Security Quality of the Authorization Protocols

A lot of research papers have shown that there are logical flaws existing in web-based single sign-on schemes th
have been deployed by those authentication providers and relying party websites. Attackers are able to authentic
as a user and perform unauthorized activities.

  1. Decompose the problem into smaller problems. Describe the specific domains that map the problems.
  2. Hypothesize a solution to the problem. Compare your proposed solution to historical methods. Describe how it
    differs from current solutions to the problem.
  3. Discuss how you would gather evidence and expected results.

Sample Solution