This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
Modeling and Assessing OAuth 2.0 under PoP (Proof of Possession) for Secrecy
Authors
  Bharatkumar K. Talaviya,  Namrata Shroff
Abstract
OAuth 2.0 decides to combine the implementation and experience of delegated authentication into a single communication protocol. The OAuth protocol allows applications to access protected resources from resource server via application programming interface, without acquiring users to break their service provider credentials to consumers. OAuth is based on generic methodology for API authentication. In this work, we assess the different OAuth security approach and formalize the protocol using proof of possession architecture. The proof of possession gives some hope that the days of relying primarily on passwords and access tokens may be behind us within a few years.
Keywords- Authorization, Information Security, OAuth, Proof of Possession (PoP)
Publication Details
Unique Identification Number - IJEDR1502155Page Number(s) - 883-886Pubished in - Volume 3 | Issue 2 | May 2015DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Bharatkumar K. Talaviya,  Namrata Shroff,   "Modeling and Assessing OAuth 2.0 under PoP (Proof of Possession) for Secrecy", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.3, Issue 2, pp.883-886, May 2015, Available at :http://www.ijedr.org/papers/IJEDR1502155.pdf
Article Preview
|
|
||||||
|