Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 239, Issue Chttps://doi.org/10.1016/j.comnet.2023.110130AbstractModern technology advancements such as Software Defined Networking (SDN) have been employed in distinct scenarios such as cloud computing and wireless networks, and have made network administration simpler since it gives greater flexibility in ...
- research-articleMarch 2022
Best current practices for OAuth/OIDC Native Apps
Journal of Information Security and Applications (JISA), Volume 65, Issue Chttps://doi.org/10.1016/j.jisa.2021.103097AbstractOAuth 2.0 and OpenID Connect have been extensively integrated into mobile applications during recent years to manage access delegation and reduce password fatigue via a single sign-on experience. To provide a precise specification for ...
- research-articleOctober 2020
Privacy-Preserving OpenID Connect
ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications SecurityPages 277–289https://doi.org/10.1145/3320269.3384724OpenID Connect is the most widely used Internet protocol for delegated authentication today. It provides single sign-on functionality for users who use their account with an identity provider to authenticate to different services, called relying ...
- research-articleJanuary 2020
An efficient privacy solution for electronic health records in cloud computing
International Journal of High Performance Systems Architecture (IJHPSA), Volume 9, Issue 4Pages 201–214https://doi.org/10.1504/ijhpsa.2020.113681Cloud computing is generally seen as the most practical and efficient way to build and deploy electronic medical records (EMR) due to advantages such as scalability and cost savings. However, existing solutions are not mature enough to protect patient ...
- research-articleJanuary 2019
Trust-based identity sharing for token grants
ICCSP '19: Proceedings of the 3rd International Conference on Cryptography, Security and PrivacyPages 168–173https://doi.org/10.1145/3309074.3309078Authentication and authorization are two key elements of a software application. In modern day, OAuth 2.0 framework and OpenID Connect protocol are widely adopted standards fulfilling these requirements. These protocols are implemented into ...
- articleSeptember 2018
Extending OpenID Connect Towards Mission Critical Applications
Cybernetics and Information Technologies (CYBAIT), Volume 18, Issue 3Pages 93–110https://doi.org/10.2478/cait-2018-0041AbstractSingle Sign-On (SSO) decreases the complexity and eases the burden of managing many accounts with a single authentication mechanism. Mission critical application such as banking demands highly trusted identity provider to authenticate its users. ...