Paper Title

Modeling and Assessing OAuth 2.0 under PoP (Proof of Possession) for Secrecy

Authors

  • Bharatkumar K. Talaviya
  • Namrata Shroff

Keywords

Authorization, Information Security, OAuth, Proof of Possession (PoP)

Abstract

OAuth 2.0 decides to combine the implementation and experience of delegated authentication into a single communication protocol. The OAuth protocol allows applications to access protected resources from resource server via application programming interface, without acquiring users to break their service provider credentials to consumers. OAuth is based on generic methodology for API authentication. In this work, we assess the different OAuth security approach and formalize the protocol using proof of possession architecture. The proof of possession gives some hope that the days of relying primarily on passwords and access tokens may be behind us within a few years.

Article Type

Published

How To Cite

Bharatkumar K. Talaviya, Namrata Shroff. "Modeling and Assessing OAuth 2.0 under PoP (Proof of Possession) for Secrecy".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.3, Issue 2, pp.883-886, URL :https://rjwave.org/ijedr/papers/IJEDR1502155.pdf

Issue

Volume 3 Issue 2 

Pages. 883-886

Article Preview