Proxy Authenticator - Approach of a Signature-based Single Sign On Solution for E-Government Services

نویسندگان

  • Klaus John
  • Stefan Taber
  • Andreas Ehringfeld
چکیده

This paper illustrates the development of an e-government solution for an application of a single-sign-on technology without the use of the SAML V2.0 protocol. We were confronted with the task of creating and implementing this kind of secure system, running on myHelp.gv.at, which is one of the Austrian eGovernment Portals. The solution – or as we call it ‘proxy authenticator’ – enables us to omit any alterations to existing protocol structures or to amend the software architecture for all Austrian e-government applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Framework for Secure Single Sign-On

Single sign-on solutions allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign-on models, even though it is of great importance to current distributed application environments. We build on proxy signature schemes to introduce the first public key cryptographi...

متن کامل

Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud

Cloud computing offers an economical and efficient solution for sharing data among the cloud users with low support without the weight of neighborhood data storing and upkeep. In any case, the administration of the data and services may not be completely dependable on the cloud, as users no longer have physical possession of the outsourced personal data so data integrity protection turns into a...

متن کامل

Secure Mobile Agent Using Strong Non-designated Proxy Signature

It is expected that mobile agent will be widely used for electronic commerce as an important key technology. If a mobile agent can sign a message in a remote server on behalf of a customer without exposing his/her private key, it can be used not only to search for special products or services, but also to make a contract with a remote server. To construct mobile agents, [KBC00] used an RSA-base...

متن کامل

Digital Signature based Proxy Multi-Signature Scheme

A Proxy signature scheme enables a proxy signer to sign a message on behalf of the original signer. In this paper, we propose ECDLP based solution for chen et. al [1] scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the proxy requirements and require only elliptic curve multiplication and elliptic curve addition which needs less computation overhead compare...

متن کامل

Integrating Qualified Electronic Signatures with Password Legacy Systems

www.deaeslr.org DIGITAL EVIDENCE AND ELECTRONIC SIGNATURE LAW REVIEW Despite a common legal framework for electronic signatures within the European Union, qualified electronic signatures have not been a market success, although several governments are issuing or plan to issue signature capable identity cards to all their citizens. However, the high market penetration of smart cards does not nec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013