메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 1358-1369

SPRESSO: A secure, privacy-respecting single sign-on system for the web

Author keywords

[No Author keywords available]

Indexed keywords

WEB BROWSERS;

EID: 84954169151     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813726     Document Type: Conference Paper
Times cited : (50)

References (27)
  • 1
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • ACM Press
    • M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In POPL 2001, pages 104-115. ACM Press, 2001.
    • (2001) POPL 2001 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 2
    • 77957587422 scopus 로고    scopus 로고
    • Towards a formal foundation of web security
    • IEEE Computer Society
    • D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song. Towards a Formal Foundation of Web Security. In CSF 2010, pages 290-304. IEEE Computer Society, 2010.
    • (2010) CSF 2010 , pp. 290-304
    • Akhawe, D.1    Barth, A.2    Lam, P.E.3    Mitchell, J.4    Song, D.5
  • 3
    • 70349233792 scopus 로고    scopus 로고
    • Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps
    • ACM
    • A. Armando, R. Carbone, L. Compagna, J. Cuéllar, and M. L. Tobarra. Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps. In FMSE 2008, pages 1-10. ACM, 2008.
    • (2008) FMSE 2008 , pp. 1-10
    • Armando, A.1    Carbone, R.2    Compagna, L.3    Cuéllar, J.4    Tobarra, M.L.5
  • 5
    • 84874442652 scopus 로고    scopus 로고
    • Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
    • 7796 of LNCS, Springer
    • C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage. In POST 2013, volume 7796 of LNCS, pages 126-146. Springer, 2013.
    • (2013) POST 2013 , pp. 126-146
    • Bansal, C.1    Bhargavan, K.2    Delignat-Lavaud, A.3    Maffeis, S.4
  • 6
    • 84866927100 scopus 로고    scopus 로고
    • Discovering concrete attacks on website authorization by formal analysis
    • IEEE Computer Society
    • C. Bansal, K. Bhargavan, and S. Maffeis. Discovering Concrete Attacks on Website Authorization by Formal Analysis. In CSF 2012, pages 247-262. IEEE Computer Society, 2012.
    • (2012) CSF 2012 , pp. 247-262
    • Bansal, C.1    Bhargavan, K.2    Maffeis, S.3
  • 7
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW-14, pages 82-96. IEEE Computer Society, 2001.
    • (2001) CSFW-14 , pp. 82-96
    • Blanchet, B.1
  • 9
    • 80755168342 scopus 로고    scopus 로고
    • Trace equivalence decision: Negative tests and non-determinism
    • ACM
    • V. Cheval, H. Comon-Lundh, and S. Delaune. Trace equivalence decision: negative tests and non-determinism. In CCS 2011, pages 321-330. ACM, 2011.
    • (2011) CCS 2011 , pp. 321-330
    • Cheval, V.1    Comon-Lundh, H.2    Delaune, S.3
  • 10
    • 84914159740 scopus 로고    scopus 로고
    • An expressive model for the web infrastructure: Definition and application to the browserid sso system
    • IEEE Computer Society
    • D. Fett, R. Küsters, and G. Schmitz. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System. In S&P 2014, pages 673-688. IEEE Computer Society, 2014.
    • (2014) S&P 2014 , pp. 673-688
    • Fett, D.1    Küsters, R.2    Schmitz, G.3
  • 11
    • 84954157957 scopus 로고    scopus 로고
    • Analyzing the browserid sso system with primary identity providers using an expressive model of the web
    • Springer
    • D. Fett, R. Küsters, and G. Schmitz. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. In ESORICS 2015, LNCS. Springer, 2015. To appear. Full version available at http://arxiv.org/abs/1411.7210.
    • (2015) ESORICS 2015, LNCS
    • Fett, D.1    Küsters, R.2    Schmitz, G.3
  • 15
    • 84934278773 scopus 로고    scopus 로고
    • Alloy: A new technology for software modelling
    • 2280 of LNCS, Springer
    • D. Jackson. Alloy: A New Technology for Software Modelling. In TACAS 2002, volume 2280 of LNCS, page 20. Springer, 2002.
    • (2002) TACAS 2002 , pp. 20
    • Jackson, D.1
  • 16
    • 51349083251 scopus 로고    scopus 로고
    • Simple cross-site attack prevention
    • IEEE Computer Society
    • F. Kerschbaum. Simple Cross-Site Attack Prevention. In SecureComm 2007, pages 464-472. IEEE Computer Society, 2007.
    • (2007) SecureComm 2007 , pp. 464-472
    • Kerschbaum, F.1
  • 17
    • 84906731380 scopus 로고    scopus 로고
    • A lightweight formal approach for analyzing security of web protocols
    • 8688 of LNCS, Springer
    • A. Kumar. A Lightweight Formal Approach for Analyzing Security of Web Protocols. In RAID 2014, volume 8688 of LNCS, pages 192-211. Springer, 2014.
    • (2014) RAID 2014 , pp. 192-211
    • Kumar, A.1
  • 18
    • 84970908860 scopus 로고    scopus 로고
    • Mozilla Identity Team. Persona. https://login.persona.org.
    • Persona
  • 19
    • 84954133867 scopus 로고    scopus 로고
    • Persona: More privacy, better security while making developers and users happy!
    • Apr. 9
    • T. Nitot. Persona: more privacy, better security while making developers and users happy! Beyond the Code Blog. Apr. 9, 2013. https://blog.mozilla.org/beyond-the-code/2013/04/09/persona-beta2/.
    • (2013) Beyond the Code Blog
    • Nitot, T.1
  • 20
  • 21
    • 84869597130 scopus 로고    scopus 로고
    • Security analysis of openid
    • 170 of LNI, GI, 2010
    • P. Sovis, F. Kohlar, and J. Schwenk. Security Analysis of OpenID. In Sicherheit, volume 170 of LNI, pages 329-340. GI, 2010.
    • Sicherheit , pp. 329-340
    • Sovis, P.1    Kohlar, F.2    Schwenk, J.3
  • 23
    • 84869401890 scopus 로고    scopus 로고
    • The devil is in the (implementation) details: An empirical analysis of oauth sso systems
    • ACM
    • S.-T. Sun and K. Beznosov. The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems. In CCS'12, pages 378-390. ACM, 2012.
    • (2012) CCS'12 , pp. 378-390
    • Sun, S.-T.1    Beznosov, K.2
  • 24
    • 84861098079 scopus 로고    scopus 로고
    • Systematically breaking and fixing openid security: Formal analysis semi-automated empirical evaluation and practical countermeasures
    • S.-T. Sun, K. Hawkey, and K. Beznosov. Systematically Breaking and Fixing OpenID Security: Formal Analysis, Semi-Automated Empirical Evaluation, and Practical Countermeasures. Computers & Security, 31(4):465-483, 2012.
    • (2012) Computers & Security , vol.31 , Issue.4 , pp. 465-483
    • Sun, S.-T.1    Hawkey, K.2    Beznosov, K.3
  • 25
    • 84878355933 scopus 로고    scopus 로고
    • Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
    • IEEE Computer Society, 2012
    • R. Wang, S. Chen, and X. Wang. Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. In S&P 2012, pages 365-379. IEEE Computer Society, 2012.
    • (2012) S&P , pp. 365-379
    • Wang, R.1    Chen, S.2    Wang, X.3
  • 26
    • 84992342056 scopus 로고    scopus 로고
    • Explicating sdks: Uncovering assumptions underlying secure authentication and authorization
    • USENIX Association
    • R. Wang, Y. Zhou, S. Chen, S. Qadeer, D. Evans, and Y. Gurevich. Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. In USENIX 2013, pages 399-314. USENIX Association, 2013.
    • (2013) USENIX 2013 , pp. 399-414
    • Wang, R.1    Zhou, Y.2    Chen, S.3    Qadeer, S.4    Evans, D.5    Gurevich, Y.6
  • 27
    • 84987652196 scopus 로고    scopus 로고
    • SSOScan: Automated testing of web applications for single sign-on vulnerabilities
    • USENIX Association
    • Y. Zhou and D. Evans. SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities. In USENIX 2014, pages 495-510. USENIX Association, 2014.
    • (2014) USENIX 2014 , pp. 495-510
    • Zhou, Y.1    Evans, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.