OAuth

Results: 220



#Item
31Cloud standards / Computer access control / OAuth / Federated identity / Cloud infrastructure / XACML / Cloud computing / User-Managed Access / Application programming interface / Web 2.0 / Spring Framework

User-centered Security Management of API-based Data Integration Workflows

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-05-12 06:20:07
32Computer access control / Identity management / Federated identity / Cloud standards / OpenID / OAuth / Security Assertion Markup Language / Password manager / Single sign-on / XRDS / Authentication / Phishing

Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-04-20 11:46:50
33Computer access control / Internet protocols / Cloud standards / Digital media / Mobile content / Universal Plug and Play / OAuth / Authentication / Application programming interface / Mediascape

Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – Multi-connection and authentication

Add to Reading List

Source URL: www.mediascapeproject.eu

Language: English - Date: 2015-11-20 12:57:38
34Computer access control / Identity management / Computer security / Identity / Federated identity / Cloud standards / OAuth / Information Card / Location-based service / Internet privacy / Authentication / Identity management system

The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

Add to Reading List

Source URL: npdoty.name

Language: English - Date: 2014-03-25 02:38:49
35Ajax / Invoice / Application programming interface / JSON / EWay / OAuth / Null

GoCoin: Merchant integration guide More information can be found at help.gocoin.com Preface This guide is intended for Merchants who wish to use the GoCoin API to accept and process payments in Cryptocurrency. Depending

Add to Reading List

Source URL: www.gocoin.com

Language: English - Date: 2015-03-17 19:42:54
36Hacking / Cloud standards / Computer access control / Computer network security / Web development / JavaScript / HTTP cookie / Password manager / Cross-site request forgery / Cross-site scripting / Browser security / OAuth

Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

Add to Reading List

Source URL: www.defensivejs.com

Language: English - Date: 2013-08-15 09:17:30
37Computing / Computer access control / Cloud standards / Internet protocols / OAuth / Computer security / UMA / Host / Identity management / User-Managed Access

Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May

Add to Reading List

Source URL: www.xmlgrrl.com

Language: English - Date: 2012-11-17 22:42:46
38

Identity Management Hannes Tschofenig Motivation • OAuth was created to allow secure and privacy friendly sharing of data.

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-03-25 19:14:39
    39Computer access control / Computing / Computer security / OAuth / Authorization / HTTP cookie / Session / Web application / One-time authorization code / User-Managed Access

    Authorization and Bulk Transfer in Green Button Connect My Data:19:22 PM Table of Contents Table of Contents ii Table of Figures iii

    Add to Reading List

    Source URL: osgug.ucaiug.org

    Language: English - Date: 2015-07-27 21:23:51
    40

    Application Impersonation: Problems of OAuth and API Design in Online Social Networks Pili Hu1 , Ronghai Yang1 , Yue Li2 and Wing Cheong Lau1 1 Department of Information Engineering, The Chinese University of Hong Kong

    Add to Reading List

    Source URL: cosn.acm.org

    Language: English - Date: 2014-09-11 04:01:07
      UPDATE