[go: up one dir, main page]

Al-Sinani et al., 2010 - Google Patents

CardSpace-Liberty integration for CardSpace users

Al-Sinani et al., 2010

View PDF
Document ID
16160078162802370957
Author
Al-Sinani H
Alrodhan W
Mitchell C
Publication year
Publication venue
Proceedings of the 9th Symposium on Identity and Trust on the Internet

External Links

Snippet

Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of interoperability between such systems. In this paper we propose a novel scheme to provide …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
US9300653B1 (en) Delivery of authentication information to a RESTful service using token validation scheme
Sun et al. The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
Fett et al. Spresso: A secure, privacy-respecting single sign-on system for the web
CN104378376A (en) SOA-based single-point login method, authentication server and browser
Vasileios Grammatopoulos et al. A web tool for analyzing FIDO2/WebAuthn Requests and Responses
Ribeiro de Mello et al. Multi-factor authentication for shibboleth identity providers
Bichsel et al. An architecture for privacy-ABCs
Li et al. Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations
Al-Sinani et al. CardSpace-Liberty integration for CardSpace users
Al-Sinani et al. Client-based cardspace-openid interoperation
Axeland et al. Security analysis of attack surfaces on the grant negotiation and authorization protocol
Al-Sinani Integrating OAuth with information card systems
Monga et al. An OAuth-based authentication mechanism for open messaging interface standard
James Web single sign-on systems
Telang MicroProfile JSON Web Tokens and Jakarta Security
Wrage et al. T-Check in Technologies for Interoperability: Web Services and Security—Single Sign-On
Al-Sinani Browser extension-based interoperation between OAuth and information card-based systems
Ofleh Future of Identity and Access Management: The OpenID Connect Protocol
Kivinen OpenID Connect Provider Certification
Paul Authentication and Authorization for the front-end web developer
Barabonkov Guarda: A web application firewall for WebAuthn transaction authentication
Hühnlein et al. Options for integrating eID and SAML
Al‐Sinani et al. Enabling interoperation between Shibboleth and Information Card systems
Nishimura et al. Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding
Χριστινάκης Auditing and extending security features of OAuth 2.0 framework