OAuth

Known as: OAuth2, Openauth 
OAuth is an open standard for authorization, commonly used as a way for Internet users to log in to third party websites using their accounts at… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on (SSO) protocols and also serves as the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
OAuth has become a highly influential protocol due to its swift and wide adoption in the industry. The initial objective of the… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
With the roaring growth and wide adoption of smart mobile devices, users are continuously integrating with culture of the mobile… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2013
2013
The OAuth 2.0 authorization protocol standardises delegated authorization on the Web. Popular social networks such as Facebook… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2012
2012
Allowing one Web service to act on our behalf with another has become increasingly important as social Internet services such as… (More)
  • figure 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Millions of web users today employ their Facebook accounts to sign into more than one million relying party (RP) websites. This… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2012
2012
This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. 
Is this relevant?
2012
2012
This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in… (More)
  • figure 1
Is this relevant?
2011
2011
This paper defines an ideal functionality for delegation of web access to a third-party where the authentication mechanism is… (More)
  • figure 7
  • figure 8
  • figure 9
  • figure 10
Is this relevant?