AUTHENTICATION AND AUTHORIZATION INVOLVING THIRD PARTIES: MODERN APPROACHES AND SOLUTIONS
DOI:
https://doi.org/10.30888/2709-2267.2024-24-00-010Keywords:
network security risks, security threats, vulnerabilities, authentication and authorization processesAbstract
The work explores basic authentication on web resources and discusses authentication and authorization standards involving third parties: OAuth 2.0 and OpenID Connect. An alternative authentication and authorization mechanism is proposed, utilizing a sepaMetrics
References
De Soete M. Two-Factor Authentication. Encyclopedia of Cryptography and Security. Boston, MA, 2011. P. 1341.
Landrock P. Two-Factor Authentication. Encyclopedia of Cryptography and Security. P. 638.
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Network sensors ISSN 1424-8220
Holmes S. Getting MEAN with Mongo, Express, Angular, and Node. Manning Publications, 2015. 440 p.
Audio Fingerprinting. An Introduction to Audio Content Analysis. Hoboken, NJ, USA, 2012. P. 163–167.
Biometrics: Personal Identification in Networked Society. Springer, 2005. 411 p.
Трояновська Т. І. Побудова захищених мереж на базі обладнання компанії Cisco. // Захарченко С.М., Трояновська Т. І., Бойко О.В. Навчальний посібник. Вінниця : ВНТУ, 2017. – 133 с.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.