Security evaluation of the OAuth 2.0 framework

作者: Eugene Ferry , John O Raw , Kevin Curran

DOI: 10.1108/ICS-12-2013-0089

关键词:

摘要: … were in the list of 21 OAuth-enabled sites. The OAuth 2.0 specification is still very much in its … a relatively secure and interoperable authentication delegation mechanism. The IETF are …

参考文章(29)
Konstantin Beznosov, Ildar Muslukhov, Yazan Boshmaf, Matei Ripeanu, Key challenges in defending against malicious socialbots usenix conference on large scale exploits and emergent threats. pp. 12- 12 ,(2012)
Lin-Shung Huang, Alex Moshchuk, Helen J Wang, Stuart Schecter, Collin Jackson, None, Clickjacking: attacks and defenses usenix security symposium. pp. 22- 22 ,(2012)
Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis, Discovering concrete attacks on website authorization by formal analysis Journal of Computer Security. ,vol. 22, pp. 601- 657 ,(2014) , 10.3233/JCS-140503
Chuck Mortimore, Yaron Goland, Michael Jones, Brian Campbell, Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants RFC. ,vol. 7521, pp. 1- 20 ,(2015)
Zeljko Obrenovic, Bart den Haak, Integrating User Customization and Authentication: The Identity Crisis ieee symposium on security and privacy. ,vol. 10, pp. 82- 85 ,(2012) , 10.1109/MSP.2012.119
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu, The socialbot network: when bots socialize for fame and money annual computer security applications conference. pp. 93- 102 ,(2011) , 10.1145/2076732.2076746
Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Abolghasem Pashang, A survey on security issues of federated identity in the cloud computing ieee international conference on cloud computing technology and science. pp. 532- 565 ,(2012) , 10.1109/CLOUDCOM.2012.6427513
Ke Liu, Ke Xu, OAuth Based Authentication and Authorization in Open Telco API international conference on computer science and electronics engineering. ,vol. 1, pp. 176- 179 ,(2012) , 10.1109/ICCSEE.2012.275
Eric Grosse, Mayank Upadhyay, Authentication at Scale ieee symposium on security and privacy. ,vol. 11, pp. 15- 22 ,(2013) , 10.1109/MSP.2012.162
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis, Discovering Concrete Attacks on Website Authorization by Formal Analysis ieee computer security foundations symposium. pp. 247- 262 ,(2012) , 10.1109/CSF.2012.27