Now showing items 1-2 of 2
Extending the 0Auth2 Workflow to Audit Data Usage for Users and Service Providers In a Cooperative Scenario
10. DFN-Forum Kommunikationstechnologien
The increasing amount and heterogeneity of devices demands changes in IT infrastructure. Many web service architectures used to meet these demands use the OAuth2 workflow to secure their interfaces. These implementations usually tightly couple web services and an OAuth2 authorization service. The presented extension to ...
Anonymization Is Dead – Long Live Privacy
Open Identity Summit 2019
Privacy is a multi-faceted, interdisciplinary concept, with varying meaning to different people and disciplines. To most researchers, anonymity ist he “holy grail” of privacy research, as it suggests that it may be possible to avoid personal information altogether. However, time and time again, anonymization has been ...