Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
OAuth
biblio
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting
Submitted by aekwall on Tue, 10/12/2021 - 3:12pm
authorization
Compositionality
Cryptographic Protocols
OAuth
Predictive Metrics
provable security
pubcrawl
Resiliency
security model
biblio
An Extensive Formal Security Analysis of the OpenID Financial-Grade API
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
Security-Protocols
OpenID Financial-grade API
OpenID Foundation
OpenID-Connect
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
Open-banking-API
Servers
Single-Sign-On
standards
Web Infrastructure Model
web services
web-based APIs
web-based environment
web-security
formal security analysis
application program interfaces
authentication
authorisation
authorization
bank data processing
Banking
FAPI
Financial-grade-API
Analytical models
Formal-Analysis
Human behavior
Metrics
OAuth
OAuth 2.0 design
Open Banking APIs
Open Banking security profile
biblio
SciTokens: Capability-Based Secure Access to Remote Scientific Data
Submitted by aekwall on Mon, 10/28/2019 - 10:39am
capabilities
Compositionality
distributed computing
OAuth
Predictive Metrics
pubcrawl
Resiliency
Scientific Computing Security
biblio
An IDMS approach towards privacy and new requirements in IoT
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
mobile clients
user-centric
service provider
Scalability
Resiliency
pubcrawl
private information
privacy
personal authentication device
PAD
OAuth
Mobility
mobile radio
AVISPA
IoT identity management system
Internet of Things
IDMS
Identity provider IoT
Identity management
Human behavior
EAP
DTLS
domain
data privacy
Cryptographic Protocols
Cardinality
biblio
Choice of suitable Identity and Access Management standards for mobile computing and communication
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
OAuth
XML
SSO
security assertion markup language
Scalability
SAML
Resiliency
pubcrawl
openid connect
open authentication
OIDC
authentication
mobile computing-based business model
Mobile Computing and Communication
mobile computing
Mobile communication
Identity management
identity and access management standards
Identity and Access Management
IAM
Human behavior
authorization
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM
biblio
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
integrity
web services
verifiable delegated authorization protocol
user-centric architectures
third party Web services
Servers
Resiliency
pubcrawl
Protocols
privilege revocation
outsourcing
Outsourced Database Integrity
OAuth2 protocol
OAuth
Metrics
Access Control
identity
database updates
data structures
Data models
data access
Cryptography
Cryptographic Protocols
correctness
composability
Cloud Computing
cloud
authorization
authorisation
authenticated data structure protocol
biblio
UnlimitID: Privacy-Preserving Federated Identity Management Using Algebraic MACs
Submitted by grigby1 on Tue, 06/27/2017 - 1:04pm
aMACs
attribute-based credentials
federated identity management
Human behavior
Identity management
IDP mix-up
Metrics
OAuth
openid connect
privacy
pseudo-identities
pubcrawl
Resiliency
Scalability
unlinkability
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
EUDAT collaborative data infrastructure
Unicore project
Servers
SAML
Portals
PKI
Open ID
OAuth
groupware
federated identity management
federated authentication
AAI
EUDAT
distributed data infrastructure
credential translation
Contrail project
Communities
Bridges
authorization
authorisation
authentication and authorisation infrastructure
authentication
1
2
next ›
last »