Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6722
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Soni, Abhishek | - |
dc.contributor.author | Thorat, Prashant [Guided by] | - |
dc.date.accessioned | 2022-09-26T06:32:02Z | - |
dc.date.available | 2022-09-26T06:32:02Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6722 | - |
dc.description.abstract | The OAuth 2.0 protocol is one of the most broadly deployed authorization protocols and it also fills in as the foundation for the new SSO standard OpenID Connect. Regardless of the popularity of OAuth, so far analysis efforts were for the most part focused at understanding the concept of OAuth and the exact workflow of how does it provides security to our protected resources. In this report, we carry out the analysis of the OAuth 2.0 standard in an demonstrative web model. Our analysis basically focuses at establishing secure authorization and authentication for which we provide formal definitions. In the analysis, all the four OAuth grant types i.e. authorization code grant, implicit grant, resource owner password credentials grant, and the client credentials grant are covered. They might even run simultaneously in the same and different relying parties and identity providers, where relying parties, identity providers, and browsers are considered as well. Our analysis of the OAuth 2.0 standard assumes that security recommendations and best practices are followed in order to avoid obvious and known attacks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | AURA | en_US |
dc.subject | User interface | en_US |
dc.subject | Java virtual machine | en_US |
dc.subject | Model view controller | en_US |
dc.title | AURA Security Plug-in | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AURA Security Plug-in.pdf | 1.76 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.