devices we sugges t to use RESTful webservices s using json as output . REST is an archit
APA, Harvard, Vancouver, ISO, and other styles
20

Ike, Joy Ezinwanneamaka, Joseph Darko Kessie, Henry Emenike Okaro, Enuma Ezeife, and Tolulope Onibokun. "Identity and Access Management in Cloud Storage: A Comprehensive Guide." International Journal of Multidisciplinary Research and Growth Evaluation. 6, no. 2 (2025): 245–52. https://doi.org/10.54660/.ijmrge.2025.6.2.245-252.

Full text
Abstract:
With the growing adoption of cloud storage, ensuring data security and regulatory compliance has become a critical challenge for organizations. Identity and Access Management (IAM) plays a fundamental role in protecting cloud-based resources by providing authentication, authorization, and monitoring capabilities. This comprehensive guide explores the key principles, technologies, and best practices of IAM in cloud storage environments, addressing modern security threats and compliance requirements. The review outlines core IAM components, including Role-Based Access Control (RBAC), Attribute-B
APA, Harvard, Vancouver, ISO, and other styles
21

M, Ashwini, and Viraj Ray. "BlogGen AI: An AI-Powered Blogging Platform for Automated Content Creation." International Journal of Innovative Research in Information Security 11, no. 02 (2025): 59–69. https://doi.org/10.26562/ijiris.2025.v1102.01.

Full text
Abstract:
In the digital age, content creation plays a pivotal role in communication, education, marketing, and brand development. Blogs, in particular, are powerful mediums for sharing knowledge, building communities, and improving online visibility. However, the traditional process of blog writing is time-consuming, mentally taxing, and often inconsistent in tone, quality, and SEO relevance. These challenges are particularly evident for individuals and businesses who lack dedicated content teams or professional writing experience. This paper introduces BlogGenAI, an intelligent, AI-powered blogging pl
APA, Harvard, Vancouver, ISO, and other styles
22

Maulana Zakaria, Danu, and Fitrah Satrya Fajar Kusumah. "Implementation of Web Service Security Using Oauth2 in the Financial Facility Search System." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, no. 2 (2022): 114. http://dx.doi.org/10.32832/inova-tif.v5i2.8506.

Full text
Abstract:
&lt;p&gt;Implementation Of Web Service Security Using Oauth2 In Financial Facility Search System. The financial facility search system is an application that makes it easier for people to find the nearest financial facility. A similar application is Google maps which have been widely used to search for financial facilities, but for completeness of information and features, it is incomplete. So financial institutions need applications that can manage data on their financial facilities without other vendor intermediaries. This financial facility search system will be built on a mobile platform a
APA, Harvard, Vancouver, ISO, and other styles
23

Adabala, N.V.V. Veerraju, Divya Jyothi Telagareddy, Narayana Rao Boda, and Acharya Anand. "Does Cadaveric Oath Influence the Mind-Set of the First Year Medical Students? A Study in Andhra Pradesh, India." International Journal of Pharmaceutical and Clinical Research 15, no. 3 (2023): 738–43. https://doi.org/10.5281/zenodo.12705036.

Full text
Abstract:
<strong>Background:&nbsp;</strong>Cadaveric oath is a pledge taken by the first year MBBS students on the first day of their anatomy dissection to pay respects to the human remains which remain as their mentor throughout their course. The objective of the study is to assess the influence of the cadaveric oath on the first MBBS students.&nbsp;<strong>Materials and Methods:&nbsp;</strong>This study would be conducted in the Department of Anatomy, KIMS and RF, Amalapuram after obtaining IEC (Institutional Ethical Committee) clearance. Data is collected by using predesigned semistructured question
APA, Harvard, Vancouver, ISO, and other styles
24

Nabila, Alya, Ferryal Basbeth, and Firman Arifandi. "Analisa Kedudukan Pemberian Kesaksian Palsu Terhadap Proses Ilmu Forensik dan Tinjauannya Menurut Hukum Islam." COMSERVA Indonesian Jurnal of Community Services and Development 2, no. 11 (2023): 2429–40. http://dx.doi.org/10.59141/comserva.v2i11.645.

Full text
Abstract:
Forensics means taking something to court. This term is commonly used in medicine. Is a scientific process (based on knowledge) in the analysis, collection and presentation of various evidence in the process related to litigation and collection, physical evidence found at the TKP (Case Incident) and then presented in court. False testimony is a statement given by a witness under oath where the contents of the statement contain a meaning that is not in accordance with the truth, in other words, the statement is a lie or fake. Statements whose content is false do not have to be entirely false, b
APA, Harvard, Vancouver, ISO, and other styles
25

Гайтан, О. М., та І. В. Снитка. "ІНТЕГРОВАНІ ПЛАТФОРМИ ДЛЯ АВТОМАТИЗАЦІЇ ОСОБИСТОГО ФІНАНСОВОГО ОБЛІКУ НА ОСНОВІ ЧАТ-БОТІВ ТА ХМАРНИХ ТЕХНОЛОГІЙ". Systems and Technologies 69, № 1 (2025): 58–70. https://doi.org/10.32782/2521-6643-2025-1-69.7.

Full text
Abstract:
У контексті зростаючої складності фінансових процесів та потреби в ефективному управлінні особистими фінансами віртуальні персональні фінансові асистенти стають важливими інструментами для тих, хто шукає зручні способи відслідковування, управління та аналізу своїх фінансів. З поширенням смартфонів та хмарних технологій набувають популярності автоматизовані фінансові рішення, які допомагають користувачам у веденні бюджету, відслідковуванні витрат та прийнятті фінансових рішень. Це дослідження аналізує концептуальні та практичні аспекти розробки віртуального персонального фінансового асистента,
APA, Harvard, Vancouver, ISO, and other styles
26

Weitzel, Derek, Brian Bockelman, Jim Basney, Todd Tannenbaum, Zach Miller, and Jeff Gaynor. "Capability-Based Authorization for HEP." EPJ Web of Conferences 214 (2019): 04014. http://dx.doi.org/10.1051/epjconf/201921404014.

Full text
Abstract:
Outside the HEP computing ecosystem, it is vanishingly rare to encounter user X509 certificate authentication (and proxy certificates are even more rare). The web never widely adopted the user certificate model, but increasingly sees the need for federated identity services and distributed authorization. For example, Dropbox, Google and Box instead use bearer tokens issued via the OAuth2 protocol to authorize actions on their services. Thus, the HEP ecosystem has the opportunity to reuse recent work in industry that now covers our needs. We present a token-based ecosystem for authorization tai
APA, Harvard, Vancouver, ISO, and other styles
27

Yogaswara, Andrey Satwika, Disman Disman, Eeng Ahman, and Nugraha Nugraha. "Kinerja Dilihat dari Perspektif Kepemimpinan Militer dan Budaya Organisasi." Image : Jurnal Riset Manajemen 11, no. 2 (2023): 142–51. http://dx.doi.org/10.17509/image.2023.013.

Full text
Abstract:
This study aims to determine the role of military leadership and organizational culture on leaders' performance in the TNI AD Military Police unit. The approach used is descriptive verification with multiple regression methods. The population in the study were 69 POMDAM and DENPOM commanders throughout Indonesia. Data collection used a questionnaire distributed via google forms in one data collection (cross-sectional method). Military leadership variables are measured by task-oriented, relationship-oriented, change-oriented, and external dimensions. Organizational culture variables are measure
APA, Harvard, Vancouver, ISO, and other styles
28

Nikmah, Novia Faqihatun. "Makna Sumpah Pemuda bagi Pelajar MAN 2 Surakarta: Analisis Impresi Buku Teks Sejarah SMA Kelas XI Kurikulum 2013 Revisi." Historiography 1, no. 4 (2021): 487. http://dx.doi.org/10.17977/um081v1i42021p487-493.

Full text
Abstract:
This study aims to determine the conclusions of the analysis and conditions of the Youth Pledge material in the Indonesian History textbook for SMA class XI semester 1 of the 2013 Revised 2017 curriculum used in learning at MAN 2 Surakarta. Another goal is to find out the understanding of students in interpreting a Youth Pledge after learning related to youth oath material in the Indonesian History textbook for SMA class XI semester 1 of the 2013 Revision of the 2017 curriculum. Indonesia SMA class XI semester 1 2013 Revised 2017 curriculum in this study in compiling articles using qualitative
APA, Harvard, Vancouver, ISO, and other styles
29

May, Rhenna, Yoga Wahyu Ferniawan, and Debi Setiawati. "Relevansi Makna Sumpah Pemuda Dalam Menumbuhkan Semangat Nasionalisme." Puteri Hijau : Jurnal Pendidikan Sejarah 8, no. 2 (2023): 184. https://doi.org/10.24114/ph.v8i2.47164.

Full text
Abstract:
Sumpah Pemuda was read on October 28, 1928, as the final result of the Second Indonesian Youth Congress meeting, which until now is usually commemorated every year with the birth of Sumpah Pemuda,, which is one of the important milestones in the history of the Indonesian nation's struggle. In the current era, what role does the meaning of the youth oath play in fostering the spirit of nationalism? Where nationalism itself is a manifestation of his love for his own country. This article was created to find out what the relevance of the meaning of the youth oath is in fostering a spirit of natio
APA, Harvard, Vancouver, ISO, and other styles
30

Nigusie, Adane, Berhanu F. Endehabtu, Dessie Abebaw Angaw, et al. "Status of Compassionate, Respectful, and Caring Health Service Delivery: Scoping Review." JMIR Human Factors 9, no. 1 (2022): e30804. http://dx.doi.org/10.2196/30804.

Full text
Abstract:
Background A compassionate, respectful, and caring (CRC) health professional is very important for human-centered care, serving clients ethically and with respect, adhering to the professional oath, and serving as a model for young professionals. As countries try to achieve universal health coverage (UHC), quality delivery of health services is crucial. CRC health care is an initiative around the need to provide quality care services to clients and patients. However, there is an evidence gap on the status of CRC health care service delivery. Objective This scoping review aimed to map global ev
APA, Harvard, Vancouver, ISO, and other styles
31

Senapartha, I. Kadek Dendy. "Implementasi Single Sign-On Menggunakan Google Identity, REST dan OAuth 2.0 Berbasis Scrum." Jurnal Teknik Informatika dan Sistem Informasi 7, no. 2 (2021). http://dx.doi.org/10.28932/jutisi.v7i2.3437.

Full text
Abstract:
Single Sign-On (SSO) is a technology that can support user convenience in accessing a system. By using SSO, a user only needs to authenticate once to get access to a system. OAuth 2.0 is one of the protocols that can be implemented on the SSO system. Currently, many Application Service Providers (ASP) support the OAuth 2.0 protocol thus providing convenience in the development of a more standard SSO system. Google Identity is one of the services provided by Google that can be used to build SSO systems using the OAuth 2.0 protocol. Application of the request and response methods provided by the
APA, Harvard, Vancouver, ISO, and other styles
32

Azzahra, Fathya Fathimah, Balqis Rosa Sekamayang, and Roni Habibi. "KosConnect dengan Metode Google OAuth dan Payment Gateway Midtrans." Jurnal PROCESSOR 20, no. 1 (2025). https://doi.org/10.33998/processor.2025.20.1.2185.

Full text
Abstract:
KosConnect adalah aplikasi inovatif yang memfasilitasi pencarian, pemesanan, dan pembayaran kos secara digital. Dengan meningkatnya permintaan kos-kosan serta tantangan dalam akses informasi yang efisien, KosConnect hadir dengan mengintegrasikan teknologi modern seperti Google OAuth dan Midtrans untuk meningkatkan pengalaman pengguna. Google OAuth digunakan sebagai metode autentikasi Single Sign-On (SSO) yang lebih praktis, sementara Midtrans sebagai payment gateway mendukung transaksi digital yang aman dan cepat. Aplikasi ini dikembangkan menggunakan bahasa pemrograman Go dan basis data Mongo
APA, Harvard, Vancouver, ISO, and other styles
33

Selvam, P. Arul. "Secure Cloud Services by Integrating CASB Based Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 04, no. 04 (2022). http://dx.doi.org/10.55041/ijsrem15210.

Full text
Abstract:
In the last decades, cloud computing has attracted much attention in business, as it provides numerous computing functions (e.g., Software-as-a- Service (SaaS), Platform as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS). Shadow IT refers to the use of cloud apps and services without the explicit approval of IT. Early on, the practice was one of the main drivers of Cloud Access Security Broker (CASB) adoption. There are two risks we found, they are i.) Users typically use unapproved software-as-a- service (SaaS) applications for file sharing, social media, collaboration and web confere
APA, Harvard, Vancouver, ISO, and other styles
34

Hwong, Jenko. "Analysing and managing risk from third-party OAuth application access." Cyber Security: A Peer-Reviewed Journal, June 1, 2024. http://dx.doi.org/10.69554/ctvc7675.

Full text
Abstract:
Modern cloud application architectures allow users to dynamically grant third-party apps access to their cloud resources. When looking at a large, anonymised dataset of over 600,000 users and their approvals of over 43,000 applications, we found that organisations often are unaware of the magnitude of the access problems: on average, an organisation will grant 440 unique third-party apps access to Google data and resources; one organisation’s users approved 12,330 unique applications; out of all the approved applications, over 44 per cent have been granted access to either sensitive data or al
APA, Harvard, Vancouver, ISO, and other styles
35

Pethad, Chirag Amrutlal. "Subscribe to Google Pub/Sub Topic from Salesforce using Push Method with Apigee Proxy." Journal of Engineering and Applied Sciences Technology, December 31, 2022, 1–6. http://dx.doi.org/10.47363/jeast/2022(4)e126.

Full text
Abstract:
The document outlines the integration of Google Cloud Pub/Sub with Salesforce using a push mechanism by creating an Apigee Proxy API that subscribes to the Pub/Sub and then publishes the messages to a Salesforce REST Api endpoint. Key steps include setting up a Pub-Sub topic, setting up an Apigee Proxy API, creating an Apex REST service in Salesforce to handle incoming messages and implementing OAuth 2.0 for secure authentication. It emphasizes security considerations, testing, and best practices for error handling and scalability, ultimately enhancing Salesforce applications' responsiveness a
APA, Harvard, Vancouver, ISO, and other styles
36

"Ai and Ml Based Google Assistant for an Organization using Google Cloud Platform and Dialogflow." International Journal of Recent Technology and Engineering 8, no. 5 (2020): 2722–27. http://dx.doi.org/10.35940/ijrte.e6354.018520.

Full text
Abstract:
Many people adopting Smart Assistant Devices such as Google Home. Now a days of solely engaging with a service through a keyboard are over. The new modes of user interaction are aided in part by this research will investigate how advancements in Artificial Intelligence and Machine Learning technology are being used to improve many services. In particular, it will look at the development of google assistants as a channel for information distribution. This project is aimed to implement an android-based chatbot to assist with Organization basic processes, using google tools such as Dialogflow tha
APA, Harvard, Vancouver, ISO, and other styles
37

-, Aditya Panday, Anjali Tiwari -, Santosh kr Shukla -, and Priyanka Gupta -. "Analysis of a Modern Blogging Platform Utilizing Advanced Web Technologies." International Journal For Multidisciplinary Research 6, no. 3 (2024). http://dx.doi.org/10.36948/ijfmr.2024.v06i03.21763.

Full text
Abstract:
This study outlines the architecture and features of SocialB, an advanced blogging platform designed to elevate user experience through cutting-edge web technologies. SocialB harnesses Node.js, Express.js, MongoDB, Mongoose, JWT, Google OAuth 2.0, and Multer to establish a robust, secure, and interactive interface. Key functionalities including user authentication, post creation, commenting, and profile management are meticulously examined. With a focus on seamless user interaction and security, SocialB offers a dynamic environment for content creation and engagement. Through its integration o
APA, Harvard, Vancouver, ISO, and other styles
38

Vira, HARSH, Shubham Yadre -, Azam Ali Shaikh -, Raj Vora -, and Preethi Warrier -. "YouTube Video Manager: A Smart Platform for Efficient Video Upload & Management." International Journal For Multidisciplinary Research 7, no. 2 (2025). https://doi.org/10.36948/ijfmr.2025.v07i02.43208.

Full text
Abstract:
The exponential growth in digital content creation has accentuated the inefficiencies inherent in traditional video file transfers, review processes, and scheduling for YouTube content. Conventional methods such as Google Drive, Dropbox, and email lead to delays, mismanagement, and security concerns. This paper presents the design and implementation of the YouTube Video Manager—an end-to-end platform that automates the video upload, review, approval, and scheduling processes. By integrating AWS S3 for secure storage, OAuth for authentication, and the YouTube API for automated publishing, the s
APA, Harvard, Vancouver, ISO, and other styles
39

-, Dinesh Kumar T., Albert Simion S. -, and Maheswari M. -. "Skill Navigator Application with Proctoring AI." International Journal on Science and Technology 16, no. 2 (2025). https://doi.org/10.71097/ijsat.v16.i2.3961.

Full text
Abstract:
The proposed Skill Navigator Application will provide simplified course enrollment, module navigation, and assessments. This will make sure that learning is effective and structured. It provides role-based access to allow students to enroll in courses, complete video-based modules, and take proctoring-enabled assessments to evaluate knowledge while ensuring exam integrity. Proctoring tool can be linked with google forms or Microsoft forms. It enhances exam integrity by detecting suspicious activities, restricting unauthorized access, and providing detailed reports for administrators. Once a sa
APA, Harvard, Vancouver, ISO, and other styles
40

MBAYDAY, Jacob, and Paul DAYANG. "Predicting a User’s Numeric Identity from the Search of Attribute Data." International Journal of Computer Applications Technology and Research, June 2021, 132–77. http://dx.doi.org/10.7753/ijcatr1006.1007.

Full text
Abstract:
In common Internet environments, most of the websites or services constrain the user account creation. Since the Internet is accessible by all and offers more and more services, a user has several accounts on the web. The difficulty in controlling their accounts does not leave indifferent to the users of the web. Hence the use of easy or insecure passwords. This is why we are victims of attacks and forgetting our passwords. Large companies such as Facebook, Google, etc., offer authorization and authentication mechanisms using the Oauth and OpenID protocol, which requires the opening of an acco
APA, Harvard, Vancouver, ISO, and other styles
41

Naveen, Koka. "Code-Free Data Integration for Comprehensive App Development (COAD)." February 29, 2020. https://doi.org/10.5281/zenodo.11079907.

Full text
Abstract:
The COAD (Comprehensive App Development) is a dynamic platform designed to optimize and streamline the deployment and management of applications within organizational settings. With a focus on customization and user-specific configurations, the COAD empowers users to tailor applications to their unique requirements. The platform supports diverse hosting options, enabling deployment in private or public clouds, including popular providers like AWS, Azure, and Google Cloud. One of the COAD's key features is its robust security infrastructure, which seamlessly integrates with various authenticati
APA, Harvard, Vancouver, ISO, and other styles
42

Prathamesh Giradkar, Nayan Meshram, Aditya Pandilwar, Akash Penliwar, and Prof. Manisha More. "MERN Stack Blood Bank Website." International Journal of Advanced Research in Science, Communication and Technology, December 7, 2023, 375–77. http://dx.doi.org/10.48175/ijarsct-14051.

Full text
Abstract:
This paper is focused on Blood blank and donor management system using modern engineering which is a modern React application named Rudhiram. Rudhiram is a web-based application which creates a link between donor and patients who needs blood. Rudhiram is built on using modern java-script front-end framework React.js, with modern state management tools like Redux and uses Node (Express.js) for back-end with new-age database like MongoDB. Rudhiram provides donors a list of nearby blood camps from its database where a person can schedule a visit and donate blood easily with no paperwork. Rudhiram
APA, Harvard, Vancouver, ISO, and other styles
43

Dominik, Bärlocher. "Oh Twitter, Where Art Thou." scip Labs, May 8, 2014. https://doi.org/10.5281/zenodo.3521302.

Full text
Abstract:
This is the tale of how I got locked out of my Twitter Account. During the digital journey of me trying to get it back, I discovered important safety rules when dealing with Twitter, how their system has security gaps leading to the lockout being useless and how Twitter manages to keep their user numbers growing. So here&rsquo;s an account of how the little blue bird goes about doing things.
APA, Harvard, Vancouver, ISO, and other styles
44

Omisore, Adeleye D., Akinola A. Odedeyi, Olusola C. Famurewa, et al. "Establishing Interventional Radiology in a Low-Resource Setting: Lessons From Obafemi Awolowo University Teaching Hospitals Complex, Nigeria." JCO Global Oncology, no. 11 (July 2025). https://doi.org/10.1200/go-24-00637.

Full text
Abstract:
PURPOSE The introduction of an interventional radiology (IR) unit at the Obafemi Awolowo University Teaching Hospitals Complex (OAUTHC) in 2017 marked a significant advancement in health care delivery in a low-resource setting in Nigeria. This study documents the processes, milestones, services, challenges, innovations, and collaborations that have supported the establishment of an IR unit. METHODS We conducted an institutional review board–approved retrospective case study using archival data from the service records (2017-2024). To supplement our findings, we distributed a structured survey
APA, Harvard, Vancouver, ISO, and other styles
45

Tirab, Dr Preer Alradiy Mohammed. "Islam Objectives and lessons from its legitimacy in Islamic law." ARID International Journal of Social Sciences and Humanities, July 15, 2024, 131–49. http://dx.doi.org/10.36772/arid.aijssh.2024.6128.

Full text
Abstract:
The study aimed to clarify the rule of expiation and the aim of its legitimacy in Islamic law, with identification of how to achieve the Islamic ritual when a Muslim commits a mistake that requires expiation, in addition to the challenges facing the Muslim community in achieving this act of worship. Where the study relied on the descriptive approach and the inductive approach to achieve the objectives of that study, and therefore through the use of the questionnaire tool that was designed through Google models in the period from (2022-2023 AD), the study sample consisted of a number of social
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!