[1] |
Cloud Security Alliance. The Treacherous Twelve. [EB/OL]. , 2016-04-02.
|
[2] |
HARDT D. The OAuth2.0 Authorization Framework. [EB/OL]. , 2013-2-1.
|
[3] |
YAN Haixing, FANG Huixing, KUKA C, et al.Verification for OAuth Using ASLan++[C]// IEEE.High Assurance Systems Engineering (HASE), 2015 IEEE 16th International Symposium on, January 8-10, 2015, Florida, USA. USA: IEEE, 2015:76-84.
|
[4] |
PAI S, SHARMA Y, KUMAR S, et al.Formal verification of OAuth 2.0 Using Alloy Framework[C]// Communication Systems and Network Technologies (CSNT), June 3-5,2011, Katra, Jammu, India. NewYork: IEEE, 2011: 655-659.
|
[5] |
BANSAL C, BHARGAVAN K, MAFFEIS S.Discovering Concrete Attacks on Website Authorization by Formal Analysis[C] //IEEE.2012 IEEE 25th Computer Security Foundations Symposium ,Cambridge, MA, 2012:247-262.
|
[6] |
BURANASAKSEE U, PORKAEW K, SUPASITTHIMETHEE U.Supasitthimethee. AccAuth: Accounting system for OAuth protocol[C]//IEEE.2014 Fifth International Conference onApplications of Digital Information and Web Technologies (ICADIWT), Bangalore, 2014:8-13.
|
[7] |
E Torroglosa-García, AD Pérez-Morales, P Martinez-Julia, et al. Integration of the OAuth and Web Service Family Security Standards[J].Computer Networks the International Journal of Computer & Telecommunications Networking , 2013, 57(10) : 2233-2249.
|
[8] |
张平,陈长松,胡红钢. 基于分组密码的认证加密工作模式[J]. 信息网络安全,2014(11):8-17.
|
[9] |
ALOTAIBI A, MAHMMOD A.Enhancing OAuth services security by an authentication service with face recognition[C] //IEEE.Systems. Applications and Technology Conference (LISAT), 2015 IEEE Long Island, Farmingdale, NY, 2015: 1-6.
|
[10] |
仇各各,汪学明,张言胜. 基于HECC的WSN身份认证协议研究[J]. 信息网络安全,2015(12):54-58.
|
[11] |
HARDT D. The OAuth2.0 Authorization Framework [EB/OL]. , 2012.
|
[12] |
赵洋,陈阳,熊虎,等. 云环境下一种可撤销授权的数据拥有性证明方案[J]. 信息网络安全,2015(8):1-7.
|