Loading [MathJax]/extensions/MathMenu.js
IEEE Xplore Search Results

Showing 1-25 of 319 resultsfor

Filter Results

Show

Results

The use of internet is constantly increasing over the world and more wireless connections and technologies are used to access resources, services over the network. Mobility does not only imply changing location, but also accessing several applications within the same environment. We must therefore ensure seamless authentication mechanisms within these applications while changing devices. This pape...Show More
Currently, authentication methods using ID and password are widely used and fulfilled central roles in various information systems and services. Our university also uses ID and password for authentication of most services. However, passwords have various problems such as reuse, phishing and leakage. This research is a practical experiment in order to implement an integrated authentication system w...Show More
Over the past years Web applications increased in number and complexity (driven by ldquoWeb 2.0rdquo paradigm). Users need to manage different passwords to authenticate at these applications. Modern Web-based single sign-on solutions that reduce the complexity for usage and management of the userspsila credentials can be categorized in federated (typically SAML) or user-centric identity management...Show More
The National Grid Service (NGS) provides access to compute and data resources for UK academics. Currently users are required to have an X.509 certificate from the UK e-Science Certification Authority (CA) or one of its international peers to access the NGS. The CA must satisfy the requirements for internationally agreed assurance levels and some users find the processes of obtaining and managing c...Show More
This paper outlines the design of an authentication infrastructure for linking distributed heterogeneous cloud systems managed by different cloud management middleware to enable them to interoperate as an integrated inter-cloud system. This authentication infrastructure achieves single sign-on (SSO), which allows users to log in once and access the various cloud systems without being asked to log ...Show More
In a federation, single sign-on (SSO) for web applications can be achieved by performing authentication at the user's home organization called identity provider (IdP) and authorization at the service provider (SP). The IdP provides the user's information to the SP though the attribute exchange and the SP assigns the authorized access level for the user according to the data in the attributes. The ...Show More
Federated identities are rapidly spreading, especially in the academic world. Some services in identity federations need ID groups to provide the collaborative work and/or access control based on contracts with groups. Some existing group management systems in identity federations can provide services with group membership information, but they lack support for contracts and flow control of the me...Show More
Shibboleth, a growing popular solution to Single Sign-On (SSO), can simplify the user's operation process and reduce the resource provider's overhead. The multi-level security of Shibboleth has become a topic of concern. The basic Shibboleth infrastructure was introduced based on the current SSO solutions. Then we summarized the BLP model, which is considered the basic security axiom in our work. ...Show More
This paper presents a privacy-preserving attribute distribution mechanism for an identity federation framework. Attribute-based access control (ABAC) is a highly flexible and scalable access control scheme which can deal with diverse security requirements in grid environment. However, in ABAC the user attributes delivered by the Identity Providers for authorization decisions may cause some privacy...Show More
The JISC-funded Shintau project has produced an extension to the Shibboleth profile which allows a user to link information from more than one IdP together utilising a custom Linking Service (LS). This paper describes both the application and independent evaluation of this software by the Nationale-Science Centre (NeSC) at the University of Glasgow within the context of the ESRC-funded Data Manage...Show More
Today, more and more researchers are advocating the use of Clouds to form a virtual organization. However, the implementation of a cloud based virtual organization presents some security challenges. Generally, in the cloud, the authentication system is centralized. This represents an obstacle and contradicts the principle of virtual organizations, which requires that each member organization of th...Show More
We propose a web forward proxy server with authentication method using Shibboleth. With this proxy Single Sign-On would benefit a user and also authentication using Shibboleth protocol solves problems in basic access authentication and digest access authentication supported by existing web forward proxy servers. In order to realize it, the proxy needs to recognize attributes of shibboleth protocol...Show More
Although a university is a public space, only members can use the network of the university. Therefore, when members use the network, it is necessary to authenticate. We are using Single Sign-On authentication by shibboleth authentication in Saga University. On the other hand, the concept of SDN (Software Defined Network) came out. This is a way of thinking that we can control a network by softwar...Show More
The University Public Key Infrastructure (UPKI) project in Japan is developing a national academic inter-institution authentication and authorization infrastructure based on the Public Key Infrastructure (PKI), and it is carrying out a feasibility study on SAML 2.0 federation by building a Shibboleth2.x test-bed called UPKI-Fed with about thirty university participants. Federation usually provides...Show More
Majority of web authentication is implemented using username and password mechanism. How about leveraging the Shibboleth authentication advantages as an alternative to username and password based authentication to access a live web site? This challenge is trivial if, the codes that built the external web sites are permissible to be modified. In a case where no access on the codes is available, we ...Show More
Single Sign-On (SSO) is adopted to use multiple services with a single log-in in the Internet. However, when a user tries to change the identity provider (IdP) which is responsible for authenticating of the user, he needs to release the binding between the log-in account on the migration-source IdP and his service account on each service provider (SP), and needs to set a new binding between the ac...Show More
A mechanism for privacy-enhanced authentication and authorization federation is proposed. The mechanism conceals attributes of a user provided by the IdP from the SP, and simultaneously conceals an authorization policy of a service presented by the SP from the IdP. The mechanism is implemented as an authentication federation proxy which works between an IdP and an SP. Attributes of a user is provi...Show More
The aim of the simple heterogeneous inter-cloud manager (SHINCLOM) project is to develop a prototype web-based single sign-on inter-cloud management portal that gives users the ability to easily configure and launch inter-cloud VPCs, HPC clusters, and autonomic applications and services. We employ a model-based approach in which the various requirements of the project are mapped to the layers of a...Show More
Shibboleth enables a seamless connection for authentication required Web sites. In this paper, we describe an implementation and a practice for such connection in e-Learning between a Moodle, a video streaming site and providing results of examinations site.Show More
CARSI realize resource sharing by using Shibboleth IdP (Identity Provider) and SP (Service Provider), which are based on SAML protocol. Universities in China join CARSI as IdP or SP member, service providers join CARSI as SP member. Shibboleth IdP external login flow supports only one arbitrary external authentication mechanism. For universities have multiple authentication systems, if we use only...Show More
We add flexibility to the authorization with Shibboleth by featuring a system managing additional attributes. The system offers an interface and a database to privileged administrators. When any temporary groups or projects are created, a proper set of users are assigned to them without modifying the IdP backends.Show More

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems

;;;

The Computer Journal
Year: 2009 | Volume: 52, Issue: 8 | Journal Article |
The requirements for access control have been increased significantly in smart home systems. Many factors such as user ID, user location, service usage conditions and so on, regarded as authorization attributes, are important in making authorization decision in smart home systems. We investigate into the dynamic characteristics of the authorization in smart home systems and propose a new access-co...Show More

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems

;;;

Year: 2009 | Volume: 52, Issue: 8 | Journal Article |
Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focused for making it bug-free for the users. This paper is basically focusing on overcoming the securit...Show More
Self-sovereign identity provides a feasible alternative to login via username and password through an identity provider to access digital services. It allows identity subjects to control and own their data. Although this is an appealing approach, it requires a whole new infrastructure with almost no dependencies on the existing ones. We designed and implemented a solution that combines an existing...Show More
Shibboleth is a well-known software package for web single sign-on (SSO) based on several federated identity standards, including the Organization for the Advancement of Structured Information Standards (OASIS)' security assertion markup language (SAML) version 1.1 and 2.0. This paper describes uApprove.jp, a user consent acquisition system (UCAS) with an attribute-filter mechanism for a Shibbolet...Show More