DISTINCT: identity theft using in-browser communications in dual-window single sign-on
Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of
modern web security, and have received much academic attention. Users sign in at a trusted …
modern web security, and have received much academic attention. Users sign in at a trusted …
Oauthguard: Protecting user security and privacy with oauth 2.0 and openid connect
Millions of users routinely use Google to log in to websites supporting the standardised
protocols OAuth 2.0 or OpenID Connect; the security of OAuth 2.0 and OpenID Connect is …
protocols OAuth 2.0 or OpenID Connect; the security of OAuth 2.0 and OpenID Connect is …
User access privacy in OAuth 2.0 and OpenID connect
Currently widely used federated login (single sign-on) systems, notably those based on
OAuth 2.0, offer very little privacy for the user, and as a result the identity provider (eg …
OAuth 2.0, offer very little privacy for the user, and as a result the identity provider (eg …
OAuch: Exploring security compliance in the OAuth 2.0 ecosystem
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been
proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue …
proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue …
Descriptive Analysis of Built-in Security Features in Web Development Frameworks
Many challenges are facing modern web applications, and security is a major concern for
web applications developers especially when today's web applications are interactive and …
web applications developers especially when today's web applications are interactive and …
[HTML][HTML] Securing the Gatekeeper: Addressing Vulnerabilities in OAuth Implementations for Enhanced Web Security
This research delves into the vulnerabilities associated with the OAuth protocol, which plays
a role, in web security by allowing third party applications to access online services. Despite …
a role, in web security by allowing third party applications to access online services. Despite …
Managing a secure refresh token implementation with json web token in rest api
Abstract JSON Web Token (JWT) is a compact and self-contained mechanism, digitally
authenticated and trusted, for transmitting data between various parties. They are mainly …
authenticated and trusted, for transmitting data between various parties. They are mainly …
On the perils of leaking referrers in online collaboration services
Online collaboration services (OCS) are appealing since they provide ease of access to
resources and the ability to collaborate on shared files. Documents on these services are …
resources and the ability to collaborate on shared files. Documents on these services are …
[PDF][PDF] How trustworthy is the Trusted Digital Identity Framework?
B Frengley - 2020 - bfrengley.github.io
Abstract The Trusted Digital Identity Framework (TDIF) is a digital identity management
system recently released by the Australian government. It features a brokered model in …
system recently released by the Australian government. It features a brokered model in …