| 1 |
Seon-Joo Kim, An Efficient Access Control Mechanism for Application Software using the OAuth in the SaaS Cloud System, Graduate School of PaiChai University, 2013. |
미소장 |
| 2 |
Jeong-Kyung Moon, A Delegator for Authentication Management System using OAuth in Cloud Computing Environment, Graduate School of Kongju National University, 2013. |
미소장 |
| 3 |
Myung Hyun Han, Research on the extended OAuth protocol for real-name authentication, Graduate of School of Information Technology Chung-Ang University, 2013. |
미소장 |
| 4 |
E. Hammer-Lahav, The Oauth 1.0 Protocol. Internet Engineering Task Force(IETF) RFC 5849, 2010. |
미소장 |
| 5 |
Recommendation Models for Open Authorization  |
미소장 |
| 6 |
D. Hardt, The OAuth 2.0 Authorization Framework. Internet Engineering Task Force(IETF) RFC 6749, 2012. |
미소장 |
| 7 |
M. Jones, The OAuth 2.0 Authorization Framework: Bear Token Usage. Internet Engineering Task Force(IETF) RFC 6750, 2012. |
미소장 |
| 8 |
M. Noureddine, R. Bashroush, A Provisioning Model towards OAuth 2.0 Performance Optimization. Proceedings of the 2011 10th IEEE International Conference On Cybernetic Intelligent Systems, pp. 76-80, 2011. |
미소장 |
| 9 |
Sooyoung Lee, Jonguk Kim, Sukin Kang, Manpyo Hong, Improving the Security of OAuth Client using Obfuscation Techniques, Proceedings of the 2013 KSII Conference, Vol. 14, No. 1, pp. 159-60, 2013. |
미소장 |
| 10 |
Young Gon Jung, Sanf Rea Lee, Gi Hun JANG, Heung Youl YOUM, Security Problems for Secure OAuth authentication protocol, Proceesings of the 2011 KICS Conference, pp. 952-953, 2011. |
미소장 |
| 11 |
Feng Yang, Sathiamoorthy Manoharan, A security analysis of the OAuth protocol. In Proc. Of Communications, Computers and Signal Processing, pp. 271-276, 2013 |
미소장 |