Security Analysis of a Single Sign-On Mechanism For Distributed Computer Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Single sign on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utilize a different set of credentials (eg username/password or tokens) for each application he/she wants to access. However, this approach is inefficient and insecure with the exponential growth in the number of applications and services a user has to access both inside corporative environments and at the Internet. Single sign on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well organized security arguments. In this paper, however, it is shown that their scheme is actually insecure as it fails to meet security during communication, in order to provide a secure authentication digital signature with hash function is researched for future work.
Authors and Affiliations
C. Ramakrishnan , S. Dhanabal
Survey on Reversible Watermarking
A number of research papers has been produced about reversible watermarking. Reversible watermarking is one of the important scheme of the watermarking schemes. Some security measures must be there to prot...
Novel Hybrid k-D-Apriori Algorithm for Web Usage Mining
Abstract: The Web usage mining is a branch of web mining in which by clustering the datasets, frequently accessed patterns can be obtained for betterment of social portals, websites. The divisive analysis is one of the t...
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Digital image processing is an ever expanding and dynamic area with applications reaching out into our daily life such as digital signature, authentication, surveillance, medicine, space exploration, automated...
Video To Animated Cartoon Conversion
Abstract: the logic of animation making from real video fully depends on various image processing techniques and various kinds of filtering like Gaussian filtering, bilateral filtering, and flow based bilateral fil...
MANCAFChat - An Application to Evaluate MANCAF Framework
Abstract: The collaborative application uses the MANET to exchange the information between the available nodes. The development of such kind of application takes too much time to implement the network communication servi...