• No results found

[PDF] Top 20 Web-­based single sign-on: an examination of security and usability

Has 10000 "Web-­based single sign-on: an examination of security and usability" found on our website. Below are the top 20 most common "Web-­based single sign-on: an examination of security and usability".

Web-­based single sign-on: an examination of security and usability

Web-­based single sign-on: an examination of security and usability

... a web server, the use of standard web server protection and monitoring will help to prevent compromised; if the Client is a stand-­‐alone, developers must ensure that secrets are stored in a secured ... See full document

62

Security and Usability of Authentication by Challenge Questions in Online Examination

Security and Usability of Authentication by Challenge Questions in Online Examination

... their security models in line with the potential threat model. 12.3.2 Usability Evaluation Usability is essential in the design of authentication methods (Braz and Robert, ...approached ... See full document

266

Web Single Sign-On Systems

Web Single Sign-On Systems

... a Web SSO ...a Web SSO standard, but the protocol was never widely deployed by non-Microsoft ...major security flaws in Passport were found by [ Kormann00] may have hindered its ...only Web ... See full document

6

An Analysis of Web Single Sign-On

An Analysis of Web Single Sign-On

... of web-based systems and applications, end-users are faced with the increasingly common issue of the need to memorize and keep many unique account usernames and passwords for each system or ...the ... See full document

10

Research on the Security of OAuth-Based Single Sign-On Service

Research on the Security of OAuth-Based Single Sign-On Service

... in theory. On empirical analysis, Wang et al. [8] focused on the actual web traffic going through the browser, and discovered several logic flaws in some SSO services (e.g. Google ID, Facebook), which are used by ... See full document

7

Pilot Study Web-Based Single Sign-On: Are We Giving Up Security and Privacy for Convenience?

Pilot Study Web-Based Single Sign-On: Are We Giving Up Security and Privacy for Convenience?

... Study Web-Based Single Sign-On: Are We Giving Up Security and Privacy for Convenience? ABSTRACT Within our society we have seen a dramatic increase in the amount of individuals that ... See full document

5

T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On

T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On

... In a distributed, services-based environment, authentication also includes transfer of authentica- tion-related data between services. If a subject has been authenticated once, reauthentication for each service ... See full document

53

Single Sign On Web Application Sample

Single Sign On Web Application Sample

... that single sign on application is not be fixed by the ones trying to the green button to enabled, you can give ...the single web sample will be the rdbms security realm for ... See full document

10

Web Services: Role Based Access Control with Single Sign-on Architecture

Web Services: Role Based Access Control with Single Sign-on Architecture

... must agree on common profile, which move privacy to the most important property of SSO [5]. Privacy is very critical and vital piece of the internet accessible system which involves storage of the user information, such ... See full document

21

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

... and user property retrieval. This is set to the same value as cleartrust.net.ssl.use. However, in environments where these operations are not required, disabling them can improve security. Note: This parameter ... See full document

18

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

... AMAZON WEB SERVICES Amazon Web Services provides a rich set of identity and access management (IAM) capabilities, including the ability to create and manage users and groups and apply specific access ... See full document

14

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On

... as Web Services, Federation, and user-centric identity are causing organizations to rethink and often dramatically expand their WAC ...risk-based security policies, and federate identities with other ... See full document

5

Developing a Single Sign-On System A Java-based authentication platform aimed at the web.

Developing a Single Sign-On System A Java-based authentication platform aimed at the web.

... Finally, we look at cryptography. Most of the issues here, such as choosing secure encryption and hashing algorithms is taken care of by the SAML specification. Some implementation specific details related to ... See full document

56

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

... 1: Single Sign-On using SAP Enterprise Portal SAP Logon Tickets SAP Logon Tickets serve as authentication ...the security settings of the SAP Enterprise ... See full document

11

Security and Privacy Concern for Single Sign-on Protocols

Security and Privacy Concern for Single Sign-on Protocols

... SAML, based on which Google has developed the Single Sign-on service for the web applications including Gmail, Google Calendar, Google Docs and ... See full document

12

Polybius: Secure Web Single-Sign-On for Legacy Applications

Polybius: Secure Web Single-Sign-On for Legacy Applications

... Abstract: Web-based interfaces to applications in all domains of university life are ...for single-sign-on (SSO) will remain ...local sign-in and SSO ...of security problems ... See full document

10

Polybius: Secure Web Single-Sign-On for Legacy Applications

Polybius: Secure Web Single-Sign-On for Legacy Applications

... Abstract: Web-based interfaces to applications in all domains of university life are ...for single-sign-on (SSO) will remain ...local sign-in and SSO ...of security problems ... See full document

10

Role based Access Control with Single Sign on Architecture using web Services for LMS

Role based Access Control with Single Sign on Architecture using web Services for LMS

... the web portals are using basic authentication and sending a password as clear text, PASS improves the security of the protocol by issuing the ...certificate based on the new private-public key pair ... See full document

6

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security

... a Web Service that provides a set of well-defined interfaces and follows specific ...XML based Single sign-on (SSO) standard for Web Services, which enables the exchange of ... See full document

8

Web Based Single Sign-On and Access Control

Web Based Single Sign-On and Access Control

... Client redirects Resource Owner to Resource Server (authorization request). Resource Owner authenticates to Resource Server and gives Client access[r] ... See full document

7

Show all 10000 documents...