Showing 241 - 260 results of 33,375 for search '"authority"', query time: 0.07s Refine Results
  1. 241
  2. 242
  3. 243
  4. 244

    ABOUT THE PROBLEM OF INCOMPLETE CALCULATION OF TAXES BY TAX AUTHORITIES IN THE COURSE OF TAX CONTROL by A. V. Ilin

    Published 2020-07-01
    “…An analysis of changes in legislation on taxes and fees, literature and taxation practices has pointed to the urgency of the problem of incomplete taxation by tax authorities during tax control. The purpose of the article is to study the completeness of tax calculation by tax authorities during tax control and justify the rejection of a model for compensating low tax risks for offenders by increasing the tax burden for law-abiding taxpayers. …”
    Get full text
    Article
  5. 245
  6. 246
  7. 247
  8. 248
  9. 249
  10. 250
  11. 251
  12. 252
  13. 253
  14. 254
  15. 255
  16. 256
  17. 257
  18. 258
  19. 259

    Account hijacking threat attack detection for OAuth2.0 authorization API by Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU

    Published 2019-06-01
    “…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
    Get full text
    Article
  20. 260