2017
DOI: 10.1016/j.cose.2017.04.011
|View full text |Cite
|
Sign up to set email alerts
|

Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 1 publication
0
9
0
Order By: Relevance
“…As identified in [6], the two requirements that we expect for a native SSO solution are: (i) the IdP user credentials can be used to gain access to several SP C apps-this implies that a User does not need to have credentials with a SP C to access it; (ii) if a User has already a login session with an IdP S , then she can access new SP C apps without re-entering her IdP credentials-only the User consent is required.…”
Section: Multi-factor Authentication and Native Ssomentioning
confidence: 99%
See 4 more Smart Citations
“…As identified in [6], the two requirements that we expect for a native SSO solution are: (i) the IdP user credentials can be used to gain access to several SP C apps-this implies that a User does not need to have credentials with a SP C to access it; (ii) if a User has already a login session with an IdP S , then she can access new SP C apps without re-entering her IdP credentials-only the User consent is required.…”
Section: Multi-factor Authentication and Native Ssomentioning
confidence: 99%
“…As the S steps can vary depending on the choices of the SP developers, in our analysis, we will focus on the A steps. Compared to the protocol flow proposed in [6], we have enhanced its security by adding the generation, exchange and validation of OTPs. For example, the OTP extension protects mainly against a stolen smartphone.…”
Section: −1mentioning
confidence: 99%
See 3 more Smart Citations