Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Google OAuth.

Artykuły w czasopismach na temat „Google OAuth”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 45 najlepszych artykułów w czasopismach naukowych na temat „Google OAuth”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Srikanth, V., Jupalli Sneha Latha, Dinne Ajay Kumar, and Kakarla Uma Maheswari. "A survey on OAUTH protocol for security." International Journal of Engineering & Technology 7, no. 1.1 (2017): 692. http://dx.doi.org/10.14419/ijet.v7i1.1.10834.

Pełny tekst źródła
Streszczenie:
Web is a dangerous place. For each administration, each API’s, there are clients who might love simply to get through the different layers of security you've raised. It is one of the most powerful open standard authorization protocols available to all API developers today. Most of the popular social network API’s like Google, Twitter and Facebook uses OAuth 2.0 protocol to intensify user experience while sign-ing-on and social sharing. The code written for authorization may be leaked during transmission which then may lead to misuse. This paper uses an attacker model to study the security vuln
Style APA, Harvard, Vancouver, ISO itp.
2

Kumar, Dr C. Srinivasa. "A Novel Approach in Developing a Web Application for Food Delivery System Along with Nutritional Tracking." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50036.

Pełny tekst źródła
Streszczenie:
Abstract—This paper introduces a full-stack web application that seamlessly merges food delivery and nutrition tracking, providing a unified platform for modern dietary needs. The system allows users to place orders from a variety of restaurants while concurrently logging their nutritional intake. Unlike existing solutions, this application provides real-time macronutrient analysis of ordered meals. Built with Flask, MySQL, and Google OAuth 2.0, the backend handles user management, dynamic content rendering, and secure authentication. The frontend employs HTML, JavaScript for an interactive an
Style APA, Harvard, Vancouver, ISO itp.
3

Musliyana, Zuhar, Andita Ghaitsa Satira, Mahendar Dwipayana, and Ayu Helinda. "Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol." Elkawnie 6, no. 1 (2020): 109. http://dx.doi.org/10.22373/ekw.v6i1.5545.

Pełny tekst źródła
Streszczenie:
Abstract : Google Apps is a service provided by Google that allows users to use Google products with their own domain names. Among the products offered by Google Apps are email (Gmail), Docs (Google Drive), and Classroom services. In addition, Google Apps also provides Application Programming Interface (API) services that can be used by developers to take advantage of various features provided by Google. Universitas Ubudiyah Indonesia (UUI) is one of the universities that use Google Apps service for managing student emails. At present, UUI student email management through Google Apps is still
Style APA, Harvard, Vancouver, ISO itp.
4

Ferry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.

Pełny tekst źródła
Streszczenie:
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard wa
Style APA, Harvard, Vancouver, ISO itp.
5

Chirag, Amrutlal Pethad. "How to Subscribe to Google Pub/Sub Topic from Salesforce using Pull Mechanism with Apex." Journal of Scientific and Engineering Research 7, no. 3 (2020): 318–23. https://doi.org/10.5281/zenodo.13753514.

Pełny tekst źródła
Streszczenie:
The document outlines the integration of Google Cloud Pub/Sub with Salesforce using a push mechanism. Key steps include setting up a Pub-Sub topic and subscription, creating an Apex REST service in Salesforce to handle incoming messages, and implementing OAuth 2.0 for secure authentication. It emphasizes security considerations, testing, and best practices for error handling and scalability, ultimately enhancing Salesforce applications' responsiveness and reliability through real-time messaging.
Style APA, Harvard, Vancouver, ISO itp.
6

Radivilova, Tamara, Lyudmyla Kirichenko, Vadym Pantelieiev, Artem Mazepa, and Volodymyr Bilodid. "Analysis of authentication methods for full-stack applications and implementation of a web application with an integrated authentication system." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 3 (29) (September 30, 2024): 76–90. http://dx.doi.org/10.30837/2522-9818.2024.3.076.

Pełny tekst źródła
Streszczenie:
The subject of research is methods and techniques for secure user authentication in web applications. The goal of the work is to analyse authentication methods and implement a web application with an authentication system integrating JWT tokens and the OAuth v2.0 standard. The article solves the tasks of analysis of the main protocols and methods of user authentication in web applications, implementation of authentication based on the OAuth 2.0 standard and JWT access/refresh token, and analysis of the risks of vulnerabilities and attacks for the implemented web applications. Methods used: com
Style APA, Harvard, Vancouver, ISO itp.
7

Kishore, Rhythm. "Gradlink Connect." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49313.

Pełny tekst źródła
Streszczenie:
Abstract— In this paper, we present GradLink, an innovative and scalable web-based networking platform developed to enhance engagement between undergraduate students and alumni. The system facilitates seamless, real-time interaction that supports mentorship, career development, and collaborative learning. GradLink provides a feature-rich environment that promotes meaningful networking through department-specific communities, academic background filters, and personalized suggestions based on user interests. The platform is equipped with a multilingual interface, allowing accessibility for users
Style APA, Harvard, Vancouver, ISO itp.
8

Prof., V. V. Jikar Mr. Rahul Bansod Mr. Dipak Raosaheb Mr. Lokeshwar Vairagade Mr. Rupesh chopde Mr. Vishal Goupale. "Drive Resume: Customized Web Application for Attractive CV Creation Using AI." International Journal of Advanced Innovative Technology in Engineering 10, no. 2 (2025): 124–27. https://doi.org/10.5281/zenodo.15411367.

Pełny tekst źródła
Streszczenie:
This paper provides Job seekers need effective tools to create, manage, and distribute professional resumes in the current digital era. The Drive Resume Builder is an online tool that integrates with Google Drive to make resume creation and storage easier. Utilizing React.js for front-end development, Node.js with Express for back-end processing, Firebase for authentication, and Google Drive API for smooth document storage and retrieval, this project makes use of these technologies. With the help of the system's numerous editable resume templates, users can enter their information in a dynamic
Style APA, Harvard, Vancouver, ISO itp.
9

Corre, Kevin, Olivier Barais, Gerson Sunyé, Vincent Frey, and Jean-Michel Crom. "Why can’t users choose their identity providers on the web?" Proceedings on Privacy Enhancing Technologies 2017, no. 3 (2017): 75–89. http://dx.doi.org/10.1515/popets-2017-0029.

Pełny tekst źródła
Streszczenie:
Abstract Authentication delegation is a major function of the modern web. Identity Providers (IdP) acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue tha
Style APA, Harvard, Vancouver, ISO itp.
10

KRISHNAN P, ADITHYA, and ABHINAV S. "Community Crime Reporting and Alert System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44332.

Pełny tekst źródła
Streszczenie:
The Community Crime Reporting and Alert System is a web-based application designed to facilitate real-time crime reporting and awareness through modern web technologies. Built using HTML, CSS, JavaScript (React.js or Vue.js for frontend), and Node.js with Express.js for backend, the system ensures a seamless user experience. It employs MongoDB or MySQL as the database to store user reports, authentication details, and crime statistics securely. The system supports user authentication (JWT or OAuth 2.0), allowing registered users to report crimes while also providing an option for anonymous sub
Style APA, Harvard, Vancouver, ISO itp.
11

Todingbua, Devylia, and Nina Setiyawati. "Pengintegrasian Penyimpanan Google Drive Pada Pembangunan Aplikasi Monitoring Project Menggunakan pyDrive." JURIKOM (Jurnal Riset Komputer) 9, no. 4 (2022): 800. http://dx.doi.org/10.30865/jurikom.v9i4.4452.

Pełny tekst źródła
Streszczenie:
In a company that works on many projects, a system that can be used to monitor progress is needed. Monitoring is an assessment activity that is carried out continuously to see the progress of a task. Monitoring is important to make sure the project that is being carried out can run well. In this research, a Monitoring Project application was built using the Agile Software Development method. The application is made to make data managing and progress monitoring easier. In addition, a feature will be added to store and share project file access rights to the team members so that the files relate
Style APA, Harvard, Vancouver, ISO itp.
12

Triveni, Gedela. "AI PLACE FINDER." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48026.

Pełny tekst źródła
Streszczenie:
Abstract The AI Place Finder is a web application built on top of the MERN stack (MongoDB, Express. js, React. js, Node. js) which simplifies and personalizes travel planning by using Artificial Intelligence and real-time data. It requires users to input their preferences (like where to go, how many people will be with you and what the budget will be), and is based on the Gemini AI API. With the help of one’s preferences in order to show the most appropriate places to visit, the app makes recommending travel destinations easier and more personal. In addition, the app integrates with Google Map
Style APA, Harvard, Vancouver, ISO itp.
13

Kurniawan, Wawan, Ifan Prihandi, and Nurullah Husufa. "PROTOTYPE FIREBASE AUTHENTICATION MENGGUNAKAN FITUR FIREBASE PADA APLIKASI ANDROID." JURNAL SATYA INFORMATIKA 4, no. 1 (2023): 71–78. http://dx.doi.org/10.59134/jsk.v4i1.406.

Pełny tekst źródła
Streszczenie:
Mengembangkan sistem otentikasi untuk aplikasi merupakan suatu hal yang relatif sulit. Akan tetapi, para developer tidak memiliki pilihan selain untuk melakukannya, dan harus siap dengan segala konsekuensi jika terjadi sebuah kesalahan dalam pembangunan sistem tersebut. Selain itu, belum terdapat perusahaan yang mau membayar pajak dan membangun aplikasi hanya untuk membuat sebuah sistem login yang baik. Firebase Authentication menawarkan kemudahan untuk para developer dalam membangun aplikasi yang memiliki proses masuk ke akun tanpa perlu mengerti permasalahan kompleks yang terjadi dibelakang
Style APA, Harvard, Vancouver, ISO itp.
14

Носко, C. В., С. С. Бульба, О. В. Коломійцев, Д. О. Лисиця та Г. І. Молчанов. "ПРОПОЗИЦІЇ ЩОДО АВТОРИЗАЦІЇ В САЙДКАР КОМПОНЕНТІ МІКРОСЕРВІСНОЇ АРХІТЕКРУРИ". Системи управління, навігації та зв’язку. Збірник наукових праць 1, № 79 (2025): 116–23. https://doi.org/10.26906/sunz.2025.1.116-123.

Pełny tekst źródła
Streszczenie:
У статті розроблено пропозиції щодо доцільності реалізації авторизації у сайдкар компоненті мікросервісу, що дозволяє відокремити бізнес-логіку від завдань авторизації, ведення журналів, кешування тощо. Така реалізація дозволяє основним бізнес-модулям залишатися сфокусованими виключно на своїй бізнес-логіці, змінюючись лише тоді, коли є оновлення у бізнес-процедурах, а задачі, які є загальними майже для будь-якого сучасного рішення,передавати допоміжним компонентам таким як сайдкар. Правильна реалізація авторизації виступає ключовим аспектом будь-якої системи, є дуже важливим та вимагає врахув
Style APA, Harvard, Vancouver, ISO itp.
15

Mohammed Mudassir and Mohammed Mushtaq. "The role of APIs in modern software development." World Journal of Advanced Engineering Technology and Sciences 13, no. 1 (2024): 1045–47. http://dx.doi.org/10.30574/wjaets.2024.13.1.0515.

Pełny tekst źródła
Streszczenie:
Application Programming Interfaces (APIs) play a critical role in modern software development, enabling seamless communication between disparate systems and enhancing the scalability, modularity, and security of applications. This research investigates the impact of APIs on software architecture, focusing on their use in facilitating interoperability across distributed environments. Using a mixed-methods approach, the study combines a literature review, a survey of 50 software developers, and case studies from industry leaders such as Amazon Web Services (AWS), Google, and Facebook. The findin
Style APA, Harvard, Vancouver, ISO itp.
16

Jayasiri K.C.N., Thathsarani W.R.V.K., De Silva D.I., and Vidhanaarachchi S. "Design and Implementation of an Automated Hospital Management System with MERN Stack." International Journal of Engineering and Management Research 12, no. 5 (2022): 197–202. http://dx.doi.org/10.31033/ijemr.12.5.24.

Pełny tekst źródła
Streszczenie:
A hospital is a place that needs more effective and efficient management of information, people, and assets. This paper demonstrates the design and implementation of an autonomous system with mern stack that can manage doctor information, patient information, inventory information, and administrative functionalities in a hospital environment. This was written with the intention of eliminating the problems of manual hospital management systems such as data redundancy, data inaccuracy, poor accesibility and lack of data security. The paper addressed the problems of time consumption of storing, r
Style APA, Harvard, Vancouver, ISO itp.
17

R. Chinchwadkar, Piyush Wagh, Roshan Suryawanshi, and Amanpreet Ruppyal. "Analyzing Results using Machine Learning Techniques." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 865–68. https://doi.org/10.47392/irjaeh.2025.0123.

Pełny tekst źródła
Streszczenie:
"Analyzing results using machine Learning techniques" is an innovative, web-based platform designed to transform the management and analysis of academic results in engineering institutions through advanced machine learning algorithms. This project integrates modern front-end technologies with a robust Flask back-end and a PostgreSQL database, ensuring a secure, scalable, and user-friendly system. At its core, the platform features dual access portals tailored for both students and staff. Students can easily retrieve their examination results by entering their unique PRN number, while staff mem
Style APA, Harvard, Vancouver, ISO itp.
18

Schmitz, Guido. "Privacy-preserving Web single sign-on: Formal security analysis and design." it - Information Technology 64, no. 1-2 (2022): 43–48. http://dx.doi.org/10.1515/itit-2022-0003.

Pełny tekst źródła
Streszczenie:
Abstract Single sign-on (SSO) systems, such as OpenID and OAuth, allow Web sites to delegate user authentication to third parties, such as Facebook or Google. These systems provide a convenient mechanism for users to log in and ease the burden of user authentication for Web sites. Conversely, by integrating such SSO systems, they become a crucial part of the security of the modern Web. So far, it has been hard to prove if Web standards and protocols actually meet their security goals. SSO systems, in particular, need to satisfy strong security and privacy properties. In this thesis, we develop
Style APA, Harvard, Vancouver, ISO itp.
19

JASMEET, SINGH, and KUMAR PURWAR RAVINDRA. "RESTFUL COMMUNICATION APPROACH." IJIERT - International Journal of Innovations in Engineering Research and Technology 5, no. 6 (2018): 1–10. https://doi.org/10.5281/zenodo.1445473.

Pełny tekst źródła
Streszczenie:
<strong>There are devices performing various function s and providing services to other devices. These devices provide output in various formats like xml,html,csv,pdf etc. It becomes difficult to parse this data into required format as it requires extra overhead.To send th is data we are considering two options namely SOAP services or RESTful Services. RESTful services are replacing SOAP services because of their various advantages described further in this paper,So to provide the interoperability between devices we sugges t to use RESTful webservices s using json as output . REST is an archit
Style APA, Harvard, Vancouver, ISO itp.
20

Ike, Joy Ezinwanneamaka, Joseph Darko Kessie, Henry Emenike Okaro, Enuma Ezeife, and Tolulope Onibokun. "Identity and Access Management in Cloud Storage: A Comprehensive Guide." International Journal of Multidisciplinary Research and Growth Evaluation. 6, no. 2 (2025): 245–52. https://doi.org/10.54660/.ijmrge.2025.6.2.245-252.

Pełny tekst źródła
Streszczenie:
With the growing adoption of cloud storage, ensuring data security and regulatory compliance has become a critical challenge for organizations. Identity and Access Management (IAM) plays a fundamental role in protecting cloud-based resources by providing authentication, authorization, and monitoring capabilities. This comprehensive guide explores the key principles, technologies, and best practices of IAM in cloud storage environments, addressing modern security threats and compliance requirements. The review outlines core IAM components, including Role-Based Access Control (RBAC), Attribute-B
Style APA, Harvard, Vancouver, ISO itp.
21

M, Ashwini, and Viraj Ray. "BlogGen AI: An AI-Powered Blogging Platform for Automated Content Creation." International Journal of Innovative Research in Information Security 11, no. 02 (2025): 59–69. https://doi.org/10.26562/ijiris.2025.v1102.01.

Pełny tekst źródła
Streszczenie:
In the digital age, content creation plays a pivotal role in communication, education, marketing, and brand development. Blogs, in particular, are powerful mediums for sharing knowledge, building communities, and improving online visibility. However, the traditional process of blog writing is time-consuming, mentally taxing, and often inconsistent in tone, quality, and SEO relevance. These challenges are particularly evident for individuals and businesses who lack dedicated content teams or professional writing experience. This paper introduces BlogGenAI, an intelligent, AI-powered blogging pl
Style APA, Harvard, Vancouver, ISO itp.
22

Maulana Zakaria, Danu, and Fitrah Satrya Fajar Kusumah. "Implementation of Web Service Security Using Oauth2 in the Financial Facility Search System." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, no. 2 (2022): 114. http://dx.doi.org/10.32832/inova-tif.v5i2.8506.

Pełny tekst źródła
Streszczenie:
&lt;p&gt;Implementation Of Web Service Security Using Oauth2 In Financial Facility Search System. The financial facility search system is an application that makes it easier for people to find the nearest financial facility. A similar application is Google maps which have been widely used to search for financial facilities, but for completeness of information and features, it is incomplete. So financial institutions need applications that can manage data on their financial facilities without other vendor intermediaries. This financial facility search system will be built on a mobile platform a
Style APA, Harvard, Vancouver, ISO itp.
23

Adabala, N.V.V. Veerraju, Divya Jyothi Telagareddy, Narayana Rao Boda, and Acharya Anand. "Does Cadaveric Oath Influence the Mind-Set of the First Year Medical Students? A Study in Andhra Pradesh, India." International Journal of Pharmaceutical and Clinical Research 15, no. 3 (2023): 738–43. https://doi.org/10.5281/zenodo.12705036.

Pełny tekst źródła
Streszczenie:
<strong>Background:&nbsp;</strong>Cadaveric oath is a pledge taken by the first year MBBS students on the first day of their anatomy dissection to pay respects to the human remains which remain as their mentor throughout their course. The objective of the study is to assess the influence of the cadaveric oath on the first MBBS students.&nbsp;<strong>Materials and Methods:&nbsp;</strong>This study would be conducted in the Department of Anatomy, KIMS and RF, Amalapuram after obtaining IEC (Institutional Ethical Committee) clearance. Data is collected by using predesigned semistructured question
Style APA, Harvard, Vancouver, ISO itp.
24

Nabila, Alya, Ferryal Basbeth, and Firman Arifandi. "Analisa Kedudukan Pemberian Kesaksian Palsu Terhadap Proses Ilmu Forensik dan Tinjauannya Menurut Hukum Islam." COMSERVA Indonesian Jurnal of Community Services and Development 2, no. 11 (2023): 2429–40. http://dx.doi.org/10.59141/comserva.v2i11.645.

Pełny tekst źródła
Streszczenie:
Forensics means taking something to court. This term is commonly used in medicine. Is a scientific process (based on knowledge) in the analysis, collection and presentation of various evidence in the process related to litigation and collection, physical evidence found at the TKP (Case Incident) and then presented in court. False testimony is a statement given by a witness under oath where the contents of the statement contain a meaning that is not in accordance with the truth, in other words, the statement is a lie or fake. Statements whose content is false do not have to be entirely false, b
Style APA, Harvard, Vancouver, ISO itp.
25

Гайтан, О. М., та І. В. Снитка. "ІНТЕГРОВАНІ ПЛАТФОРМИ ДЛЯ АВТОМАТИЗАЦІЇ ОСОБИСТОГО ФІНАНСОВОГО ОБЛІКУ НА ОСНОВІ ЧАТ-БОТІВ ТА ХМАРНИХ ТЕХНОЛОГІЙ". Systems and Technologies 69, № 1 (2025): 58–70. https://doi.org/10.32782/2521-6643-2025-1-69.7.

Pełny tekst źródła
Streszczenie:
У контексті зростаючої складності фінансових процесів та потреби в ефективному управлінні особистими фінансами віртуальні персональні фінансові асистенти стають важливими інструментами для тих, хто шукає зручні способи відслідковування, управління та аналізу своїх фінансів. З поширенням смартфонів та хмарних технологій набувають популярності автоматизовані фінансові рішення, які допомагають користувачам у веденні бюджету, відслідковуванні витрат та прийнятті фінансових рішень. Це дослідження аналізує концептуальні та практичні аспекти розробки віртуального персонального фінансового асистента,
Style APA, Harvard, Vancouver, ISO itp.
26

Weitzel, Derek, Brian Bockelman, Jim Basney, Todd Tannenbaum, Zach Miller, and Jeff Gaynor. "Capability-Based Authorization for HEP." EPJ Web of Conferences 214 (2019): 04014. http://dx.doi.org/10.1051/epjconf/201921404014.

Pełny tekst źródła
Streszczenie:
Outside the HEP computing ecosystem, it is vanishingly rare to encounter user X509 certificate authentication (and proxy certificates are even more rare). The web never widely adopted the user certificate model, but increasingly sees the need for federated identity services and distributed authorization. For example, Dropbox, Google and Box instead use bearer tokens issued via the OAuth2 protocol to authorize actions on their services. Thus, the HEP ecosystem has the opportunity to reuse recent work in industry that now covers our needs. We present a token-based ecosystem for authorization tai
Style APA, Harvard, Vancouver, ISO itp.
27

Yogaswara, Andrey Satwika, Disman Disman, Eeng Ahman, and Nugraha Nugraha. "Kinerja Dilihat dari Perspektif Kepemimpinan Militer dan Budaya Organisasi." Image : Jurnal Riset Manajemen 11, no. 2 (2023): 142–51. http://dx.doi.org/10.17509/image.2023.013.

Pełny tekst źródła
Streszczenie:
This study aims to determine the role of military leadership and organizational culture on leaders' performance in the TNI AD Military Police unit. The approach used is descriptive verification with multiple regression methods. The population in the study were 69 POMDAM and DENPOM commanders throughout Indonesia. Data collection used a questionnaire distributed via google forms in one data collection (cross-sectional method). Military leadership variables are measured by task-oriented, relationship-oriented, change-oriented, and external dimensions. Organizational culture variables are measure
Style APA, Harvard, Vancouver, ISO itp.
28

Nikmah, Novia Faqihatun. "Makna Sumpah Pemuda bagi Pelajar MAN 2 Surakarta: Analisis Impresi Buku Teks Sejarah SMA Kelas XI Kurikulum 2013 Revisi." Historiography 1, no. 4 (2021): 487. http://dx.doi.org/10.17977/um081v1i42021p487-493.

Pełny tekst źródła
Streszczenie:
This study aims to determine the conclusions of the analysis and conditions of the Youth Pledge material in the Indonesian History textbook for SMA class XI semester 1 of the 2013 Revised 2017 curriculum used in learning at MAN 2 Surakarta. Another goal is to find out the understanding of students in interpreting a Youth Pledge after learning related to youth oath material in the Indonesian History textbook for SMA class XI semester 1 of the 2013 Revision of the 2017 curriculum. Indonesia SMA class XI semester 1 2013 Revised 2017 curriculum in this study in compiling articles using qualitative
Style APA, Harvard, Vancouver, ISO itp.
29

May, Rhenna, Yoga Wahyu Ferniawan, and Debi Setiawati. "Relevansi Makna Sumpah Pemuda Dalam Menumbuhkan Semangat Nasionalisme." Puteri Hijau : Jurnal Pendidikan Sejarah 8, no. 2 (2023): 184. https://doi.org/10.24114/ph.v8i2.47164.

Pełny tekst źródła
Streszczenie:
Sumpah Pemuda was read on October 28, 1928, as the final result of the Second Indonesian Youth Congress meeting, which until now is usually commemorated every year with the birth of Sumpah Pemuda,, which is one of the important milestones in the history of the Indonesian nation's struggle. In the current era, what role does the meaning of the youth oath play in fostering the spirit of nationalism? Where nationalism itself is a manifestation of his love for his own country. This article was created to find out what the relevance of the meaning of the youth oath is in fostering a spirit of natio
Style APA, Harvard, Vancouver, ISO itp.
30

Nigusie, Adane, Berhanu F. Endehabtu, Dessie Abebaw Angaw, et al. "Status of Compassionate, Respectful, and Caring Health Service Delivery: Scoping Review." JMIR Human Factors 9, no. 1 (2022): e30804. http://dx.doi.org/10.2196/30804.

Pełny tekst źródła
Streszczenie:
Background A compassionate, respectful, and caring (CRC) health professional is very important for human-centered care, serving clients ethically and with respect, adhering to the professional oath, and serving as a model for young professionals. As countries try to achieve universal health coverage (UHC), quality delivery of health services is crucial. CRC health care is an initiative around the need to provide quality care services to clients and patients. However, there is an evidence gap on the status of CRC health care service delivery. Objective This scoping review aimed to map global ev
Style APA, Harvard, Vancouver, ISO itp.
31

Senapartha, I. Kadek Dendy. "Implementasi Single Sign-On Menggunakan Google Identity, REST dan OAuth 2.0 Berbasis Scrum." Jurnal Teknik Informatika dan Sistem Informasi 7, no. 2 (2021). http://dx.doi.org/10.28932/jutisi.v7i2.3437.

Pełny tekst źródła
Streszczenie:
Single Sign-On (SSO) is a technology that can support user convenience in accessing a system. By using SSO, a user only needs to authenticate once to get access to a system. OAuth 2.0 is one of the protocols that can be implemented on the SSO system. Currently, many Application Service Providers (ASP) support the OAuth 2.0 protocol thus providing convenience in the development of a more standard SSO system. Google Identity is one of the services provided by Google that can be used to build SSO systems using the OAuth 2.0 protocol. Application of the request and response methods provided by the
Style APA, Harvard, Vancouver, ISO itp.
32

Azzahra, Fathya Fathimah, Balqis Rosa Sekamayang, and Roni Habibi. "KosConnect dengan Metode Google OAuth dan Payment Gateway Midtrans." Jurnal PROCESSOR 20, no. 1 (2025). https://doi.org/10.33998/processor.2025.20.1.2185.

Pełny tekst źródła
Streszczenie:
KosConnect adalah aplikasi inovatif yang memfasilitasi pencarian, pemesanan, dan pembayaran kos secara digital. Dengan meningkatnya permintaan kos-kosan serta tantangan dalam akses informasi yang efisien, KosConnect hadir dengan mengintegrasikan teknologi modern seperti Google OAuth dan Midtrans untuk meningkatkan pengalaman pengguna. Google OAuth digunakan sebagai metode autentikasi Single Sign-On (SSO) yang lebih praktis, sementara Midtrans sebagai payment gateway mendukung transaksi digital yang aman dan cepat. Aplikasi ini dikembangkan menggunakan bahasa pemrograman Go dan basis data Mongo
Style APA, Harvard, Vancouver, ISO itp.
33

Selvam, P. Arul. "Secure Cloud Services by Integrating CASB Based Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 04, no. 04 (2022). http://dx.doi.org/10.55041/ijsrem15210.

Pełny tekst źródła
Streszczenie:
In the last decades, cloud computing has attracted much attention in business, as it provides numerous computing functions (e.g., Software-as-a- Service (SaaS), Platform as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS). Shadow IT refers to the use of cloud apps and services without the explicit approval of IT. Early on, the practice was one of the main drivers of Cloud Access Security Broker (CASB) adoption. There are two risks we found, they are i.) Users typically use unapproved software-as-a- service (SaaS) applications for file sharing, social media, collaboration and web confere
Style APA, Harvard, Vancouver, ISO itp.
34

Hwong, Jenko. "Analysing and managing risk from third-party OAuth application access." Cyber Security: A Peer-Reviewed Journal, June 1, 2024. http://dx.doi.org/10.69554/ctvc7675.

Pełny tekst źródła
Streszczenie:
Modern cloud application architectures allow users to dynamically grant third-party apps access to their cloud resources. When looking at a large, anonymised dataset of over 600,000 users and their approvals of over 43,000 applications, we found that organisations often are unaware of the magnitude of the access problems: on average, an organisation will grant 440 unique third-party apps access to Google data and resources; one organisation’s users approved 12,330 unique applications; out of all the approved applications, over 44 per cent have been granted access to either sensitive data or al
Style APA, Harvard, Vancouver, ISO itp.
35

Pethad, Chirag Amrutlal. "Subscribe to Google Pub/Sub Topic from Salesforce using Push Method with Apigee Proxy." Journal of Engineering and Applied Sciences Technology, December 31, 2022, 1–6. http://dx.doi.org/10.47363/jeast/2022(4)e126.

Pełny tekst źródła
Streszczenie:
The document outlines the integration of Google Cloud Pub/Sub with Salesforce using a push mechanism by creating an Apigee Proxy API that subscribes to the Pub/Sub and then publishes the messages to a Salesforce REST Api endpoint. Key steps include setting up a Pub-Sub topic, setting up an Apigee Proxy API, creating an Apex REST service in Salesforce to handle incoming messages and implementing OAuth 2.0 for secure authentication. It emphasizes security considerations, testing, and best practices for error handling and scalability, ultimately enhancing Salesforce applications' responsiveness a
Style APA, Harvard, Vancouver, ISO itp.
36

"Ai and Ml Based Google Assistant for an Organization using Google Cloud Platform and Dialogflow." International Journal of Recent Technology and Engineering 8, no. 5 (2020): 2722–27. http://dx.doi.org/10.35940/ijrte.e6354.018520.

Pełny tekst źródła
Streszczenie:
Many people adopting Smart Assistant Devices such as Google Home. Now a days of solely engaging with a service through a keyboard are over. The new modes of user interaction are aided in part by this research will investigate how advancements in Artificial Intelligence and Machine Learning technology are being used to improve many services. In particular, it will look at the development of google assistants as a channel for information distribution. This project is aimed to implement an android-based chatbot to assist with Organization basic processes, using google tools such as Dialogflow tha
Style APA, Harvard, Vancouver, ISO itp.
37

-, Aditya Panday, Anjali Tiwari -, Santosh kr Shukla -, and Priyanka Gupta -. "Analysis of a Modern Blogging Platform Utilizing Advanced Web Technologies." International Journal For Multidisciplinary Research 6, no. 3 (2024). http://dx.doi.org/10.36948/ijfmr.2024.v06i03.21763.

Pełny tekst źródła
Streszczenie:
This study outlines the architecture and features of SocialB, an advanced blogging platform designed to elevate user experience through cutting-edge web technologies. SocialB harnesses Node.js, Express.js, MongoDB, Mongoose, JWT, Google OAuth 2.0, and Multer to establish a robust, secure, and interactive interface. Key functionalities including user authentication, post creation, commenting, and profile management are meticulously examined. With a focus on seamless user interaction and security, SocialB offers a dynamic environment for content creation and engagement. Through its integration o
Style APA, Harvard, Vancouver, ISO itp.
38

Vira, HARSH, Shubham Yadre -, Azam Ali Shaikh -, Raj Vora -, and Preethi Warrier -. "YouTube Video Manager: A Smart Platform for Efficient Video Upload & Management." International Journal For Multidisciplinary Research 7, no. 2 (2025). https://doi.org/10.36948/ijfmr.2025.v07i02.43208.

Pełny tekst źródła
Streszczenie:
The exponential growth in digital content creation has accentuated the inefficiencies inherent in traditional video file transfers, review processes, and scheduling for YouTube content. Conventional methods such as Google Drive, Dropbox, and email lead to delays, mismanagement, and security concerns. This paper presents the design and implementation of the YouTube Video Manager—an end-to-end platform that automates the video upload, review, approval, and scheduling processes. By integrating AWS S3 for secure storage, OAuth for authentication, and the YouTube API for automated publishing, the s
Style APA, Harvard, Vancouver, ISO itp.
39

-, Dinesh Kumar T., Albert Simion S. -, and Maheswari M. -. "Skill Navigator Application with Proctoring AI." International Journal on Science and Technology 16, no. 2 (2025). https://doi.org/10.71097/ijsat.v16.i2.3961.

Pełny tekst źródła
Streszczenie:
The proposed Skill Navigator Application will provide simplified course enrollment, module navigation, and assessments. This will make sure that learning is effective and structured. It provides role-based access to allow students to enroll in courses, complete video-based modules, and take proctoring-enabled assessments to evaluate knowledge while ensuring exam integrity. Proctoring tool can be linked with google forms or Microsoft forms. It enhances exam integrity by detecting suspicious activities, restricting unauthorized access, and providing detailed reports for administrators. Once a sa
Style APA, Harvard, Vancouver, ISO itp.
40

MBAYDAY, Jacob, and Paul DAYANG. "Predicting a User’s Numeric Identity from the Search of Attribute Data." International Journal of Computer Applications Technology and Research, June 2021, 132–77. http://dx.doi.org/10.7753/ijcatr1006.1007.

Pełny tekst źródła
Streszczenie:
In common Internet environments, most of the websites or services constrain the user account creation. Since the Internet is accessible by all and offers more and more services, a user has several accounts on the web. The difficulty in controlling their accounts does not leave indifferent to the users of the web. Hence the use of easy or insecure passwords. This is why we are victims of attacks and forgetting our passwords. Large companies such as Facebook, Google, etc., offer authorization and authentication mechanisms using the Oauth and OpenID protocol, which requires the opening of an acco
Style APA, Harvard, Vancouver, ISO itp.
41

Naveen, Koka. "Code-Free Data Integration for Comprehensive App Development (COAD)." February 29, 2020. https://doi.org/10.5281/zenodo.11079907.

Pełny tekst źródła
Streszczenie:
The COAD (Comprehensive App Development) is a dynamic platform designed to optimize and streamline the deployment and management of applications within organizational settings. With a focus on customization and user-specific configurations, the COAD empowers users to tailor applications to their unique requirements. The platform supports diverse hosting options, enabling deployment in private or public clouds, including popular providers like AWS, Azure, and Google Cloud. One of the COAD's key features is its robust security infrastructure, which seamlessly integrates with various authenticati
Style APA, Harvard, Vancouver, ISO itp.
42

Prathamesh Giradkar, Nayan Meshram, Aditya Pandilwar, Akash Penliwar, and Prof. Manisha More. "MERN Stack Blood Bank Website." International Journal of Advanced Research in Science, Communication and Technology, December 7, 2023, 375–77. http://dx.doi.org/10.48175/ijarsct-14051.

Pełny tekst źródła
Streszczenie:
This paper is focused on Blood blank and donor management system using modern engineering which is a modern React application named Rudhiram. Rudhiram is a web-based application which creates a link between donor and patients who needs blood. Rudhiram is built on using modern java-script front-end framework React.js, with modern state management tools like Redux and uses Node (Express.js) for back-end with new-age database like MongoDB. Rudhiram provides donors a list of nearby blood camps from its database where a person can schedule a visit and donate blood easily with no paperwork. Rudhiram
Style APA, Harvard, Vancouver, ISO itp.
43

Dominik, Bärlocher. "Oh Twitter, Where Art Thou." scip Labs, May 8, 2014. https://doi.org/10.5281/zenodo.3521302.

Pełny tekst źródła
Streszczenie:
This is the tale of how I got locked out of my Twitter Account. During the digital journey of me trying to get it back, I discovered important safety rules when dealing with Twitter, how their system has security gaps leading to the lockout being useless and how Twitter manages to keep their user numbers growing. So here&rsquo;s an account of how the little blue bird goes about doing things.
Style APA, Harvard, Vancouver, ISO itp.
44

Omisore, Adeleye D., Akinola A. Odedeyi, Olusola C. Famurewa, et al. "Establishing Interventional Radiology in a Low-Resource Setting: Lessons From Obafemi Awolowo University Teaching Hospitals Complex, Nigeria." JCO Global Oncology, no. 11 (July 2025). https://doi.org/10.1200/go-24-00637.

Pełny tekst źródła
Streszczenie:
PURPOSE The introduction of an interventional radiology (IR) unit at the Obafemi Awolowo University Teaching Hospitals Complex (OAUTHC) in 2017 marked a significant advancement in health care delivery in a low-resource setting in Nigeria. This study documents the processes, milestones, services, challenges, innovations, and collaborations that have supported the establishment of an IR unit. METHODS We conducted an institutional review board–approved retrospective case study using archival data from the service records (2017-2024). To supplement our findings, we distributed a structured survey
Style APA, Harvard, Vancouver, ISO itp.
45

Tirab, Dr Preer Alradiy Mohammed. "Islam Objectives and lessons from its legitimacy in Islamic law." ARID International Journal of Social Sciences and Humanities, July 15, 2024, 131–49. http://dx.doi.org/10.36772/arid.aijssh.2024.6128.

Pełny tekst źródła
Streszczenie:
The study aimed to clarify the rule of expiation and the aim of its legitimacy in Islamic law, with identification of how to achieve the Islamic ritual when a Muslim commits a mistake that requires expiation, in addition to the challenges facing the Muslim community in achieving this act of worship. Where the study relied on the descriptive approach and the inductive approach to achieve the objectives of that study, and therefore through the use of the questionnaire tool that was designed through Google models in the period from (2022-2023 AD), the study sample consisted of a number of social
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!