Security Issues in OAuth 2.0 SSO Implementations
| dc.contributor.author | Li, Wanpeng | |
| dc.contributor.author | Mitchell, Chris | |
| dc.contributor.editor | Chow, SSM | |
| dc.contributor.editor | Camenisch , J | |
| dc.contributor.editor | Hui , LCK | |
| dc.contributor.editor | Yui, SM | |
| dc.contributor.institution | University of Aberdeen.Computing Science | en |
| dc.date.accessioned | 2020-12-10T16:01:01Z | |
| dc.date.available | 2020-12-10T16:01:01Z | |
| dc.date.embargoedUntil | 2015-10-14 | |
| dc.date.issued | 2014-10-14 | |
| dc.format.extent | 13 | |
| dc.format.extent | 216408 | |
| dc.identifier | 171416533 | |
| dc.identifier | a307130c-eca2-4b7a-8ede-4deaf401f135 | |
| dc.identifier | 84921322964 | |
| dc.identifier.citation | Li, W & Mitchell, C 2014, Security Issues in OAuth 2.0 SSO Implementations. in SSM Chow, J Camenisch , LCK Hui & SM Yui (eds), International Conference on Information Security. Lecture Notes in Computer Science, vol. 8783, Springer , Cham, pp. 529-541. https://doi.org/10.1007/978-3-319-13257-0_34 | en |
| dc.identifier.doi | 10.1007/978-3-319-13257-0_34 | |
| dc.identifier.isbn | 978-3-319-13256-3 | |
| dc.identifier.isbn | 978-3-319-13257-0 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.other | ORCID: /0000-0002-6396-9578/work/86450453 | |
| dc.identifier.uri | https://hdl.handle.net/2164/15495 | |
| dc.language.iso | eng | |
| dc.publisher | Springer | |
| dc.relation.ispartof | International Conference on Information Security | en |
| dc.relation.ispartofseries | Lecture Notes in Computer Science | en |
| dc.subject | user agent | en |
| dc.subject | resource owner | en |
| dc.subject | identity provider | en |
| dc.subject | security assertion markup language | en |
| dc.subject | identity federation | en |
| dc.subject | QA75 Electronic computers. Computer science | en |
| dc.subject.lcc | QA75 | en |
| dc.title | Security Issues in OAuth 2.0 SSO Implementations | en |
| dc.type | Conference item | en |
Files
Original bundle
1 - 1 of 1
