2015
DOI: 10.1108/ics-12-2013-0089
|View full text |Cite
|
Sign up to set email alerts
|

Security evaluation of the OAuth 2.0 framework

Abstract: The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third party applications revocable access to user data. OAuth has rapidly become an interim defacto standard for protecting access t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 19 publications
(18 reference statements)
0
10
0
Order By: Relevance
“…OAuth2. OAuth server works by authenticating and authorizing (Ferry, Raw, & Curran, 2015;Jung & Jung, 2017). If both processes are successful, the client will be given a token code by the OAuth server.…”
Section: The Protocol Of Oauth2mentioning
confidence: 99%
“…OAuth2. OAuth server works by authenticating and authorizing (Ferry, Raw, & Curran, 2015;Jung & Jung, 2017). If both processes are successful, the client will be given a token code by the OAuth server.…”
Section: The Protocol Of Oauth2mentioning
confidence: 99%
“…OAuth is an open authorization standard that allows users to grant an OAuth client application to access the resource stored in the OAuth server without sharing their credentials (Ferry, Raw, & Curran, 2015). OAuth is one of the popular token-based authentications that allows users to access the applications by logging on their existing accounts such as Facebook, Twitter and Google.…”
Section: Learning Management Systemsmentioning
confidence: 99%
“…The papers that we found to have security incidents in this category [11][12][13][14][15][16][17] widely report on a Cross-Site-Request-Forgery (CSRF) attack that capitalises on a weak SP vulnerability. The OAuth specification outlines things the SP must do to resist CSRF attacks, which some SPs do not do.…”
Section: Oauthmentioning
confidence: 99%
“…The OAuth specification outlines things the SP must do to resist CSRF attacks, which some SPs do not do. In fact, five of the seven OAuth papers analysed reported this vulnerability [11,[13][14][15][16] on the implementations of OAuth. It was found that these security incidents were possible because of the implementations of the protocol themselves rather than fundamental problems with the OAuth protocol.…”
Section: Oauthmentioning
confidence: 99%
See 1 more Smart Citation