Now showing items 1-2 of 2
Extending the 0Auth2 Workflow to Audit Data Usage for Users and Service Providers In a Cooperative Scenario
10. DFN-Forum Kommunikationstechnologien
The increasing amount and heterogeneity of devices demands changes in IT infrastructure. Many web service architectures used to meet these demands use the OAuth2 workflow to secure their interfaces. These implementations usually tightly couple web services and an OAuth2 authorization service. The presented extension to ...
Methods to secure services in an untrusted environment
Software Engineering 2011 – Fachtagung des GI-Fachbereichs Softwaretechnik
Software services offer many opportunities like reduced cost for IT infrastructure. They also introduce new risks, for example the clients lose control over their data. While data can be secured against external threats using standard techniques, the service providers themselves have to be trusted to ensure privacy. In ...