31![User-centered Security Management of API-based Data Integration Workflows User-centered Security Management of API-based Data Integration Workflows](https://www.pdfsearch.io/img/c16e23f8f576efa7f63839347c2278b8.jpg) | Add to Reading ListSource URL: demo.a-sit.atLanguage: English - Date: 2016-05-12 06:20:07
|
---|
32![Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk](https://www.pdfsearch.io/img/c8fe4f8fb80eee9b09cdf49133d5af78.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2016-04-20 11:46:50
|
---|
33![Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – Multi-connection and authentication Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – Multi-connection and authentication](https://www.pdfsearch.io/img/0332f58fa1bd840b052abf4d892b998b.jpg) | Add to Reading ListSource URL: www.mediascapeproject.euLanguage: English - Date: 2015-11-20 12:57:38
|
---|
34![The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT](https://www.pdfsearch.io/img/61b1e627a805347e74d348e19f871040.jpg) | Add to Reading ListSource URL: npdoty.nameLanguage: English - Date: 2014-03-25 02:38:49
|
---|
35![GoCoin: Merchant integration guide More information can be found at help.gocoin.com Preface This guide is intended for Merchants who wish to use the GoCoin API to accept and process payments in Cryptocurrency. Depending GoCoin: Merchant integration guide More information can be found at help.gocoin.com Preface This guide is intended for Merchants who wish to use the GoCoin API to accept and process payments in Cryptocurrency. Depending](https://www.pdfsearch.io/img/7ee85d94f0f013fce2e0af8a51010956.jpg) | Add to Reading ListSource URL: www.gocoin.comLanguage: English - Date: 2015-03-17 19:42:54
|
---|
36![Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of](https://www.pdfsearch.io/img/355f92b1ff03a3e4eedbf85e5fe95b64.jpg) | Add to Reading ListSource URL: www.defensivejs.comLanguage: English - Date: 2013-08-15 09:17:30
|
---|
37![Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May Scoped Access With UMA Eve Maler and Maciej Machulak on behalf of and with thanks to the UMA Work Group IIW 12 – May](https://www.pdfsearch.io/img/1e0443ce2e2d349de494f84c29c50883.jpg) | Add to Reading ListSource URL: www.xmlgrrl.comLanguage: English - Date: 2012-11-17 22:42:46
|
---|
38![Identity Management Hannes Tschofenig
Motivation • OAuth was created to allow secure and privacy friendly sharing of data. Identity Management Hannes Tschofenig
Motivation • OAuth was created to allow secure and privacy friendly sharing of data.](https://www.pdfsearch.io/img/88c470b33c141ef1a5aa912d871c54b7.jpg) | Add to Reading ListSource URL: www.w3.orgLanguage: English - Date: 2014-03-25 19:14:39
|
---|
39![Computer access control / Computing / Computer security / OAuth / Authorization / HTTP cookie / Session / Web application / One-time authorization code / User-Managed Access Computer access control / Computing / Computer security / OAuth / Authorization / HTTP cookie / Session / Web application / One-time authorization code / User-Managed Access](/pdf-icon.png) | Add to Reading ListSource URL: osgug.ucaiug.orgLanguage: English - Date: 2015-07-27 21:23:51
|
---|
40![Application Impersonation: Problems of OAuth and API Design in Online Social Networks Pili Hu1 , Ronghai Yang1 , Yue Li2 and Wing Cheong Lau1 1 Department of Information Engineering, The Chinese University of Hong Kong Application Impersonation: Problems of OAuth and API Design in Online Social Networks Pili Hu1 , Ronghai Yang1 , Yue Li2 and Wing Cheong Lau1 1 Department of Information Engineering, The Chinese University of Hong Kong](https://www.pdfsearch.io/img/6c81544eeb5f4e35fb452702cc676097.jpg) | Add to Reading ListSource URL: cosn.acm.orgLanguage: English - Date: 2014-09-11 04:01:07
|
---|