1. Introduction
Most higher educational institutions are struggling to provide efficient and effective information services due to the hierarchical and silo structure of service units. For example, a section that serves students independently works from a section that serves faculties for research. Therefore, each section has a tendency to provide its own information system that has its own authentication and authorization functions. As a result, various authentication and authorization functions are introduced; however, the existence of many authentication functions gives rise to a lot of authentication data for each person. It is well-known that such a situation induces not only increases in management costs but also decreases the security of information systems. Therefore, institutions are trying to introduce “unified authentication databases” to decrease management costs and to strengthening security.