2016 IEEE Symposium on Computer Applications &Amp; Industrial Electronics (ISCAIE) 2016
DOI: 10.1109/iscaie.2016.7575043
|View full text |Cite
|
Sign up to set email alerts
|

Social login with OAuth for mobile applications: User's view

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…But issues occur if the scope of the resource in consideration is limited, in this condition the user cannot know if any misuse is happening because there is no existing way by which the third party can access the resource technically. A similar issue was found when Oauth was implemented in smartphones [2], here a new prototype was implemented and users tested that prototype for security and the results were compared with mobile browsing apps which do not use OAuth. It was found that the OAuth protocol was redirecting the browser to malicious apps that were not needed by the user, so to improve this, a builtin module was suggested along with the protocol.…”
Section: Literature Reviewmentioning
confidence: 76%
“…But issues occur if the scope of the resource in consideration is limited, in this condition the user cannot know if any misuse is happening because there is no existing way by which the third party can access the resource technically. A similar issue was found when Oauth was implemented in smartphones [2], here a new prototype was implemented and users tested that prototype for security and the results were compared with mobile browsing apps which do not use OAuth. It was found that the OAuth protocol was redirecting the browser to malicious apps that were not needed by the user, so to improve this, a builtin module was suggested along with the protocol.…”
Section: Literature Reviewmentioning
confidence: 76%
“…In their comprehensive study Bonneau, et al (2012) describe these efforts and discuss different approaches, such as graphical and cognitive methods, which they contrast in detail. In addition, there have been approaches for many years, for example to use existing social media accounts (social login) (Ho & Katuk, 2016) or to be able to access multiple applications with a single set of credentials (single sign-on (SSO)) (Radha & Reddy, 2012).…”
Section: Multi-faktor Authentication: Principle and Factorsmentioning
confidence: 99%