Loading [MathJax]/extensions/MathMenu.js
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service | IEEE Conference Publication | IEEE Xplore

Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service


Abstract:

The central authentication service (CAS) is a middleware for constructing a single sign on infrastructure for Web applications and has been developed by JA-SIG. In this p...Show More

Abstract:

The central authentication service (CAS) is a middleware for constructing a single sign on infrastructure for Web applications and has been developed by JA-SIG. In this paper, we investigate a multiple-tiered security hierarchy infrastructure for Web applications, by extending CAS to the central authentication and authorization service (CAS2). Since the new version of CAS (CAS3) supports the X.509 client certificate authentication, we use it as leverage to realize our multiple-tiered security hierarchy mechanism. As a result, CAS2 uses X.509 client certification for not only authentication, but also authorization
Date of Conference: 15-19 January 2007
Date Added to IEEE Xplore: 12 February 2007
CD:0-7695-2757-4
Conference Location: Hiroshima, Japan
No metrics found for this document.

1. Introduction

Most higher educational institutions are struggling to provide efficient and effective information services due to the hierarchical and silo structure of service units. For example, a section that serves students independently works from a section that serves faculties for research. Therefore, each section has a tendency to provide its own information system that has its own authentication and authorization functions. As a result, various authentication and authorization functions are introduced; however, the existence of many authentication functions gives rise to a lot of authentication data for each person. It is well-known that such a situation induces not only increases in management costs but also decreases the security of information systems. Therefore, institutions are trying to introduce “unified authentication databases” to decrease management costs and to strengthening security.

Usage
Select a Year
2024

View as

Total usage sinceJan 2011:184
00.511.522.53JanFebMarAprMayJunJulAugSepOctNovDec000010002001
Year Total:4
Data is updated monthly. Usage includes PDF downloads and HTML views.
Contact IEEE to Subscribe

References

References is not available for this document.