-
1
Single Sign-On (SSO) Implementation Using Keycloak, RADIUS, LDAP, and PacketFence for Network Access
Published 2025-03-01Subjects: Get full text
Article -
2
IMPLEMENTASI RESTFUL WEB SERVICES DENGAN OTORISASI OAUTH 2.0 PADA SISTEM PEMBAYARAN PARKIR
Published 2019-04-01Subjects: Get full text
Article -
3
Integrated Email Management System Based Google Application Programming Interface Using OAuth 2.0 Authorization Protocol
Published 2020-06-01Subjects: Get full text
Article -
4
An Identity Model for Providing Inclusive Services and Applications
Published 2019-09-01Subjects: Get full text
Article -
5
OIDC²: Open Identity Certification With OpenID Connect
Published 2024-01-01Subjects: Get full text
Article -
6
A federated authentication schema among multiple identity providers
Published 2024-04-01Subjects: Get full text
Article -
7
IAACaaS: IoT Application-Scoped Access Control as a Service
Published 2017-10-01Subjects: Get full text
Article -
8
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01Subjects: Get full text
Article -
9
Evaluation of an IoT Application-Scoped Access Control Model over a Publish/Subscribe Architecture Based on FIWARE
Published 2020-08-01Subjects: Get full text
Article -
10
The eIDAS Regulation: A Survey of Technological Trends for European Electronic Identity Schemes
Published 2022-12-01Subjects: “…OAuth 2.0…”
Get full text
Article -
11
An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role
Published 2019-04-01Subjects: Get full text
Article -
12
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01Subjects: “…OAuth2.0 protocol;application programming interface;account hijacking;the third-party application…”
Get full text
Article -
13
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01Subjects: “…OAuth2.0 protocol…”
Get full text
Article -
14
Enhancing Network Security in Mobile Applications with Role-Based Access Control
Published 2024-09-01Subjects: “…role-based access control (rbac), oauth 2.0, network security access management, multi-factor authentication, authorization protocols…”
Get full text
Article -
15