The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2012 vol.16)
pp: 74-77
Barry Leiba , Huawei Technologies
ABSTRACT
<p>Allowing one Web service to act on our behalf with another has become increasingly important as social Internet services such as blogs, photo sharing, and social networks have become widely popular. OAuth, a new protocol for establishing identity management standards across services, provides an alternative to sharing our usernames and passwords, and exposing ourselves to attacks on our online data and identities.</p>
INDEX TERMS
authorization, access control, social networking, Web services, identity management
CITATION
Barry Leiba, "OAuth Web Authorization Protocol", IEEE Internet Computing, vol.16, no. 1, pp. 74-77, January/February 2012, doi:10.1109/MIC.2012.11
REFERENCES
1. The OAuth 2.0 Authorization Protocol, IETF OAuth Working Group draft, work in progress, Sept. 2011.
2. The OAuth 2.0 Authorization Protocol: Bearer Tokens, IETF OAuth Working Group draft, work in progress, Oct. 2011.
3. HTTP Authentication: MAC Access Authentication, IETF OAuth Working Group draft, work in progress, May 2011.
4. OAuth 2.0 Threat Model and Security Considerations, IETF OAuth Working Group draft, work in progress, July 2011.
5. The OAuth 1.0 Protocol, IETF RFC 5849, Apr. 2010; http://tools.ietf.org/htmlrfc5849.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool