[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ollila et al., 2024 - Google Patents

Authorization and OAuth 2.0 in Frends Integration Platform

Ollila et al., 2024

View PDF
Document ID
2576685195523641930
Author
Ollila J
Galkin O
Leppänen V
Papalitsas J
Publication year

External Links

Snippet

Through the research, the thesis reveals differences in how integration platforms handle authorization, which are primarily affected by the architecture and the primary use case of the platforms. It also identifies key privacy and security threats against these platforms such …
Continue reading at www.utupub.fi (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Similar Documents

Publication Publication Date Title
JP6625636B2 (en) Identity infrastructure as a service
Boyd Getting started with OAuth 2.0
Belapurkar et al. Distributed systems security: issues, processes and solutions
Shivakumar et al. DXP Security
Chandramouli et al. Attribute-based access control for microservices-based applications using a service mesh
Ollila et al. Authorization and OAuth 2.0 in Frends Integration Platform
Asemi A Study On API Security Pentesting
Tai Ramirez A Framework To Build Secure Microservice Architecture
Ramirez A Framework to Build Secure Microservice Architecture
da Silva Torres Identity management: analysis of secure authentication propositions
Paul et al. UI Component and Authentication
US20240154968A1 (en) Techniques for unifying multiple identity clouds
Stöcklin Evaluating SSH for modern deployments
Urban Zabezpečení distribuovaných cloudových systémů
Brunet Consulting in computer systems and software
Kumar et al. A Model Apporach for Identity and Access Management (IAM) System in the Cloud
Ots Hardening Azure OpenAI Service for Enterprise Usage
De API Security
Tapas et al. Toward Trustless Internet of Things: a Blockchain-based approach
Pietilä Implementing passwordless identity and access management system for a web application
Χριστινάκης Auditing and extending security features of OAuth 2.0 framework
Keil Social Security
Wu Authentication in Web Applications
Edge et al. Identity and Device Trust
Haber et al. Understanding Enterprise Identity