Design on a Single Sign-On Scheme

Abstract:

Article Preview

In practice, the single sign-on system is likely to suffer password attack and replay attack, etc. For the purpose of resolving these problems, a new single sign-on scheme is raised, which is based on dynamic password method. In the new scheme, a specific design is given, and the security of this scheme is analyzed in details. In this scheme, through the universal dynamic password authentication, the user can visit all the services in the visiting range. At the same time, the scheme implements the connect authentication between the client and application servers.

Info:

Periodical:

Edited by:

Zhu Zhilin & Patrick Wang

Pages:

531-536

DOI:

10.4028/www.scientific.net/AMM.40-41.531

Citation:

W. Lei et al., "Design on a Single Sign-On Scheme", Applied Mechanics and Materials, Vols. 40-41, pp. 531-536, 2011

Online since:

November 2010

Export:

Price:

$35.00

[1] Single Sign-On. http: /en. wikipedia. org/wiki/Single_sign-on. (Access date May 2010).

[2] (USA)Knox(ED. ), LIU Gui-qing(Trans. ).: Oracle Database 10g Security Design Efficiently. Beijing: Tsinghua University Press. (2006).

[3] LAI Shen-lu, LI xin & JI Jun-chuan.: Application of Pluggable SSO Technology. Computer Engineering, Vol. 34(2008), pp.121-122, 125.

[4] HUANG Ye-yu, CHEN Qin.: New Dynamic Password Authentication Scheme. Computer Engineering and Design, Vol. 26(2005), pp.1735-1736, 1739.

[5] LEI Wen, ZHAO Pan, ZHANG Hong.: Study and Improve on a Dynamic Password Authentication Scheme. Sichuan University of Science& Engineering(Natural Science Edition), Vol. 22(2009), pp.47-50.

[6] HUANG Ye-yu, CHEN Qin.: Design and Implementation of Website Universal Password Authentication System. Computer Technology and Development, Vol. 17(2007), pp.163-165, 169.

[7] LI Ji-yong, TAO Ran.: Design of Single Sign-on Protocol. Computer Engineering, Vol. 34(2008), pp.152-154.

[8] YANG Zhi, CHEN Xing-yuan, ZHANG Bin.: A Single Sign-On Scheme Supporting Double Authentication Method. Computer Applications, Vol. 27(2007), pp.595-596, 61.

In order to see related information, you need to Login.