共 50 条
- [1] Security Interoperability in Heterogeneous IoT Platforms: Threat Model of the Interoperable OAuth 2.0 Framework [J]. 37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 22 - 31
- [3] A Comprehensive Formal Security Analysis of OAuth 2.0 [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1204 - 1215
- [4] OAUCH: Exploring Security Compliance in the OAuth 2.0 Ecosystem [J]. PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 460 - 481
- [5] OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect [J]. PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), 2019, : 35 - 44
- [6] OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities [J]. Journal of Information Security and Applications, 2022, 65
- [8] Modular Security Analysis of OAuth 2.0 in the Three-Party Setting [J]. 2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 276 - 293
- [9] Teaching the Security Mindset with Reference Monitors [J]. PROCEEDINGS OF THE 45TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION (SIGCSE'14), 2014, : 523 - 528
- [10] Model-based Security Testing: an Empirical Study on OAuth 2.0 Implementations [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 651 - 662