Näytä suppeat kuvailutiedot

dc.contributor.advisorHämäläinen, Timo
dc.contributor.authorVijayan, Anoop
dc.date.accessioned2021-01-04T07:37:36Z
dc.date.available2021-01-04T07:37:36Z
dc.date.issued2012
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/73529
dc.description.abstractThe combined use of OpenID and OAuth for authentication and authorization is gaining popularity day by day in Internet. Because of its simplicity to understand, use and robustness, they are used in many domains in web, especially where the apps and user base are huge like social networking. Also it reduces the burden of typing the password every time for authentication and authorization especially in hand-held gadgets. After a simple problem scenario discussion, it is clear that the OpenID+OAuth combination has some drawbacks from the authentication perspective. The two major problems discussed here include problems caused due to transfer of user credentials over Internet and complexity in setting up of two protocols separately for authentication and authorization. Both the problems are addressed by extending OAuth2.0. By using Kerberos-like authentication, the user has the possibility of not passing the credentials over Internet. It is worth to note that, OAuth2.0 also uses some kind of tokens for authorizations similar to Kerberos. It could be seen that extending OAuth2.0 to perform authentication removes the need for OpenID and its problems completely.en
dc.format.extent81
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subject.otherOpenID
dc.subject.otherOAuth
dc.subject.otherKerberos
dc.titleExtending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
dc.identifier.urnURN:NBN:fi:jyu-202101041010
dc.type.ontasotPro gradu -tutkielmafi
dc.type.ontasotMaster’s thesisen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.tiedekuntaFaculty of Information Technologyen
dc.contributor.laitosInformaatioteknologiafi
dc.contributor.laitosInformation Technologyen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.oppiaineMobile Technology and Business (maisteriohjelma)fi
dc.contributor.oppiaineMaster's Degree Programme in Mobile Technology and Businessen
dc.rights.copyrightJulkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.fi
dc.rights.copyrightThis publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.en
dc.type.publicationmasterThesis
dc.contributor.oppiainekoodi601
dc.subject.ysoInternet
dc.subject.ysotodentaminen
dc.subject.ysoverkkourkinta
dc.subject.ysoInternet
dc.subject.ysoauthentication
dc.subject.ysophishing
dc.format.contentfulltext
dc.type.okmG2


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot