Estudio de soluciones AAI, definición de escenarios de prácticas y análisis de seguridad

FS González - 2024 - digitum.um.es
Extended Abstract The use of digital services has experienced a massive increment in
recent years. Nowadays, any citizen has an account with big service providers like Google …

Authentication and authorization for mobile devices

N Ranjbar, A Mahdi - 2012 - gupea.ub.gu.se
Nowadays market demand forces companies to adapt to mobile technology. For an
enterprise company, this change will bring up security challenges. In this article, we …

[PDF][PDF] A survey on security analysis of OAuth 2.0 framework

LI Shuai - cs.purdue.edu
The OAuth 2.0 protocol [7] is one of the most widely deployed authorization protocols. The
authorization is the process for granting approval to an entity to access a resource. The …

[PDF][PDF] FEDERATED IDENTITY

M Eunice, WT Pierre - Citeseer
In order to allow users to access easier and faster to a set of services with always the same
authentication parameters (often login/password), it is required to employ Federation Identity …

Formal Analysis and Verification of OAuth 2.0 in SSO

A Vasudevan - 2023 - aaltodoc.aalto.fi
This thesis examines the OAuth 2.0 protocol within Single Sign-On (SSO) systems through
modelling and formal analysis. The versatile Performing Security Proofs of Stateful Protocols …

[PDF][PDF] cai

V Kundela - 2024 - theses.cz
This bachelor thesis focuses on the design of the implementation process of newly selected
authentication solutions in a chosen system, with the aim of increasing security. These …

A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

NS Muddychetty - 2024 - diva-portal.org
Background: Identity and Access Management (IAM) is a critical IT securityframework for
managing digital identities and resource access. With roots datingback to ancient …

Hardening of a Continuous Behavior-based Authentication Distributed System

J González-Muñoz, M Casado, D Garabato… - VI Congreso Xove TIC …, 2023 - ruc.udc.es
Password-based traditional authentication systems are increasingly insufficient when it
comes to providing security and checking the identity of the authenticated user. What …

Evolution of identity

Y Wilson, A Hingnikar - … in Modern Applications: Demystifying OAuth 2 …, 2022 - Springer
Over the years, there has been an ongoing evolution in how identity information is stored
and used to enable users to access applications and the functionality they provide. You'll …

Authentication Techniques and Tools

AS Zaidoun - 2022 - ieeexplore.ieee.org
Authentication is the most fundamental aspect of security. Authentication is a key
mechanism of security since it constitutes the first barrier of security against potential attacks …