Modeling and Assessing OAuth 2.0 under PoP (Proof of Possession) for Secrecy
- Bharatkumar K. Talaviya
- Namrata Shroff
Authorization, Information Security, OAuth, Proof of Possession (PoP)
OAuth 2.0 decides to combine the implementation and experience of delegated authentication into a single communication protocol. The OAuth protocol allows applications to access protected resources from resource server via application programming interface, without acquiring users to break their service provider credentials to consumers. OAuth is based on generic methodology for API authentication. In this work, we assess the different OAuth security approach and formalize the protocol using proof of possession architecture. The proof of possession gives some hope that the days of relying primarily on passwords and access tokens may be behind us within a few years.
Bharatkumar K. Talaviya, Namrata Shroff. "Modeling and Assessing OAuth 2.0 under PoP (Proof of Possession) for Secrecy".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.3, Issue 2, pp.883-886, URL :https://rjwave.org/ijedr/papers/IJEDR1502155.pdf
Volume 3 Issue 2
Pages. 883-886