Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,439,397 papers from all fields of science
Search
Sign In
Create Free Account
OAuth
Known as:
OAuth2
, Openauth
OAuth is an open standard for authorization, commonly used as a way for Internet users to log in to third party websites using their accounts at…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ASP.NET
Access Control Service
Access token
Accounts & SSO
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Hands-On Spring Security 5 for Reactive Applications
T. John
2018
Corpus ID: 69821104
Secure your Java applications by integrating the Spring Security framework in your code Key Features Provide authentication…
Expand
2015
2015
Authorization for the Internet of Things using OAuth 2.0
Samuel Erdtman
,
L. Seitz
,
G. Selander
,
Erik Wahlstroem
,
H. Tschofenig
2015
Corpus ID: 112804755
This memo defines how to use OAuth 2.0 as an authorization framework with Internet of Things (IoT) deployments, thus bringing a…
Expand
2015
2015
Analysis of single sign-on protocols from theperspective of architecture deployment, security and usability
Abdullah Al-Ghushami
,
Nur Haryani Zakaria
,
N. Katuk
,
Abubakar Mohammed
2015
Corpus ID: 195950317
Single Sign-On (SSO) requires one time authentication with a set of username and password which then allows an authorized user to…
Expand
2015
2015
Design and Development of Framework for Health Data Relay based on OAuth2 in Cloud Environment
SeokJin Im
,
HeeJoung Hwang
2015
Corpus ID: 167957854
With information technology and health care, efficient health data management provides various health services. Health data from…
Expand
Review
2015
Review
2015
Development of the Cloud Service Modification Method for Integration with Enterprise Information Systems
Anton Pavlovich Teykhrib
2015
Corpus ID: 59440613
The article reviewed the main types ofenterprise information systems, which integration can be performed with. It also has been…
Expand
2014
2014
Designing a trust evaluation model for open-knowledge communities
Xianmin Yang
,
Qin Qiu
,
Shengquan Yu
,
H. Tahir
British Journal of Educational Technology
2014
Corpus ID: 30699644
The openness of open-knowledge communities ( OKCs) leads to concerns about the knowledge quality and reliability of such…
Expand
2014
2014
OAuth Token Introspection
Justin Richer
2014
Corpus ID: 63835799
This specification defines a method for a client or protected resource to query an OAuth authorization server to determine meta…
Expand
2013
2013
Authentication and Authorization for Native Mobile Applications using OAuth 2.0
Dagfinn Aas
2013
Corpus ID: 108058267
OAuth 2.0 has in the recent years become the de-facto standard of doing API authorization and authentication on mobile devices…
Expand
2011
2011
Multi-device Key Management Using Visual Side Channels in Pervasive Computing Environments
L. Batyuk
,
Seyit Ahmet Camtepe
,
S. Albayrak
International Conference on Broadband and…
2011
Corpus ID: 206530037
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and…
Expand
2010
2010
Using OAuth for Recursive Delegation
Z. Zeltsan
,
Bart Vrancken
2010
Corpus ID: 168574796
This document describes a use case for delegating authorization by a Resource Owner to another user via a Client using the OAuth…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE