Cargando…
Detecting Risky Authentication Using the OpenID Connect Token Exchange Time
With the rise in sophisticated cyber threats, traditional authentication methods are no longer sufficient. Risk-based authentication (RBA) plays a critical role in the context of the zero trust framework—a paradigm shift that assumes no trust within or outside the network. This research introduces a...
Autores principales: | Han, Alex Heunhe, Lee, Dong Hoon |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10575157/ https://www.ncbi.nlm.nih.gov/pubmed/37837086 http://dx.doi.org/10.3390/s23198256 |
Ejemplares similares
-
Advanced API security: securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
por: Siriwardena, Prabath
Publicado: (2014) -
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
por: Wilson, Yvonne
Publicado: (2019) -
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
por: LeBlanc, Jonathan
Publicado: (2011) -
Secure Command Line Solution for Token-based Authentication
por: Dykstra, Dave
Publicado: (2021) -
Adoption of a token-based authentication model for the CMS Submission Infrastructure.
por: Mascheroni, Marco
Publicado: (2023)