Journal articles on the topic 'OAuth'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'OAuth.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Singh, Krittika KD, and Anurag Jain. "A Review OAuth-based Authorization Service Architecture in IoT Scenarios." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 335. http://dx.doi.org/10.23956/ijarcsse.v7i8.83.
Full textKaczmarski, Peter, and Fernand Vandamme. "WEB SECURITY: A QUICK START INTRODUCTION TO OAUTH 2.0 AND KEYCLOAK 19.X AUTHORIZATION SCENARIOS." Communication & Cognition 55, no. 3-4 (December 2022): 133–60. http://dx.doi.org/10.57028/c55-119-z1026.
Full textFerry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (March 9, 2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.
Full textJung, Seung Wook, and Souhwan Jung. "Personal OAuth authorization server and push OAuth for Internet of Things." International Journal of Distributed Sensor Networks 13, no. 6 (June 2017): 155014771771262. http://dx.doi.org/10.1177/1550147717712627.
Full textHeo, Daeyoung, and Suntae Hwang. "OAuth based Proxy Delegation Service." Journal of Korean Society for Internet Information 13, no. 6 (December 31, 2012): 55–62. http://dx.doi.org/10.7472/jksii.2012.13.6.55.
Full textHenry, Gavin. "Justin Richer on OAuth." IEEE Software 37, no. 1 (January 2020): 98–100. http://dx.doi.org/10.1109/ms.2019.2949648.
Full textLeiba, Barry. "OAuth Web Authorization Protocol." IEEE Internet Computing 16, no. 1 (January 2012): 74–77. http://dx.doi.org/10.1109/mic.2012.11.
Full textYlli, Enkli, Igli Tafa, and Ergis Gjergji. "OAUTH 2.0 IN SECURING APIS." International Journal of Research In Commerce and Management Studies 03, no. 01 (2021): 10–19. http://dx.doi.org/10.38193/ijrcms.2021.3102.
Full textPaval, Anuja, and Amol Dange. "Secure HDFS Using OAuth 2.0." International Journal of Computer Trends and Technology 67, no. 6 (June 25, 2019): 89–92. http://dx.doi.org/10.14445/22312803/ijctt-v67i6p115.
Full textYu, Sung-Tae, and Soo-Hyun Oh. "OAuth-based User Authentication Framework for Internet of Things." Journal of the Korea Academia-Industrial cooperation Society 16, no. 11 (November 30, 2015): 8057–63. http://dx.doi.org/10.5762/kais.2015.16.11.8057.
Full textBuranasaksee, Utharn. "Incorporating OAuth Protocol into Existing Information Systems." Journal of Software 11, no. 6 (June 2016): 615–22. http://dx.doi.org/10.17706/jsw.11.6.615-622.
Full textSrikanth, V., Jupalli Sneha Latha, Dinne Ajay Kumar, and Kakarla Uma Maheswari. "A survey on OAUTH protocol for security." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 692. http://dx.doi.org/10.14419/ijet.v7i1.1.10834.
Full textSharif, Amir, Roberto Carbone, Giada Sciarretta, and Silvio Ranise. "Best current practices for OAuth/OIDC Native Apps." Journal of Information Security and Applications 65 (March 2022): 103097. http://dx.doi.org/10.1016/j.jisa.2021.103097.
Full textMoon, Jeong-Kyung, Hwang-Rae Kim, and Jin-Mook Kim. "Privilege Management System in Cloud Computing using Oauth." International Journal of Security and Its Applications 8, no. 3 (May 31, 2014): 221–34. http://dx.doi.org/10.14257/ijsia.2014.8.3.23.
Full textXie, Min, Wei Huang, Li Yang, and Yixian Yang. "VOAuth: A solution to protect OAuth against phishing." Computers in Industry 82 (October 2016): 151–59. http://dx.doi.org/10.1016/j.compind.2016.06.001.
Full textChae, Cheol-Joo, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, and YounJu Shin. "The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access." Journal of Internet Computing and Services 16, no. 1 (February 28, 2015): 21–28. http://dx.doi.org/10.7472/jksii.2015.16.1.21.
Full textCorre, Kevin, Olivier Barais, Gerson Sunyé, Vincent Frey, and Jean-Michel Crom. "Why can’t users choose their identity providers on the web?" Proceedings on Privacy Enhancing Technologies 2017, no. 3 (July 1, 2017): 75–89. http://dx.doi.org/10.1515/popets-2017-0029.
Full textKanmani, K. V. "Survey on Restful Web Services Using Open Authorization (Oauth)." IOSR Journal of Computer Engineering 15, no. 4 (2013): 53–56. http://dx.doi.org/10.9790/0661-1545356.
Full textBrian, Otieno Mark, and Kyung-Hyune Rhee. "A Secure Social Networking Site based on OAuth Implementation." Journal of Korea Multimedia Society 19, no. 2 (February 28, 2016): 308–15. http://dx.doi.org/10.9717/kmms.2016.19.2.308.
Full textKurniawan, Rahmat. "Perancangan dan Implementasi Sistem Otentikasi OAuth 2.0 dan PKCE Berbasis Extreme Programming (XP)." Jurnal Pendidikan dan Teknologi Indonesia 2, no. 2 (February 16, 2022): 601–11. http://dx.doi.org/10.52436/1.jpti.141.
Full textNazir, Danish, and Nayeem Farooq. "Security measures needed for exposing Restful services through OAuth 2." Global Sci-Tech 11, no. 4 (2019): 206. http://dx.doi.org/10.5958/2455-7110.2019.00029.6.
Full textFarooqi, Shehroze, Fareed Zaffar, Nektarios Leontiadis, and Zubair Shafiq. "Measuring and mitigating OAuth access token abuse by collusion networks." Communications of the ACM 63, no. 5 (April 20, 2020): 103–11. http://dx.doi.org/10.1145/3387720.
Full textTorroglosa-García, Elena, Antonio D. Pérez-Morales, Pedro Martinez-Julia, and Diego R. Lopez. "Integration of the OAuth and Web Service family security standards." Computer Networks 57, no. 10 (July 2013): 2233–49. http://dx.doi.org/10.1016/j.comnet.2012.11.027.
Full textKusuma, Indra, Ajib Susanto, and Ibnu Utomo Wahyu Mulyono. "IMPLEMENTASI RESTFUL WEB SERVICES DENGAN OTORISASI OAUTH 2.0 PADA SISTEM PEMBAYARAN PARKIR." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 10, no. 1 (April 29, 2019): 391–404. http://dx.doi.org/10.24176/simet.v10i1.3026.
Full textGashi, Edon, Blerim Rexha, and Avni Rexhepi. "Trust establishment between OAuth 2.0 resource servers using claims-based authorization." Electronic Government, an International Journal 17, no. 1 (2021): 1. http://dx.doi.org/10.1504/eg.2021.10035771.
Full textGashi, Edon, Blerim Rexha, and Avni Rexhepi. "Trust establishment between OAuth 2.0 resource servers using claims-based authorisation." Electronic Government, an International Journal 17, no. 3 (2021): 339. http://dx.doi.org/10.1504/eg.2021.116027.
Full textSreeram, G., S. Pradeep, Saideepthi Pabba, and Nikhat Parveen. "Quantify and alleviate OAuth approach token system exploiting by conspiracy lattice." International Journal of System of Systems Engineering 11, no. 3/4 (2021): 301. http://dx.doi.org/10.1504/ijsse.2021.121472.
Full textParveen, Nikhat, Saideepthi Pabba, Pradeep S, and SREERAM GUTHA. "Quantify and Alleviate OAuth Approach Token System Exploiting by Conspiracy Lattice." International Journal of System of Systems Engineering 11, no. 3/4 (2021): 1. http://dx.doi.org/10.1504/ijsse.2021.10045170.
Full textSingh, Jaimandeep, and Naveen Kumar Chaudhary. "OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilities." Journal of Information Security and Applications 65 (March 2022): 103091. http://dx.doi.org/10.1016/j.jisa.2021.103091.
Full textHong, Seongho, and Heeyoul Kim. "VaultPoint: A Blockchain-Based SSI Model that Complies with OAuth 2.0." Electronics 9, no. 8 (July 31, 2020): 1231. http://dx.doi.org/10.3390/electronics9081231.
Full textChae, Cheol-Joo, Ki-Bong Kim, and Han-Jin Cho. "A study on secure user authentication and authorization in OAuth protocol." Cluster Computing 22, S1 (August 30, 2017): 1991–99. http://dx.doi.org/10.1007/s10586-017-1119-6.
Full textLupić, Aleksandar. "PRIMENA APIGEE PLATFORME ZA UPRAVLJANJE API-JEM." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 35, no. 09 (August 27, 2020): 1559–62. http://dx.doi.org/10.24867/09be13lupic.
Full textCai, Xing Quan, Qian Qian Shi, and Li Na Duan. "Acquiring Evaluation Data of Health Habits and its Application." Advanced Materials Research 739 (August 2013): 446–49. http://dx.doi.org/10.4028/www.scientific.net/amr.739.446.
Full textKim, Jinouk, Jungsoo Park, Long Nguyen-Vu, and Souhwan Jung. "A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth." Journal of the Korea Institute of Information Security and Cryptology 27, no. 1 (February 28, 2017): 5–14. http://dx.doi.org/10.13089/jkiisc.2017.27.1.5.
Full textOh, Se-Ra, and Young-Gab Kim. "AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090638. http://dx.doi.org/10.1177/1550147720906388.
Full textHe, Ming Xiang, Qing Ye Sun, Feng Shan, and Xin Ming Lu. "The LAN Information Integration Model Research Based on User's Individual Needs." Applied Mechanics and Materials 263-266 (December 2012): 1527–35. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1527.
Full textPorciúncula, Cleber Bittencourt, Sílvio Beskow, Érico Santos Rocha, and Jeferson Campos Nobre. "Authentication and Authorization for Constrained Environments (ACE) com Framework OAuth e Protocolo CoAP." Revista ComInG - Communications and Innovations Gazette 3, no. 1 (October 22, 2018): 13. http://dx.doi.org/10.5902/2448190430934.
Full textSujanani, Tarun, and Smitha Vinod. "Implementation of OpenIdconnect and OAuth 2.0 to create SSO for educational institutes." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.6.10142.
Full textWindley, Phillip J. "API Access Control with OAuth: Coordinating interactions with the Internet of Things." IEEE Consumer Electronics Magazine 4, no. 3 (July 2015): 52–58. http://dx.doi.org/10.1109/mce.2015.2421571.
Full textSucasas, Victor, Georgios Mantas, Saud Althunibat, Leonardo Oliveira, Angelos Antonopoulos, Ifiok Otung, and Jonathan Rodriguez. "A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications." Computers & Security 74 (May 2018): 258–74. http://dx.doi.org/10.1016/j.cose.2018.01.014.
Full textXiao, Meihua, Daolei Cheng, Wei Li, Ya'nan Li, Xinqian Liu, and Yingtian Mei. "Formal Analysis and Verification of OAuth 2.0 Protocol Improved by Key Cryptosystems." Chinese Journal of Electronics 26, no. 3 (May 1, 2017): 477–84. http://dx.doi.org/10.1049/cje.2017.04.003.
Full textOh, Se-Ra, Young-Gab Kim, and Sanghyun Cho. "An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role." Sensors 19, no. 8 (April 20, 2019): 1884. http://dx.doi.org/10.3390/s19081884.
Full textWatini, Sri, Pipit Nursaputri, and Muhammad Iqbal. "Comparison of CAS and Manage Oauth in Single Sign on (SSO) Client Applications." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 29, 2020): 152–59. http://dx.doi.org/10.34306/itsdi.v1i2.147.
Full textMartynyuk, Alexander N., and Sergіj S. Surkov. "IMPROVEMENT OF SECURITY FOR WEB SERVICES BY RESEARCH AND DEVELOPMENT OF OAUTH SERVER." ELECTRICAL AND COMPUTER SYSTEMS 23, no. 99 (June 20, 2016): 99–105. http://dx.doi.org/10.15276/eltecs.23.99.2016.16.
Full textChoi, Jeongseok, Jaekwon Kim, Dong Kyun Lee, Kwang Soo Jang, Dai-Jin Kim, and In Young Choi. "The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database." Genomics & Informatics 14, no. 1 (2016): 20. http://dx.doi.org/10.5808/gi.2016.14.1.20.
Full textPhogat, Anu. "Provision of overcoming the weakness of OAuth 20 protocol in online social networking." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 3 (2015): 1657–61. http://dx.doi.org/10.17762/ijritcc2321-8169.1503166.
Full textMusliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (June 30, 2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.
Full textXu, Xingdong, Leyuan Niu, and Bo Meng. "Automatic Verification of Security Properties of OAuth 2.0 Protocol with Cryptoverif in Computational Model." Information Technology Journal 12, no. 12 (June 1, 2013): 2273–85. http://dx.doi.org/10.3923/itj.2013.2273.2285.
Full textCirani, Simone, Marco Picone, Pietro Gonizzi, Luca Veltri, and Gianluigi Ferrari. "IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios." IEEE Sensors Journal 15, no. 2 (February 2015): 1224–34. http://dx.doi.org/10.1109/jsen.2014.2361406.
Full textGonzález, Jorge Fontenla, Manuel Caeiro Rodríguez, Martín Llamas Nistal, and Luis Anido Rifón. "Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems." Computers & Security 28, no. 8 (November 2009): 843–56. http://dx.doi.org/10.1016/j.cose.2009.06.002.
Full text