Sciweavers

29 search results - page 2 / 6
» A Taxonomy of Single Sign-On Systems
Sort
View
IMECS
2007
13 years 7 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
CCS
2008
ACM
13 years 8 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
PERCOM
2007
ACM
14 years 5 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
14 years 1 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
ICAIL
2007
ACM
13 years 10 months ago
Mapping regulations to industry-specific taxonomies
For each industry, there exist many taxonomies that are intended for various applications. There are also multiple sources of regulations from different government agencies. Indus...
Chin Pang Cheng, Gloria T. Lau, Kincho H. Law