2012
DOI: 10.1016/j.protcy.2012.05.019
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Single Sign-On Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
2

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(41 citation statements)
references
References 1 publication
0
39
0
2
Order By: Relevance
“…It makes easy to manage the rights of a user arriving, changing function in or leaving the company, to quickly integrate added applications, delegate access rights during holidays without increasing the helpdesk's workload. (Radha & Hitha Reddy, 2012).…”
Section: Login Methodsmentioning
confidence: 99%
“…It makes easy to manage the rights of a user arriving, changing function in or leaving the company, to quickly integrate added applications, delegate access rights during holidays without increasing the helpdesk's workload. (Radha & Hitha Reddy, 2012).…”
Section: Login Methodsmentioning
confidence: 99%
“…There has been some research on authentication in a distributed manner (e.g., Kerberos [7]), as well as the combination of authentication and authorization in distributed systems (e.g., Keynote [8]). Distributed authentication is commonly associated with single sign-on schemes [6] or federated identity [9]. In this paper, we consider distributed authentication to be a process in which a user's claim to a digital identity is verified by two or more independent systems.…”
Section: Review Of Distributed Authentication Protocolsmentioning
confidence: 99%
“…In some current implementations, the authentication server can be completely separated from the server running web applications. For example, single sign-on schemes [6] are based on this concept. However, even in these circumstances the same security risk is present if the authentication information is stored on one server.…”
Section: Introductionmentioning
confidence: 99%
“…Next, developers can get user credentials according to the system identifier (service_id) to finish the auto-logging process [6]. Generally, auto-logging can be implemented by a plug-in or modification on the login page.…”
Section: User Mapping Structurementioning
confidence: 99%