2012
DOI: 10.1109/tie.2011.2130500
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Single Sign-On Mechanism for Distributed Computer Networks

Abstract: User identification is an important access control mechanism for client-server networking architectures. The concept of single sign-on can allow legal users to use the unitary token to access different service providers in distributed computer networks. Recently, some user identification schemes have been proposed for distributed computer networks. Unfortunately, most existing schemes cannot preserve user anonymity when possible attacks occur. Also, the additional time-synchronized mechanisms they use may caus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(12 citation statements)
references
References 30 publications
0
12
0
Order By: Relevance
“…Later, Lee and Chang (Chang & Lee, 2012) demonstrated a single-sign-on-based authentication scheme for shared networks. The idea of single-sign-on can permit legitimate users to use a unitary symbol to access distributed service providers.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Later, Lee and Chang (Chang & Lee, 2012) demonstrated a single-sign-on-based authentication scheme for shared networks. The idea of single-sign-on can permit legitimate users to use a unitary symbol to access distributed service providers.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of single-sign-on can permit legitimate users to use a unitary symbol to access distributed service providers. The client-server architecture is assumed in the Chang and Lee (Chang & Lee, 2012) scheme and heavyweight exponential computation are implemented to convey the tough security density of their protocol and the security parameters of their protocol appeared unambiguous and considered to be a robust one. However, the researchers in (Yang, Wong, Wang, & Deng, 2008) found two flaws i.e.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therein, wireless communication technology serves as an important approach to realize Industry 4.0. During the last few years, wireless technologies have experienced a great growth in factory automation [2][3][4][5]. Applying wireless networks will be a new trend in industrial environments.…”
Section: Introductionmentioning
confidence: 99%
“…The system needs to share data of user information such as username, password in encrypted format which was implemented using WS-Security framework to provide message level security. WSSecurity protects message contents, while transport service intermediaries and gives authentication and authorization control, which protects service provider from malicious requesters (Chang and Lee, 2012). WS-Security does not define any authentication ticket mechanism; instead, it defines how to use plain user name/password, Kerberos and X.509 tickets within the context of a SOAP header.…”
Section: Introductionmentioning
confidence: 99%