Al-Sinani et al., 2010 - Google Patents
CardSpace-Liberty integration for CardSpace usersAl-Sinani et al., 2010
View PDF- Document ID
- 16160078162802370957
- Author
- Al-Sinani H
- Alrodhan W
- Mitchell C
- Publication year
- Publication venue
- Proceedings of the 9th Symposium on Identity and Trust on the Internet
External Links
Snippet
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of interoperability between such systems. In this paper we propose a novel scheme to provide …
- 238000004450 types of analysis 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9300653B1 (en) | Delivery of authentication information to a RESTful service using token validation scheme | |
Sun et al. | The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems | |
Fett et al. | Spresso: A secure, privacy-respecting single sign-on system for the web | |
CN104378376A (en) | SOA-based single-point login method, authentication server and browser | |
Vasileios Grammatopoulos et al. | A web tool for analyzing FIDO2/WebAuthn Requests and Responses | |
Ribeiro de Mello et al. | Multi-factor authentication for shibboleth identity providers | |
Bichsel et al. | An architecture for privacy-ABCs | |
Li et al. | Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations | |
Al-Sinani et al. | CardSpace-Liberty integration for CardSpace users | |
Al-Sinani et al. | Client-based cardspace-openid interoperation | |
Axeland et al. | Security analysis of attack surfaces on the grant negotiation and authorization protocol | |
Al-Sinani | Integrating OAuth with information card systems | |
Monga et al. | An OAuth-based authentication mechanism for open messaging interface standard | |
James | Web single sign-on systems | |
Telang | MicroProfile JSON Web Tokens and Jakarta Security | |
Wrage et al. | T-Check in Technologies for Interoperability: Web Services and Security—Single Sign-On | |
Al-Sinani | Browser extension-based interoperation between OAuth and information card-based systems | |
Ofleh | Future of Identity and Access Management: The OpenID Connect Protocol | |
Kivinen | OpenID Connect Provider Certification | |
Paul | Authentication and Authorization for the front-end web developer | |
Barabonkov | Guarda: A web application firewall for WebAuthn transaction authentication | |
Hühnlein et al. | Options for integrating eID and SAML | |
Al‐Sinani et al. | Enabling interoperation between Shibboleth and Information Card systems | |
Nishimura et al. | Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding | |
Χριστινάκης | Auditing and extending security features of OAuth 2.0 framework |