350 rub
Journal Highly available systems №2 for 2011 г.
Article in number:
A generalized scheme for Pseudo-SSO server components
Authors:
K.D. Averchenko, S.P. Panasenko
Abstract:
Single sign-on (SSO) systems allow to solve the following problem: how to store and to use a large amount of authentication information (e. g. username and password pairs) to gain access to different services. SSO systems can be divided into two main types: Pseudo-SSO and True SSO. A Pseudo-SSO component simply acts by the following scheme: first, it authenticates a user once; second, when the user requires any service of the secured system, the component uses user-s data required to gain access to the desirable service
Pages: 47-50
References
  1. Pashalidis A., Mitchell C. Using GSM/UMTS for Single Sign-On. // http://citeseerx.ist.psu.edu. 2003.
  2. Pashalidis A., Mitchell C. Single Sign-On using Trusted Platforms. // Материалы VI международной конференции ISC 2003, Bristol, UK, октябрь 2003: Lecture Notes in Computer Science. V. 2851. P.54-68.
  3. Pashalidis A., Mitchell C. Impostor: A Single Sign-On System for Use from Untrusted Devices. // http://citeseerx.ist.psu.edu. 2004.
  4. Lewis K.D., Lewis J.E. Web Single Sign-On Authentication using SAML. // International Journal of Computer Science Issues. № 2. 2009. P. 41-48.
  5. Security Assertion Markup Language (SAML). // http://xml.coverpages.org/saml.html. February 23. 2010.
  6. Pashalidis A., Mitchell C. Using EMV cards for Single Sign-On. // http://www.isg.rhul.ac.uk. 2004.
  7. Pashalidis A., Mitchell C. A Taxonomy of Single Sign-On Systems. Материалы международной конференции ACISP 2003: Lecture Notes in Computer Science. V. 2727. Р. 249-264.