Gotowa bibliografia na temat „Google OAuth”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Google OAuth”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Google OAuth"

1

Srikanth, V., Jupalli Sneha Latha, Dinne Ajay Kumar, and Kakarla Uma Maheswari. "A survey on OAUTH protocol for security." International Journal of Engineering & Technology 7, no. 1.1 (2017): 692. http://dx.doi.org/10.14419/ijet.v7i1.1.10834.

Pełny tekst źródła
Streszczenie:
Web is a dangerous place. For each administration, each API’s, there are clients who might love simply to get through the different layers of security you've raised. It is one of the most powerful open standard authorization protocols available to all API developers today. Most of the popular social network API’s like Google, Twitter and Facebook uses OAuth 2.0 protocol to intensify user experience while sign-ing-on and social sharing. The code written for authorization may be leaked during transmission which then may lead to misuse. This paper uses an attacker model to study the security vuln
Style APA, Harvard, Vancouver, ISO itp.
2

Kumar, Dr C. Srinivasa. "A Novel Approach in Developing a Web Application for Food Delivery System Along with Nutritional Tracking." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50036.

Pełny tekst źródła
Streszczenie:
Abstract—This paper introduces a full-stack web application that seamlessly merges food delivery and nutrition tracking, providing a unified platform for modern dietary needs. The system allows users to place orders from a variety of restaurants while concurrently logging their nutritional intake. Unlike existing solutions, this application provides real-time macronutrient analysis of ordered meals. Built with Flask, MySQL, and Google OAuth 2.0, the backend handles user management, dynamic content rendering, and secure authentication. The frontend employs HTML, JavaScript for an interactive an
Style APA, Harvard, Vancouver, ISO itp.
3

Musliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.

Pełny tekst źródła
Streszczenie:
Abstract : Google Apps is a service provided by Google that allows users to use Google products with their own domain names. Among the products offered by Google Apps are email (Gmail), Docs (Google Drive), and Classroom services. In addition, Google Apps also provides Application Programming Interface (API) services that can be used by developers to take advantage of various features provided by Google. Universitas Ubudiyah Indonesia (UUI) is one of the universities that use Google Apps service for managing student emails. At present, UUI student email management through Google Apps is still
Style APA, Harvard, Vancouver, ISO itp.
4

Ferry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.

Pełny tekst źródła
Streszczenie:
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard wa
Style APA, Harvard, Vancouver, ISO itp.
5

Chirag, Amrutlal Pethad. "How to Subscribe to Google Pub/Sub Topic from Salesforce using Pull Mechanism with Apex." Journal of Scientific and Engineering Research 7, no. 3 (2020): 318–23. https://doi.org/10.5281/zenodo.13753514.

Pełny tekst źródła
Streszczenie:
The document outlines the integration of Google Cloud Pub/Sub with Salesforce using a push mechanism. Key steps include setting up a Pub-Sub topic and subscription, creating an Apex REST service in Salesforce to handle incoming messages, and implementing OAuth 2.0 for secure authentication. It emphasizes security considerations, testing, and best practices for error handling and scalability, ultimately enhancing Salesforce applications' responsiveness and reliability through real-time messaging.
Style APA, Harvard, Vancouver, ISO itp.
6

Radivilova, Tamara, Lyudmyla Kirichenko, Vadym Pantelieiev, Artem Mazepa, and Volodymyr Bilodid. "Analysis of authentication methods for full-stack applications and implementation of a web application with an integrated authentication system." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 3 (29) (September 30, 2024): 76–90. http://dx.doi.org/10.30837/2522-9818.2024.3.076.

Pełny tekst źródła
Streszczenie:
The subject of research is methods and techniques for secure user authentication in web applications. The goal of the work is to analyse authentication methods and implement a web application with an authentication system integrating JWT tokens and the OAuth v2.0 standard. The article solves the tasks of analysis of the main protocols and methods of user authentication in web applications, implementation of authentication based on the OAuth 2.0 standard and JWT access/refresh token, and analysis of the risks of vulnerabilities and attacks for the implemented web applications. Methods used: com
Style APA, Harvard, Vancouver, ISO itp.
7

Kishore, Rhythm. "Gradlink Connect." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49313.

Pełny tekst źródła
Streszczenie:
Abstract— In this paper, we present GradLink, an innovative and scalable web-based networking platform developed to enhance engagement between undergraduate students and alumni. The system facilitates seamless, real-time interaction that supports mentorship, career development, and collaborative learning. GradLink provides a feature-rich environment that promotes meaningful networking through department-specific communities, academic background filters, and personalized suggestions based on user interests. The platform is equipped with a multilingual interface, allowing accessibility for users
Style APA, Harvard, Vancouver, ISO itp.
8

Prof., V. V. Jikar Mr. Rahul Bansod Mr. Dipak Raosaheb Mr. Lokeshwar Vairagade Mr. Rupesh chopde Mr. Vishal Goupale. "Drive Resume: Customized Web Application for Attractive CV Creation Using AI." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 124–27. https://doi.org/10.5281/zenodo.15411367.

Pełny tekst źródła
Streszczenie:
This paper provides Job seekers need effective tools to create, manage, and distribute professional resumes in the current digital era. The Drive Resume Builder is an online tool that integrates with Google Drive to make resume creation and storage easier. Utilizing React.js for front-end development, Node.js with Express for back-end processing, Firebase for authentication, and Google Drive API for smooth document storage and retrieval, this project makes use of these technologies. With the help of the system's numerous editable resume templates, users can enter their information in a dynamic
Style APA, Harvard, Vancouver, ISO itp.
9

Corre, Kevin, Olivier Barais, Gerson Sunyé, Vincent Frey, and Jean-Michel Crom. "Why can’t users choose their identity providers on the web?" Proceedings on Privacy Enhancing Technologies 2017, no. 3 (2017): 75–89. http://dx.doi.org/10.1515/popets-2017-0029.

Pełny tekst źródła
Streszczenie:
Abstract Authentication delegation is a major function of the modern web. Identity Providers (IdP) acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue tha
Style APA, Harvard, Vancouver, ISO itp.
10

KRISHNAN P, ADITHYA, and ABHINAV S. "Community Crime Reporting and Alert System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44332.

Pełny tekst źródła
Streszczenie:
The Community Crime Reporting and Alert System is a web-based application designed to facilitate real-time crime reporting and awareness through modern web technologies. Built using HTML, CSS, JavaScript (React.js or Vue.js for frontend), and Node.js with Express.js for backend, the system ensures a seamless user experience. It employs MongoDB or MySQL as the database to store user reports, authentication details, and crime statistics securely. The system supports user authentication (JWT or OAuth 2.0), allowing registered users to report crimes while also providing an option for anonymous sub
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Google OAuth"

1

Mancuso, Antonio. "Sistema di fatturazione collegato a Google Drive." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6601/.

Pełny tekst źródła
Streszczenie:
L'obbiettivo della tesi è quello di sviluppare una semplice web application per la creazione di fatture. La caratteristica principale è l'integrazione delle funzionalità di Google Drive permettendo all'utente di archiviare e condividere con pochi click le fatture con i clienti. L'utente potrà creare, personalizzare, salvare, archiviare e condividere le proprie ricevute in tempo reale. In questo documento verrà analizzato il processo di sviluppo del software che comprenderà: analisi dei requisiti, progettazione, sviluppo (scelte implementative), test e sviluppi futuri. Verranno anche docume
Style APA, Harvard, Vancouver, ISO itp.
2

Josefsson, Ågren Fredrik, and Oscar Järpehult. "Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178035.

Pełny tekst źródła
Streszczenie:
Third-party authentication services are becoming more common since it eases the login procedure by not forcing users to create a new login for every website thatuses authentication. Even though it simplifies the login procedure the users still have to be conscious about what data is being shared between the identity provider (IDP) and the relying party (RP). This thesis presents a tool for collecting data about third-party authentication that outperforms previously made tools with regards to accuracy, precision and recall. The developed tool was used to collect information about third-party au
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Google OAuth"

1

Bihis, Charles. Mastering OAuth 2. 0: Create Powerful Applications to Interact with Popular Service Providers Such As Facebook, Google, Twitter, and More by Leveraging the OAuth 2. 0 Authorization Framework. Packt Publishing, Limited, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Google OAuth"

1

Prakash, Vijay, Kirtan Dua, Lalit Garg, and Varun Shukla. "Web Application Authentication Using Google OAuth, Express, and MongoDB." In Cryptology and Network Security with Machine Learning. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0641-9_44.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Trung, Hung Nguyen, Quang Khanh Le, Tieu My Lam, Kim Duy Vu, and Le The Dung. "EcoSentry: A Cost-Effective IoT System for Efficient Real-Time Forest Monitoring." In Lecture Notes in Mechanical Engineering. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-93891-7_17.

Pełny tekst źródła
Streszczenie:
Abstract Nowadays, climate change is a severe issue that is attracting global attention. Effective forest monitoring is vital among various methods to cope with climate change. Unfortunately, current approaches to forest monitoring are costly and sophisticated, making them difficult to apply widely or affordable for developing countries. In this paper, we propose a cost-effective Internet of Things (IoT) system called EcoSentry, which is low-cost and straightforward but still provides reasonably accurate, real-time data for efficient forest monitoring. The proposed system is comprised of two m
Style APA, Harvard, Vancouver, ISO itp.
3

Muñoz Domínguez, Miguel Omar, and Nydia Leticia Olvera Castillo. "Google Workspace (Meet y Drive)." In Explorando el aprendizaje digital. Guía de plugins esenciales para Moodle. Astra Ediciones, 2024. http://dx.doi.org/10.61728/ae24320054.

Pełny tekst źródła
Streszczenie:
En el proceso de gestión de un sitio de Moodle, existen diferentes configuraciones para su funcionamiento como servidor de Sistemas Gestores de Aprendizaje (LMS por sus siglas en inglés). Una de ellas es el protocolo de Autorización OAuth 2 (autorización abierta) que habilita a que usuarios puedan ingresar con cuentas de servicios de grandes empresas de tecnología. Esto es, se utiliza para permitir que diversas aplicaciones de terceros accedan a los recursos de un usuario en un servicio en línea, sin que se muestren sus credenciales.
Style APA, Harvard, Vancouver, ISO itp.
4

MacDonald, Scott. "Laura Poitras." In The Sublimity of Document. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190052126.003.0004.

Pełny tekst źródła
Streszczenie:
This is the first career interview with Academy Award–winner, Pulitzer Prize–winner, MacArthur Fellow Laura Poitras, whose shift from cooking to filmmaking brought her first into contact with the avant-garde filmmaking community in the Bay Area, and in particular, with Ernie Gehr; then into contact with Linda Goode Bryant, with whom she made Flag Wars (2003), an Emmy-winning documentary about ethnic collisions in a Columbus, Ohio, neighborhood. Her reaction to the American response to 9/11 instigated her celebrated post-9/11 trilogy of films: My Country, My Country (2006), which explores event
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!