Securing OAuth implementations in smart phones

@inproceedings{Shehab2014SecuringOI,
  title={Securing OAuth implementations in smart phones},
  author={Mohamed Shehab and Fadi Mohsen},
  booktitle={CODASPY},
  year={2014}
}
With the roaring growth and wide adoption of smart mobile devices, users are continuously integrating with culture of the mobile applications (apps). These apps are not only gaining access to information on the smartphone but they are also able gain users' authorization to access remote servers on their behalf. The Open standard for Authorization (OAuth) is widely used in mobile apps for gaining access to user's resources on remote service providers. In this work, we analyze the different OAuth… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.

OpenID Authentication 2.0

  • D. Recordon, B. Fitzpatrick
  • "http://openid.net/specs/ openid-authentication…
  • 2007
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…