Login / Signup
OAuth 2.0 Threat Model and Security Considerations.
Torsten Lodderstedt
Mark Mcgloin
Phil Hunt
Published in:
RFC (2013)
Keyphrases
</>
probabilistic model
computational model
database systems
objective function
probability distribution
statistical model
neural network
high level
similarity measure
prior knowledge
hidden markov models
intrusion detection
petri net
process model
formal model
security model