2015 International Conference and Workshop on Computing and Communication (IEMCON) 2015
DOI: 10.1109/iemcon.2015.7344461
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of an OAuth 2.0 protocol implementation for web server applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…We have implemented the proposed model as an extension of FIWARE Keyrock Generic Enabler. Keyrock is the Identity Management GEri (Generic Enabler reference implementation) of FIWARE 5 and it brings support to secure and private OAuth 2.0-based authentication of users and devices, user profile management, privacy-preserving disposition of personal data, Single Sign-On (SSO) and Identity Federation across multiple administration domains.…”
Section: B Fiware Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…We have implemented the proposed model as an extension of FIWARE Keyrock Generic Enabler. Keyrock is the Identity Management GEri (Generic Enabler reference implementation) of FIWARE 5 and it brings support to secure and private OAuth 2.0-based authentication of users and devices, user profile management, privacy-preserving disposition of personal data, Single Sign-On (SSO) and Identity Federation across multiple administration domains.…”
Section: B Fiware Implementationmentioning
confidence: 99%
“…Therefore, when asking for the username in the specific step of Figure 7, citizens have to provide their email address to check if their account already exists in the database. To avoid identity theft, they receive a confirmation email that has to be acknowledged 5 https://fiware-idm.readthedocs.io 6 https://www.npmjs.com/package/saml2-js before continuing the process. In case the eIDAS profile of a citizen has to be created or updated in Keyrock, the following actions are performed: As explained above, when an application requests the user information using an OAuth 2.0 access token, the eIDAS profile of the user is included in the response.…”
Section: B Fiware Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…OAuth is an Authorization Protocol rather than Authentication Protocol, It is open standard for access delegation, It provides to clients a secure delegated access to server, resources on behalf of a resource owner, OAuth is a framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by arranging an agreement to approve interface in between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf [6]. The resource server is the server that hosts the protected resources, which can accept and respond to protected resource that requests using access tokens.…”
Section: B Oauthmentioning
confidence: 99%
“…Performance of OAuth 2.0 protocol is also presented by Marwah Darwish [10]. It evaluates OAuth 2.0 protocol on web server with limited resource.…”
Section: Related Workmentioning
confidence: 99%