Implementation on Distributed Network Services Using SSO for Secure Mechanism
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 11
Abstract
Key Agreement and User Authentication is an prime issues for creating and maintaining a security in distributed network .Legal User may able to access services of different providers. Recently there are some user Authentication and key agreement schemes has been proposed for distributed computer network. SSO is a Authentication mechanism which provides , the legal user authenticated by multiple service providers in distributed computer network, with a Single Authentication information. Goal of this paper are focused on improving and to reveal security weakness in services using Single sign On (SSO) secure mechanism, In this paper we provide comparative review of existing work done on SSO. Next we discuss mechanisms in which SSO is carried out to provide well Security. Idea provided by Chang and Lee for SSO mechanism, the authorized user privacy and easiness of authentication is not that much secure, as it fail to meet the security needs.
Authors and Affiliations
Mr. D. S. Baravde
An Exploration of Robotic System
Robots are not just machines, they are many steps ahead a typical machine. Robots like machines can perform different tough jobs easily but the advancement is that they can do it by their own. Once programmed rob...
Supra R*-Closed Sets and Supra R*-Continuity
The aim of this paper is to define and investigate supra R*-closed sets in topological space. Further, we discuss the concept of supra R*-continuity and supra R*-irresolutness .
Optimization of Cotton Seed Methyl Ester and Mustard Methyl Ester from Transesterification Process
The most commonly used method for biodiesel preparation is via transesterification of vegetable oil using alkaline catalysts. Biodiesel yield and oil conversion are affected by operating conditions including the catalys...
Implementation of Online Network Attack Detection in Absence of Previous History of Attack
Security is demand of today’s internet users. As the no. of internet users are increasing day by day it is being a paramount task to provide a network security. In the field of security NIDS acts as war horses. Th...
Ionic Liquids Tailoring Trigonal Selenium Microrods under Solvothermal Conditions
An ionic liquids(ILs)-assisted solvothermal synthesis route has been proposed to preparing high-purity trigonal selenium (t-Se) microrods using sodium selenite and hydrazine hydrate as starting materials. The asob...