Essays about: "OAuth"

Showing result 11 - 14 of 14 essays containing the word OAuth.

  1. 11. Authentication and Authorization for Mobile Devices

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Navid Ranjbar; Abdinejadi Mahdi; [2012-08-06]
    Keywords : Authentication; Authorization; Mobility; Mobile Devices; OAuth; OpenID; SAML;

    Abstract : Nowadays market demand forces companies to adapt to mobile technology. For an enterprise company, this change will bring up security challenges. In this article, we investigate authentication and authorization aspects of security. READ MORE

  2. 12. Securing Cloud Storage Service

    University essay from KTH/Kommunikationssystem, CoS

    Author : Vytautas Zapolskas; [2012]
    Keywords : Cloud; storage; security; privacy; zero knowledge; Security as a Service; federation; broker; Cloud Service Provider CSP ; federated cloud; federated identity management; OAuth; OpenID; CDMI; interoperability;

    Abstract : Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services becomes increasingly important, because for many organizations, the final barrier to adopting cloud computing is whether it is sufficiently secure. READ MORE

  3. 13. Cloud Services Provider

    University essay from IT-universitetet i Göteborg/Tillämpad informationsteknologi

    Author : Xu Yuan; [2011-02-21]
    Keywords : REpresentational State Transfer REST ; web services; Integration method; OAuth; cloud computing; WS-*; Software architecture; Software architectural style;

    Abstract : Context: Cloud computing as next generation computing paradigm has been accepted widely with growing-up of Internet technology and success of World Wide Web, which has the potential to transform a large part of IT industry, making software more attractive and even change the way IT product is designed and purchased. Cloud computing is all about services of various levels based upon Internet or Intranet including Software-as-a- Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS). READ MORE

  4. 14. Anonymous Authentication Using Secure Multi-Party Computations

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Maqsood Ahmad; [2011]
    Keywords : ;

    Abstract : Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if he or she is a registered user. READ MORE