Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,166,821 papers from all fields of science
Search
Sign In
Create Free Account
OAuth
Known as:
OAuth2
, Openauth
OAuth is an open standard for authorization, commonly used as a way for Internet users to log in to third party websites using their accounts at…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ASP.NET
Access Control Service
Access token
Accounts & SSO
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
Samuel Erdtman
,
L. Seitz
,
G. Selander
,
Erik Wahlstroem
,
H. Tschofenig
2020
Corpus ID: 261294608
This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE…
Expand
2019
2019
Bridging the Cyber and Physical Worlds using Blockchains and Smart Contracts
George C. Polyzos
Proceedings Workshop on Decentralized IoT…
2019
Corpus ID: 182008840
—We address the limitations of existing information security solutions when applied to the cyber-physical world. In particular…
Expand
2017
2017
Real Time Evaluation of Quality of Search Terms During Query Expansion for Streaming Text Data Using Velocity and Relevance
Nilayan Bhattacharya
,
I. Arpinar
,
Ugur Kursuncu
International Computer Science Conference
2017
Corpus ID: 16502314
The traditional methods of evaluation of data cannot be used to evaluate the quality of the streaming twitter data due to the…
Expand
2016
2016
An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps
V. Sucasas
,
G. Mantas
,
A. Radwan
,
Jonathan Rodriguez
IEEE International Conference on Communications…
2016
Corpus ID: 27130877
In the context of the Smart City concept, mobile e-Health applications can play a pivotal role towards the improvement of…
Expand
2016
2016
Effectuation of Secure Authorized Deduplication in Hybrid Cloud
B. Mahalakshmi
,
G. Suseendran
2016
Corpus ID: 64224669
Objectives: Different user can access the same data repeatedly and trying to store it in the memory of the cloud server. Due to…
Expand
2016
2016
A PLATFORM FOR A SMART LEARNING ENVIRONMENT
Konstantin Simic
,
M. Despotović-Zrakić
,
Živko Bojović
,
B. Jovanic
,
Đorđe Knežević
2016
Corpus ID: 13853979
In this paper, a modular platform which provides student services for smart educational environment is described. The platform…
Expand
2015
2015
Authorization for the Internet of Things using OAuth 2.0
Samuel Erdtman
,
L. Seitz
,
G. Selander
,
Erik Wahlstroem
,
H. Tschofenig
2015
Corpus ID: 112804755
This memo defines how to use OAuth 2.0 as an authorization framework with Internet of Things (IoT) deployments, thus bringing a…
Expand
2013
2013
An authentication model towards cloud federation in the enterprise
Moustafa Noureddine
,
R. Bashroush
Journal of Systems and Software
2013
Corpus ID: 35429996
2012
2012
Single Sign on for Cloud
Pratap Murukutla
,
K. Shet
International Conference on Computing Sciences
2012
Corpus ID: 17014973
In this paper, we have designed single sign on for cloud users. The proposed design allows user to use single set of credentials…
Expand
2012
2012
A trust based model for federated identity architecture to mitigate identity theft
Eghbal Ghazizadeh
,
M. Zamani
,
J. Manan
,
R. Khaleghparast
,
A. Taherian
International Conference for Internet Technology…
2012
Corpus ID: 18880867
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE