Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES) - 0 views
NetSec Güvenlik Bülteni - 0 views
Help Net Security - 0 views
Encrypt-then-MAC - 0 views
Writing Secure PHP - PHP - Added Bytes - 0 views
A5/1 - Trac - 0 views
_______Sistem Güvenliği >>>>: GSM Aramalarının Birkaç hafta içinde Hacklenebi... - 0 views
Web Güvenlik Topluluğu (WGT) | E-Dergi - 0 views
Hueniverse: Beginner's Guide to OAuth - Part III : Security Architecture - 0 views
-
OAuth's stated objective is to create an 'authorization delegation protocol'. Allowing one party to access someone else's resources on their behalf is the core of the OAuth protocol and the void it seeks to fill. In this delegated access scenario, also known as the 3-legged scenario, the three parties (legs) involved are the Service Provider, Consumer, and User. Since requests are only made by the Consumer, it needs a way to authenticate itself with the Service Provider, but also to authenticate its authorization to access User data. This requires OAuth to support an HTTP request with two sets of credentials.
-
OAuth can do an equally good job at addressing the direct access scenario, also known as the 2-legged scenario.
-
The Consumer is accessing the resources on behalf of itself, making the Consumer and User the same entity. This can be a bit confusing when a Consumer is making separate requests, both 2-legged requests on behalf of itself, and 3-legged requests on behalf of a User.
- ...19 more annotations...
Extreme Security -- Do It Securely or Not at all !: Use default password, get hijacked - 0 views
FireGPG :: Add-ons for Firefox - 0 views
« First
‹ Previous
41 - 60 of 71
Next ›
Showing 20▼ items per page