Entitled Secure Distributed Single Sign - On with Two - Factor
نویسندگان
چکیده
....................................................................................... iii Table of
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Framework for Secure Single Sign-On
Single sign-on solutions allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign-on models, even though it is of great importance to current distributed application environments. We build on proxy signature schemes to introduce the first public key cryptographi...
متن کاملSecurity Analysis of a Single Sign-On Mechanism For Distributed Computer Networks
Single sign on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utiliz...
متن کاملA Survey on Distributed Network Services Using SSO for Secure Mechanism
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques caused extensive overhead costs and could not preserve user anonymity when possible attacks occurred. Earlier techniques were also not useful for battery limited devices and existing sol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007