[go: up one dir, main page]

Keil, 2023 - Google Patents

Social Security

Keil, 2023

Document ID
16768556456028217925
Author
Keil W
Publication year
Publication venue
Enterprise Social for the Java Platform: Shares, Mashups, Likes, and Ways to Integrate Social Media into Your Cloud Native Enterprise Java Applications

External Links

Snippet

The surge of cybersecurity attacks has nowadays created the need for defending our organization on multiple security fronts, be it physical, technological, or policies and procedures. Each one of the aforementioned fronts is equally important to your …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Lundkvist et al. Uport: A platform for self-sovereign identity
US8353016B1 (en) Secure portable store for security skins and authentication information
US8220035B1 (en) System and method for trusted embedded user interface for authentication
US8555078B2 (en) Relying party specifiable format for assertion provider token
CN106063219B (en) System and method for biometric protocol standards
Boyd Getting started with OAuth 2.0
US9686080B2 (en) System and method to provide secure credential
US9300653B1 (en) Delivery of authentication information to a RESTful service using token validation scheme
US20100250955A1 (en) Brokered information sharing system
US20130125222A1 (en) System and Method for Vetting Service Providers Within a Secure User Interface
Ferry et al. Security evaluation of the OAuth 2.0 framework
Grimes Hacking multifactor authentication
US20080263644A1 (en) Federated authorization for distributed computing
GB2554082B (en) User sign-in and authentication without passwords
JP2011522327A (en) Authentication limited to trusted equipment
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Abdelrazig Abubakar et al. Blockchain-based identity and authentication scheme for MQTT protocol
LeBlanc et al. Identity and data security for web development: Best practices
CN118381626B (en) Inter-application authentication method, device and readable storage medium
Abubakar-Sadiq Establishing secure and privacy preserving digital identity with self-sovereign identity
Keil Social Security
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Fietkau et al. Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints
Gupta et al. Two-factor authentication using QR code and OTP
Paul et al. UI Component and Authentication