Show simple item record

dc.contributor.authorLi, Wanpeng
dc.contributor.authorMitchell, Chris
dc.contributor.editorChow, SSM
dc.contributor.editorCamenisch , J
dc.contributor.editorHui , LCK
dc.contributor.editorYui, SM
dc.date.accessioned2020-12-10T16:01:01Z
dc.date.available2020-12-10T16:01:01Z
dc.date.issued2014-10-14
dc.identifier.citationLi , W & Mitchell , C 2014 , Security Issues in OAuth 2.0 SSO Implementations . in SSM Chow , J Camenisch , LCK Hui & SM Yui (eds) , International Conference on Information Security . Lecture Notes in Computer Science , vol. 8783 , Springer , Cham , pp. 529-541 . https://doi.org/10.1007/978-3-319-13257-0_34en
dc.identifier.isbn978-3-319-13256-3
dc.identifier.isbn978-3-319-13257-0
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 171416533
dc.identifier.otherPURE UUID: a307130c-eca2-4b7a-8ede-4deaf401f135
dc.identifier.otherScopus: 84921322964
dc.identifier.otherORCID: /0000-0002-6396-9578/work/86450453
dc.identifier.urihttps://hdl.handle.net/2164/15495
dc.format.extent13
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofInternational Conference on Information Securityen
dc.relation.ispartofseriesLecture Notes in Computer Scienceen
dc.subjectuser agenten
dc.subjectresource owneren
dc.subjectidentity provideren
dc.subjectsecurity assertion markup languageen
dc.subjectidentity federationen
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subject.lccQA75en
dc.titleSecurity Issues in OAuth 2.0 SSO Implementationsen
dc.typeConference itemen
dc.contributor.institutionUniversity of Aberdeen.Computing Scienceen
dc.description.versionPostprinten
dc.identifier.doihttps://doi.org/10.1007/978-3-319-13257-0_34
dc.date.embargoedUntil2015-10-14


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record