Keil, 2023 - Google Patents
Social SecurityKeil, 2023
- Document ID
- 16768556456028217925
- Author
- Keil W
- Publication year
- Publication venue
- Enterprise Social for the Java Platform: Shares, Mashups, Likes, and Ways to Integrate Social Media into Your Cloud Native Enterprise Java Applications
External Links
Snippet
The surge of cybersecurity attacks has nowadays created the need for defending our organization on multiple security fronts, be it physical, technological, or policies and procedures. Each one of the aforementioned fronts is equally important to your …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lundkvist et al. | Uport: A platform for self-sovereign identity | |
| US8353016B1 (en) | Secure portable store for security skins and authentication information | |
| US8220035B1 (en) | System and method for trusted embedded user interface for authentication | |
| US8555078B2 (en) | Relying party specifiable format for assertion provider token | |
| CN106063219B (en) | System and method for biometric protocol standards | |
| Boyd | Getting started with OAuth 2.0 | |
| US9686080B2 (en) | System and method to provide secure credential | |
| US9300653B1 (en) | Delivery of authentication information to a RESTful service using token validation scheme | |
| US20100250955A1 (en) | Brokered information sharing system | |
| US20130125222A1 (en) | System and Method for Vetting Service Providers Within a Secure User Interface | |
| Ferry et al. | Security evaluation of the OAuth 2.0 framework | |
| Grimes | Hacking multifactor authentication | |
| US20080263644A1 (en) | Federated authorization for distributed computing | |
| GB2554082B (en) | User sign-in and authentication without passwords | |
| JP2011522327A (en) | Authentication limited to trusted equipment | |
| Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
| Abdelrazig Abubakar et al. | Blockchain-based identity and authentication scheme for MQTT protocol | |
| LeBlanc et al. | Identity and data security for web development: Best practices | |
| CN118381626B (en) | Inter-application authentication method, device and readable storage medium | |
| Abubakar-Sadiq | Establishing secure and privacy preserving digital identity with self-sovereign identity | |
| Keil | Social Security | |
| Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
| Fietkau et al. | Secure authentication for everyone! Enabling 2nd-factor authentication under real-world constraints | |
| Gupta et al. | Two-factor authentication using QR code and OTP | |
| Paul et al. | UI Component and Authentication |