{"id":"https://openalex.org/W1900575599","doi":"https://doi.org/10.1109/edoc.2015.36","title":"OAuthHub - A Service for Consolidating Authentication Services","display_name":"OAuthHub - A Service for Consolidating Authentication Services","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W1900575599","doi":"https://doi.org/10.1109/edoc.2015.36","mag":"1900575599"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/edoc.2015.36","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041549953","display_name":"Xuzong Chen","orcid":"https://orcid.org/0000-0002-1213-6648"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuzong Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048534021","display_name":"Gareth Sime","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gareth Sime","raw_affiliation_strings":["Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068382625","display_name":"Christof Lutteroth","orcid":"https://orcid.org/0000-0003-0634-7569"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Christof Lutteroth","raw_affiliation_strings":["Department of Computer Science, The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081689055","display_name":"Gerald Weber","orcid":"https://orcid.org/0000-0002-1221-8045"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Gerald Weber","raw_affiliation_strings":["The University of Auckland, Auckland, Auckland, NZ"],"affiliations":[{"raw_affiliation_string":"The University of Auckland, Auckland, Auckland, NZ","institution_ids":["https://openalex.org/I154130895"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"210"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9966,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.7951093},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6313204},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.59417784},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5149508},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5023904},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43898505},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21456829},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/edoc.2015.36","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1574185037","https://openalex.org/W1971444986","https://openalex.org/W2049801465","https://openalex.org/W2054702684","https://openalex.org/W2073977921","https://openalex.org/W2077806324","https://openalex.org/W2103475742","https://openalex.org/W2112995928","https://openalex.org/W2115666155","https://openalex.org/W2133723082","https://openalex.org/W2136243456","https://openalex.org/W2136757793","https://openalex.org/W95123685"],"related_works":["https://openalex.org/W4383604565","https://openalex.org/W4377021841","https://openalex.org/W4238993633","https://openalex.org/W4238915667","https://openalex.org/W4226394750","https://openalex.org/W4206453769","https://openalex.org/W3203102769","https://openalex.org/W2912135041","https://openalex.org/W2624975276","https://openalex.org/W2102197694"],"abstract_inverted_index":{"OAuth":[0,33,55,121,132,178,190,200,205,228,253,260],"has":[1],"become":[2],"a":[3,16,22,28,51,57,140,174,188,208,237,241,248],"widespread":[4],"authorization":[5,39],"protocol":[6],"to":[7,21,34,42,53,59,154,195,212],"allow":[8],"inter-enterprise":[9],"sharing":[10],"of":[11,115,119,163,193,215,243],"user":[12,61],"preferences":[13],"and":[14,128,159,184,197,217,223,232,262,272],"data:":[15],"Consumer":[17,52,73],"that":[18,71,93],"wants":[19],"access":[20,41],"user's":[23,38],"protected":[24],"resources":[25],"held":[26],"by":[27,172,235],"Service":[29,69,81,94,97,122],"Provider":[30,82],"can":[31,47,203,255,266],"use":[32,54,118,151,204],"ask":[35],"for":[36,40,50,137,240],"the":[37,72,88,103,147,164,169,258],"these":[43],"resources.":[44],"However,":[45],"it":[46,186,265],"be":[48],"tedious":[49],"as":[56,76,139,207,252],"way":[58],"organize":[60],"identities,":[62],"since":[63],"doing":[64],"so":[65],"requires":[66,84],"supporting":[67],"all":[68],"Providers":[70,98,123],"would":[74],"recognize":[75],"users'":[77],"\"identity":[78],"providers\".":[79],"Each":[80],"added":[83],"extra":[85],"work,":[86],"at":[87,92,146],"very":[89],"least,":[90],"registration":[91],"Provider.":[95],"Different":[96],"may":[99],"differ":[100],"slightly":[101],"in":[102],"API":[104,239],"they":[105],"offer,":[106],"their":[107,112],"authentication/authorization":[108],"process":[109],"or":[110],"even":[111],"supported":[113],"version":[114],"OAuth.":[116],"The":[117],"different":[120,199],"also":[124],"creates":[125],"privacy,":[126],"security":[127],"integration":[129,233],"problems.":[130],"Therefore":[131],"is":[133,221,226],"an":[134,161],"ideal":[135],"candidate":[136],"Software":[138],"Service,":[141],"while":[142],"posing":[143],"interesting":[144],"challenges":[145],"same":[148],"time.":[149],"We":[150,167,245],"conceptual":[152],"modelling":[153],"derive":[155],"new":[156],"high-level":[157],"models":[158],"provide":[160],"analysis":[162],"solution":[165],"space.":[166],"address":[168],"aforementioned":[170],"problems":[171],"introducing":[173],"trusted":[175,210,249],"intermediary":[176,211,250],"--":[177,180],"Hub":[179,206,229,254],"into":[181,257],"this":[182],"relationship":[183],"contrast":[185],"with":[187],"variant,":[189],"Proxy.":[191],"Instead":[192],"having":[194],"support":[196],"control":[198],"providers,":[201],"Consumers":[202],"single":[209],"take":[213],"care":[214],"managing":[216],"controlling":[218],"how":[219,247,264],"authentication":[220],"done":[222],"what":[224],"data":[225],"shared.":[227],"eases":[230],"development":[231],"issues":[234],"providing":[236],"consolidated":[238],"range":[242],"services.":[244],"describe":[246],"such":[251],"fit":[256],"overall":[259],"architecture":[261],"discuss":[263],"satisfy":[267],"demands":[268],"on":[269],"security,":[270],"reliability":[271],"usability.":[273]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1900575599","counts_by_year":[],"updated_date":"2024-12-15T14:48:50.143276","created_date":"2016-06-24"}