Security Analysis of a Single Sign-On Mechanism For Distributed Computer Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Single sign on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utilize a different set of credentials (eg username/password or tokens) for each application he/she wants to access. However, this approach is inefficient and insecure with the exponential growth in the number of applications and services a user has to access both inside corporative environments and at the Internet. Single sign on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well organized security arguments. In this paper, however, it is shown that their scheme is actually insecure as it fails to meet security during communication, in order to provide a secure authentication digital signature with hash function is researched for future work.
Authors and Affiliations
C. Ramakrishnan , S. Dhanabal
Ranking Algorithm of Web Documents using Ontology
Abstract: Internet has become the most important part of everyone’s life where the large amount of information is stored in the form of text, audio, video etc. The Web information retrieval is a technique which h...
Evaluation on a Simulated Annealing based Model for Solving Job Shop Scheduling Problem
The stochastic optimization techniques were commonly used in solving several optimization problems. There are different types of these algorithms that were addressed in several previous works. In our previous w...
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPP
The main goal of this work is to achieve the energy efficiency in 802.11 WLAN through minimizing the energy consumption in the network. In this proposed study, we introduced a modification in PCF for enhancing...
Character Identification in Movie Using Graph Matching Algorithm
The character Identification in films are a challenging problem due to the hugevariation in the appearance of each character. It drawn significant research interests and had a many interestingapplications.In thi...
Port Site Tuberculous Infection a Case Report and Review of Literature
As the surgeries done by laparoscopy are increasing, associated complications are also increasing. One among them is port site infection especially port site infections due to Atypical Mycobacteriae .There is a con...