Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
OAuth
Known as:
OAuth2
, Openauth
OAuth is an open standard for authorization, commonly used as a way for Internet users to log in to third party websites using their accounts at…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ASP.NET
Access Control Service
Access token
Accounts & SSO
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Real Time Evaluation of Quality of Search Terms During Query Expansion for Streaming Text Data Using Velocity and Relevance
Nilayan Bhattacharya
,
I. Arpinar
,
Ugur Kursuncu
International Computer Science Conference
2017
Corpus ID: 16502314
The traditional methods of evaluation of data cannot be used to evaluate the quality of the streaming twitter data due to the…
Expand
Review
2017
Review
2017
Security Flows in OAuth 2.0 Framework: A Case Study
M. Argyriou
,
N. Dragoni
,
A. Spognardi
SAFECOMP Workshops
2017
Corpus ID: 39537866
The burst in smartphone use, handy design in laptops and tablets as well as other smart products, like cars with the ability to…
Expand
2016
2016
Application Portability for Public and Private Clouds
Manohar Jonnalagedda
,
M. Jäger
,
U. Hohenstein
,
G. Kaefer
International Conference on Cloud Computing and…
2016
Corpus ID: 39491451
With cloud computing, the general idea is to deploy applications and services in the cloud, at some cloud provider’s facilities…
Expand
2016
2016
Effectuation of Secure Authorized Deduplication in Hybrid Cloud
B. Mahalakshmi
,
G. Suseendran
2016
Corpus ID: 64224669
Objectives: Different user can access the same data repeatedly and trying to store it in the memory of the cloud server. Due to…
Expand
2015
2015
Authorization for the Internet of Things using OAuth 2.0
Samuel Erdtman
,
L. Seitz
,
G. Selander
,
Erik Wahlstroem
,
H. Tschofenig
2015
Corpus ID: 112804755
This memo defines how to use OAuth 2.0 as an authorization framework with Internet of Things (IoT) deployments, thus bringing a…
Expand
2013
2013
An authentication model towards cloud federation in the enterprise
Moustafa Noureddine
,
R. Bashroush
Journal of Systems and Software
2013
Corpus ID: 35429996
2013
2013
Authentication and Authorization for Native Mobile Applications using OAuth 2.0
Dagfinn Aas
2013
Corpus ID: 108058267
OAuth 2.0 has in the recent years become the de-facto standard of doing API authorization and authentication on mobile devices…
Expand
2012
2012
Single Sign on for Cloud
Pratap Murukutla
,
K. Shet
International Conference on Computing Sciences
2012
Corpus ID: 17014973
In this paper, we have designed single sign on for cloud users. The proposed design allows user to use single set of credentials…
Expand
2012
2012
A trust based model for federated identity architecture to mitigate identity theft
Eghbal Ghazizadeh
,
M. Zamani
,
J. Manan
,
R. Khaleghparast
,
A. Taherian
International Conference for Internet Technology…
2012
Corpus ID: 18880867
Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT…
Expand
2010
2010
Design of a Web-based distributed location-aware infrastructure for mobile devices
Vlad M. Trifa
,
D. Guinard
,
P. Bolliger
,
Samuel Wieland
8th IEEE International Conference on Pervasive…
2010
Corpus ID: 101197
Since GPS receivers have become a commodity anyone could access and use location information simply and freely. Such an easy…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required