A REIVEW ON EXTENSIVE SECURITY OF COMMERCIAL WEB SSO SYSTEMS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 1
Abstract
The research of this paper are focused on extensive security analysis of commercial web SSO systems. Single signon solutions are a safe and great alternative to credential loss. In this paper we observe advantages and challenges that come with implementing single sign-on .In addition to this, we are discovering and confirming new flaws in other web SSO systems. Goal of this paper are focused on improving and to expose security weakness in services using Web Single sign On (SSO) secure mechanism, In this paper we provide comparative review of existing work done on Web SSO,Like there categaries,implementation issue and challenges of Web SSO. Next we discuss mechanisms in which SSO is carried out to provide well Security.
Authors and Affiliations
Mr. D. S. Baravade *
DESIGNING A MOBILE EYES-FREE SOFT KEYBOARD FOR VISUALLY IMPAIRED IN ANDROID
Typing is the essence of mobile communication and connectivity. Arguably, today’s technologies support mobile text input poorly, though this is the case for everyone, but it is particularly relevant to the visuall...
Characterizations of Carbonaceous Aerosol in South and East Asia: A review from 2007 to 2014
The variations of carbonaceous aerosols in particulate matter (mostly in PM10 and PM2.5) were reviewed in South and East Asia during the period of 2007 to 2014. The selected countries in South and East Asia are Ba...
Growth Behaviour of Three Species of Rajasthan in Relation to Salinity and Changes in Ionic Composition of Leaves
For rehabilitation of soils rendered barren owing to salinity, adaptation to site conditions and multiple uses form important criteria of tree selection. Seeds of preferred multipurpose tree species Acacia nilotica, Alb...
Multi Level Anti Theft Security System using GSM Technology
This paper presents Design & Development of Multi level Anti theft security system to control the theft of a vehicle using GSM and Biometrics. The main objective of this is to offer an advanced security system...
Computational Holographic Imaging using 2d-Scalar Wave
In this work we study holography using computer simulations. We present a mathematical description of how one can produce and read a thin hologram using different kinds of waves, such as scalar (acoustic waves), v...