A study on secure user authentication and authorization in OAuth protocol

2017 ◽  
Vol 22 (S1) ◽  
pp. 1991-1999 ◽  
Author(s):  
Cheol-Joo Chae ◽  
Ki-Bong Kim ◽  
Han-Jin Cho



Author(s):  
Donald F. Norris ◽  
Laura Mateczun ◽  
Anupam Joshi ◽  
Tim Finin

Abstract In this paper, we examine cybersecurity challenges faced by America’s local, governments, including: the extent of cyberattacks; problems faced in preventing attacks from being successful; barriers to providing high levels of cybersecurity management; and actions that local governments believe should be taken to improve cybersecurity practice. Our research method consisted of a focus group of information technology (IT) and cybersecurity officials from one American state. Our findings indicate that cyberattacks are constant and can number in the tens of thousands or more per day. While our participants noted that while they were not perfect at it, they felt that they had cybersecurity technology under good control. Their biggest challenge is human – that is, end-users who make mistakes or engage in misconduct. Local governments face several barriers in providing high levels of cybersecurity, including: insufficient funding and staffing; problems of governance; and insufficient or under-enforced cybersecurity policies. Participants suggested several ways to improve local government cybersecurity, including: vulnerability assessment, scanning and testing, cybersecurity insurance, improving end-user authentication and authorization, end-user training and control, control over the use of external devices, and improved governance methods, among others. We conclude by making suggestions for further research into local government cybersecurity.



Author(s):  
Elena M. Torroglosa García ◽  
Gabriel López Millán

The high adoption in daily lives of services offered by the Web 2.0 has opened a wide field for the proliferation of new Web-based services and applications. Social networks, as the main exponent of this new generation of services, require security systems to ensure end user authentication and access control to shared information. Another feature that is becoming increasingly important in these scenarios is the delegation of controlled access between the different API (Application Programming Interfaces) to integrate services and information. The safe use of these Web services requires end user security credentials and different authentication and authorization technologies. This chapter provides an introduction to the most relevant protocols and standards in the area of Web service security, which are able to provide authentication and authorization mechanisms.



2010 ◽  
Vol 16 (4) ◽  
pp. 261-277 ◽  
Author(s):  
Thiago Sales ◽  
Leandro Sales ◽  
Hyggo Almeida ◽  
Angelo Perkusich




Sign in / Sign up

Export Citation Format

Share Document