A Survey on Distributed Network Services Using SSO for Secure Mechanism
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques caused extensive overhead costs and could not preserve user anonymity when possible attacks occurred. Earlier techniques were also not useful for battery limited devices and existing solutions were using less secure RSA algorithm. The proposed system uses Single sign-on mechanism that allows users to sign on only once and have their identities automatically verified by every application and the services they want to access afterwards. The intrinsic centralized access control functionality adds no additional cost to the single sign on protocol while providing an easy way to manage access policies and user rights revocation.
Authors and Affiliations
Shreya Baidyanath Pandey, S. P. Chhaware, Antara Bhattacharya
Load Shedding in Mobile Systems with MobiQual
In location-based, mobile continual query (CQ) systems, two key measures of quality-of-service (QoS) are: freshness and accuracy. To achieve freshness, the CQ server must perform frequent query reevaluations. To atta...
Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks
The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...
Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the sam...
COMPARISON AND STATISTICAL ANALYSIS OF NAM AND NORMAL SPEECH PROCESSING USING WAVELET TRANSFORM
In this, we present statistical approaches to enhance body-conducted unvoiced speech for silent speech communication using wavelet transform. So far Analysis of NAM speech has been made only using HMM (Hidden Markov...
A Novel Approach for Text Dependent Speaker Recognition
In recent times, person authentication in security systems using biometric technologies has grown rapidly. The voice is a signal of infinite information. Digital signal processes such as Feature Extraction and Feature...