Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Usability meets security - the Identity-Manager as your personal security assistant for the Internet
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Establishing and protecting digital identity in federation systems
Proceedings of the 2005 workshop on Digital identity management
XOS-SSH: a lightweight user-centric tool to support remote execution in virtual organizations
LASCO'08 First USENIX Workshop on Large-Scale Computing
AA-RR: working with authentication and authorization infrastructures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Large-scale ETD repositories: a case study of a digital library application
Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries
Design of lock-keeper federated authentication gateway
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Privacy-enhancing identity management in business
Digital privacy
An integrated approach for identity and access management in a SOA context
Proceedings of the 16th ACM symposium on Access control models and technologies
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
On secure framework for web services in untrusted environment
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems
ThresPassport – a distributed single sign-on service
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Architecture framework for device single sign on in personal area networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A multipurpose delegation proxy for WWW credentials
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
An empirical study on the usability of logout in a single sign-on system
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
O2O: virtual private organizations to manage security policy interoperability
ICISS'06 Proceedings of the Second international conference on Information Systems Security
SP'11 Proceedings of the 19th international conference on Security Protocols
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
Customer-Centered Careflow Modeling Based on Guidelines
Journal of Medical Systems
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single Sign-On (SSO) has been proposed as a solution to the usability, security and management implications of this situation. Under SSO, users authenticate themselves only once and are logged into the services they subsequently use without further manual interaction. Several architectures for SSO have been developed, each with different properties and underlying infrastructures. This paper presents a taxonomy of these approaches and puts some of the SSO schemes, services and products into that context. This enables decisions about the design and selection of future approaches to SSO to be made within a more structured context; it also reveals some important differences in the security properties that can be provided by various approaches.