{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:08Z","timestamp":1750307168107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,20]],"date-time":"2012-02-20T00:00:00Z","timestamp":1329696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Universiti Kuala Lumpur's Graduate Assistant","award":["UniKL\/IRPS\/Offer\/GA\/2011(06)"],"award-info":[{"award-number":["UniKL\/IRPS\/Offer\/GA\/2011(06)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,20]]},"DOI":"10.1145\/2184751.2184825","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["POAuth"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Nauman","sequence":"first","affiliation":[{"name":"MIIT, Universiti Kuala Lumpur, Malaysia\/FAST NUCES, Peshawar"}]},{"given":"Sohail","family":"Khan","sequence":"additional","affiliation":[{"name":"MIIT, Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"}]},{"given":"Abu Talib","family":"Othman","sequence":"additional","affiliation":[{"name":"MIIT, Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"}]},{"given":"Shahr ulniza","family":"Musa","sequence":"additional","affiliation":[{"name":"MIIT, Universiti Kuala Lumpur, Kuala Lumpur, Malaysia"}]},{"given":"Najeeb Ur","family":"Rehman","sequence":"additional","affiliation":[{"name":"FAST National University of Computer and Emerging Sciences, Peshawar, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2012,2,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941504"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998447"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415150301"},{"key":"e_1_3_2_1_4_1","volume-title":"Inc.","author":"Cozza R.","year":"2011","unstructured":"R. Cozza , A. Zimmermann , C. Milanesi , H. J. Vergne , A. Sato , C. K. Lu , D. Glen , T. H. Nguyen , S. Shen , and A. Gupta . Market Share: Mobile Communication Devices by Region and Country, 2Q11. Gartner , Inc. , August 2011 . R. Cozza, A. Zimmermann, C. Milanesi, H. J. Vergne, A. Sato, C. K. Lu, D. Glen, T. H. Nguyen, S. Shen, and A. Gupta. Market Share: Mobile Communication Devices by Region and Country, 2Q11. Gartner, Inc., August 2011."},{"volume-title":"Android -- An Open Handset Alliance Project","year":"2011","key":"e_1_3_2_1_5_1","unstructured":"Google. Android -- An Open Handset Alliance Project , 2011 . Available at: http:\/\/developer.android.com\/. Google. Android -- An Open Handset Alliance Project, 2011. Available at: http:\/\/developer.android.com\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Authsub: Authentication for Web Applications","author":"Google Inc.","year":"2011","unstructured":"Google Inc. Authsub: Authentication for Web Applications , 2011 . Available at: http:\/\/code.google.com\/apis\/accounts\/docs\/AuthSub.html. Google Inc. Authsub: Authentication for Web Applications, 2011. Available at: http:\/\/code.google.com\/apis\/accounts\/docs\/AuthSub.html."},{"key":"e_1_3_2_1_7_1","volume-title":"The OAuth 1.0 Protocol","author":"Hammer-Lahav E.","year":"2011","unstructured":"E. Hammer-Lahav . The OAuth 1.0 Protocol . 2011 . E. Hammer-Lahav. The OAuth 1.0 Protocol. 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.24"},{"key":"e_1_3_2_1_9_1","volume-title":"Google Friend Connect, and the Twitter API","author":"Hawker M. D.","year":"2010","unstructured":"M. D. Hawker . The Developer's Guide to Social Programming: Building Social Context Using Facebook , Google Friend Connect, and the Twitter API . Addison-Wesley Professional , 2010 . M. D. Hawker. The Developer's Guide to Social Programming: Building Social Context Using Facebook, Google Friend Connect, and the Twitter API. Addison-Wesley Professional, 2010."},{"volume-title":"Shibboleth: A Project of Internet2 Middleware Initiative","year":"2011","key":"e_1_3_2_1_10_1","unstructured":"Internet2. Shibboleth: A Project of Internet2 Middleware Initiative , 2011 . Available at: http:\/\/shibboleth.internet2.edu\/. Internet2. Shibboleth: A Project of Internet2 Middleware Initiative, 2011. Available at: http:\/\/shibboleth.internet2.edu\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1838002.1838049"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.239"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020602"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875652.1875654"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.105.158701"},{"key":"e_1_3_2_1_17_1","unstructured":"D. Recordon L. Rae and C. Messina. OpenID: The Definitive Guide: Identity for the Social Web. 2010.  D. Recordon L. Rae and C. Messina. OpenID: The Definitive Guide: Identity for the Social Web. 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875652.1875662"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-642-05437-2_4","volume-title":"Open Problems in Web 2.0 User Content Sharing. iNetSec 2009--Open Research Problems in Network Security","author":"Sun S. T.","year":"2009","unstructured":"S. T. Sun and K. Beznosov . Open Problems in Web 2.0 User Content Sharing. iNetSec 2009--Open Research Problems in Network Security , pages 37 -- 51 , 2009 . S. T. Sun and K. Beznosov. Open Problems in Web 2.0 User Content Sharing. iNetSec 2009--Open Research Problems in Network Security, pages 37--51, 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"TCG Specification Architecture Overview v1.2, page 11--12. Technical report","author":"TCG.","year":"2004","unstructured":"TCG. TCG Specification Architecture Overview v1.2, page 11--12. Technical report , Trusted Computing Group , April 2004 . TCG. TCG Specification Architecture Overview v1.2, page 11--12. Technical report, Trusted Computing Group, April 2004."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1095"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592676"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1408342"},{"key":"e_1_3_2_1_25_1","first-page":"26","volume-title":"Thompson","author":"R.","year":"2000","unstructured":"Schell, R. , Thompson , M. : Platform security: What is lacking. In : Elsevier Science, Information Security .. 5(1): pages 26 -- 41 ( 2000 ) Schell, R., Thompson, M.: Platform security: What is lacking. In: Elsevier Science, Information Security.. 5(1): pages 26--41 (2000)"}],"event":{"name":"ICUIMC '12: The 6th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Kuala Lumpur Malaysia","acronym":"ICUIMC '12"},"container-title":["Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184751.2184825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184751.2184825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:41Z","timestamp":1750240481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184751.2184825"}},"subtitle":["privacy-aware open authorization for native apps on smartphone platforms"],"short-title":[],"issued":{"date-parts":[[2012,2,20]]},"references-count":24,"alternative-id":["10.1145\/2184751.2184825","10.1145\/2184751"],"URL":"https:\/\/doi.org\/10.1145\/2184751.2184825","relation":{},"subject":[],"published":{"date-parts":[[2012,2,20]]},"assertion":[{"value":"2012-02-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}