ADVANCED MECHANISM FOR SINGLE SIGN-ON FOR DISTRIBUTED COMPUTER NETWORKS

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhancement of Single Sign on Mechanism for Distributed Computer Networks

Single sign-on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign-on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utiliz...

متن کامل

Security Analysis of a Single Sign-On Mechanism For Distributed Computer Networks

Single sign on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utiliz...

متن کامل

Parallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks

These security-enhanced communication tools in a wide-area Globus test bed that we are constructing, called GUSTO (Guidance Utilizing Stable Timing Oscillator). This deployment will allow largescale application experiments and hence provide feedback on how our security mechanisms work in practical situations. It seems certain that encryption performance will be a bottleneck in many situations. ...

متن کامل

Improved ECC hybrid Encryption Scheme for Security Analysis of a Single Sign-On Mechanism in Distributed Computer Networks

Single sign-on (SSO) is definitely an authentication mechanism that enables any legal user which has a one credential being authenticated by means of many distributed computer networks. Recently Chang and Lee proposed the latest SSO structure in addition to state their safety measures by providing well-organized safety measures quarrels. In another attack, an outsider without any credential mig...

متن کامل

An identity-based single-sign-on scheme for computer networks

Conventionally, no user identification is required for a user to log into a security-protected system. User authentication is based on what the user knows, or what the user has, which can be easily shared among others. Moreover, when multiple systems are involved, the user is then required to authenticate to each system individually and repeatedly. In this paper, we present a scheme to achieve ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2015

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2015.0409065