A survey of mobile cloud computing applications: perspectives and challenges

Y Wang, IR Chen, DC Wang - Wireless Personal Communications, 2015 - Springer
As mobile computing has been developed for decades, a new model for mobile computing,
namely, mobile cloud computing, emerges resulting from the marriage of powerful yet …

The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems

ST Sun, K Beznosov - Proceedings of the 2012 ACM conference on …, 2012 - dl.acm.org
Millions of web users today employ their Facebook accounts to sign into more than one
million relying party (RP) websites. This web-based single sign-on (SSO) scheme is enabled …

Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns

A Norta, R Matulevičius, B Leiding - Computers & Security, 2019 - Elsevier
Designing government independent and secure identification-and authentication protocols
is a challenging task. Design flaws and missing specifications as well as security-and …

DNS-IdM: A blockchain identity management system to secure personal data sharing in a network

J Alsayed Kassem, S Sayeed, H Marco-Gisbert… - Applied Sciences, 2019 - mdpi.com
Identity management (IdM) is a method used to determine user identities. The centralized
aspect of IdM introduces a serious concern with the growing value of personal information …

Discovering concrete attacks on website authorization by formal analysis

C Bansal, K Bhargavan… - Journal of Computer …, 2014 - content.iospress.com
Social sign-on and social sharing are becoming an ever more popular feature of web
applications. This success is largely due to the APIs and support offered by prominent social …

Authscan: Automatic extraction of web authentication protocols from implementations

G Bai, J Lei, G Meng, SS Venkatraman, P Saxena… - 2013 - ink.library.smu.edu.sg
Ideally, security protocol implementations should be formally verified before they are
deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have …

An end-to-end secure key management protocol for e-health applications

MR Abdmeziem, D Tandjaoui - Computers & Electrical Engineering, 2015 - Elsevier
Key distribution is required to secure e-health applications in the context of Internet of Things
(IoT). However, resources constraints in IoT make these applications unable to run existing …

A security analysis of the OAuth protocol

F Yang, S Manoharan - 2013 IEEE Pacific Rim Conference on …, 2013 - ieeexplore.ieee.org
The OAuth 2.0 authorization protocol standardises delegated authorization on the Web.
Popular social networks such as Facebook, Google and Twitter implement their APIs based …

A security analysis of blockchain-based did services

BG Kim, YS Cho, SH Kim, H Kim, SS Woo - IEEE Access, 2021 - ieeexplore.ieee.org
Decentralized identifiers (DID) has shown great potential for sharing user identities across
different domains and services without compromising user privacy. DID is designed to …

Security issues in OAuth 2.0 SSO implementations

W Li, CJ Mitchell - International Conference on Information Security, 2014 - Springer
Many Chinese websites (relying parties) use OAuth 2.0 as the basis of a single sign-on
service to ease password management for users. Many sites support five or more different …