Ollila et al., 2024 - Google Patents
Authorization and OAuth 2.0 in Frends Integration PlatformOllila et al., 2024
View PDF- Document ID
- 2576685195523641930
- Author
- Ollila J
- Galkin O
- Leppänen V
- Papalitsas J
- Publication year
External Links
Snippet
Through the research, the thesis reveals differences in how integration platforms handle authorization, which are primarily affected by the architecture and the primary use case of the platforms. It also identifies key privacy and security threats against these platforms such …
- 238000013475 authorization 0 title abstract description 350
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6625636B2 (en) | Identity infrastructure as a service | |
Boyd | Getting started with OAuth 2.0 | |
Belapurkar et al. | Distributed systems security: issues, processes and solutions | |
Shivakumar et al. | DXP Security | |
Chandramouli et al. | Attribute-based access control for microservices-based applications using a service mesh | |
Ollila et al. | Authorization and OAuth 2.0 in Frends Integration Platform | |
Asemi | A Study On API Security Pentesting | |
Tai Ramirez | A Framework To Build Secure Microservice Architecture | |
Ramirez | A Framework to Build Secure Microservice Architecture | |
da Silva Torres | Identity management: analysis of secure authentication propositions | |
Paul et al. | UI Component and Authentication | |
US20240154968A1 (en) | Techniques for unifying multiple identity clouds | |
Stöcklin | Evaluating SSH for modern deployments | |
Urban | Zabezpečení distribuovaných cloudových systémů | |
Brunet | Consulting in computer systems and software | |
Kumar et al. | A Model Apporach for Identity and Access Management (IAM) System in the Cloud | |
Ots | Hardening Azure OpenAI Service for Enterprise Usage | |
De | API Security | |
Tapas et al. | Toward Trustless Internet of Things: a Blockchain-based approach | |
Pietilä | Implementing passwordless identity and access management system for a web application | |
Χριστινάκης | Auditing and extending security features of OAuth 2.0 framework | |
Keil | Social Security | |
Wu | Authentication in Web Applications | |
Edge et al. | Identity and Device Trust | |
Haber et al. | Understanding Enterprise Identity |