OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem.
Pieter PhilippaertsDavy PreuveneersWouter JoosenPublished in: RAID (2022)
Keyphrases
- information security
- intrusion detection
- security problems
- network security
- security issues
- security policies
- security mechanisms
- information assurance
- security threats
- cyber security
- functional requirements
- security requirements
- access control
- computer security
- statistical databases
- data security
- security management
- high security
- information systems
- security protocols
- security model
- security properties
- computer systems
- security vulnerabilities
- database systems