OAuth and OAuth WRAP: defeating the password ...
No information avaiable
http://arstechnica.com/open-source/guides/2010/01/oauth-and-oauth-wrap-defeating-the-password-anti-pattern.ars
popularity:
oauth
security
authentication
api
identity
authorization
protocol
programming
reference
ssl
|
Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
|
OAuth for Spring Security - Home
As you can probably deduce from its name, the purpose of this project is to provide an ... Support is also provided for both OAuth provider developers and OAuth ...
similarity:
popularity:
oauth
spring
security
java
acegi
authentication
springframework
library
springsecurity
opensource
|
Welcome to myOpenID
myOpenID - The free, secure OpenID server. Your Personal Icon ... JanRain, the provider of myOpenID, offers a comprehensive suite of products for ...
similarity:
popularity:
openid
security
identity
authentication
web2.0
tools
web
internet
opensource
social
|
OpenID and OAuth: Why Should We Care?
No information avaiable
similarity:
popularity:
openid
oauth
authentication
identity
security
myspace
mashable
google
opensocial
toread
|
JanRain
Accelerate user registration and logins, learn more about your customers, create ... About Janrain | Contact Us | Privacy © 2009 JanRain, Inc. All Rights Reserved ...
similarity:
popularity:
openid
identity
authentication
web2.0
security
opensource
janrain
tools
api
social
|
Bot Bouncer
BotBouncer.com is a CAPTCHA service for OpenID s. We provide an API for finding out ... We also provide a simple mechanism for OpenID enabled sites to send ...
similarity:
popularity:
openid
captcha
security
spam
authentication
identity
api
programming
webdev
web
|
Role-based access control - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
rbac
authentication
role
access
acl
wikipedia
programming
authorization
software
|
hueniverse
Adventures in Micro-Blogging ... Hueniverse. April 23, 2009. Explaining the OAuth Session Fixation Attack. There is a pretty good story behind this. ...
similarity:
popularity:
oauth
standards
openid
security
blog
socialsoftware
technology
authentication
social
socialnetworking
|
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
|
Main - browsersec - Google Code - Browser Security Handbook landing page
No information avaiable
similarity:
popularity:
security
browser
web
google
reference
webdev
programming
tutorial
webdevelopment
development
|