ADVANCED MECHANISM FOR SINGLE SIGN-ON FOR DISTRIBUTED COMPUTER NETWORKS
نویسندگان
چکیده
منابع مشابه
Security Enhancement of Single Sign on Mechanism for Distributed Computer Networks
Single sign-on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign-on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utiliz...
متن کاملSecurity Analysis of a Single Sign-On Mechanism For Distributed Computer Networks
Single sign on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utiliz...
متن کاملParallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks
These security-enhanced communication tools in a wide-area Globus test bed that we are constructing, called GUSTO (Guidance Utilizing Stable Timing Oscillator). This deployment will allow largescale application experiments and hence provide feedback on how our security mechanisms work in practical situations. It seems certain that encryption performance will be a bottleneck in many situations. ...
متن کاملImproved ECC hybrid Encryption Scheme for Security Analysis of a Single Sign-On Mechanism in Distributed Computer Networks
Single sign-on (SSO) is definitely an authentication mechanism that enables any legal user which has a one credential being authenticated by means of many distributed computer networks. Recently Chang and Lee proposed the latest SSO structure in addition to state their safety measures by providing well-organized safety measures quarrels. In another attack, an outsider without any credential mig...
متن کاملAn identity-based single-sign-on scheme for computer networks
Conventionally, no user identification is required for a user to log into a security-protected system. User authentication is based on what the user knows, or what the user has, which can be easily shared among others. Moreover, when multiple systems are involved, the user is then required to authenticate to each system individually and repeatedly. In this paper, we present a scheme to achieve ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2015
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2015.0409065