A Secure Single Sign-On Mechanism for Distributed Computer Networks

被引:27
作者
Chang, Chin-Chen [1 ,2 ]
Lee, Chia-Yin [2 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62102, Taiwan
关键词
Anonymity; key distribution; mobile devices; user identification; USER AUTHENTICATION SCHEME; IDENTIFICATION SCHEME; ANONYMITY; IMPROVEMENTS;
D O I
10.1109/TIE.2011.2130500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User identification is an important access control mechanism for client-server networking architectures. The concept of single sign-on can allow legal users to use the unitary token to access different service providers in distributed computer networks. Recently, some user identification schemes have been proposed for distributed computer networks. Unfortunately, most existing schemes cannot preserve user anonymity when possible attacks occur. Also, the additional time-synchronized mechanisms they use may cause extensive overhead costs. To overcome these drawbacks, we propose a secure single sign-on mechanism that is efficient, secure, and suitable for mobile devices in distributed computer networks.
引用
收藏
页码:629 / 637
页数:9
相关论文
共 36 条
[1]  
[Anonymous], 1988, NIST STD FIPS PUB
[2]  
[Anonymous], 2008, NIST STAND FIPS PUB
[3]  
[Anonymous], 2001, NIST STD FIPS PUB
[4]   JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing [J].
Barolli, Leonard ;
Xhafa, Fatos .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (06) :2163-2172
[5]  
Bellare M., 1994, CRYPTO, P232
[6]  
Bellare M., 2000, LNCS, V1807, P140
[7]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[8]   A Robust Distributed Congestion-Control Strategy for Differentiated-Services Network [J].
Bouyoucef, K. ;
Khorasani, K. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (03) :608-617
[9]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[10]   Practical anonymous user authentication scheme with security proof [J].
Chien, Hung-Yu .
COMPUTERS & SECURITY, 2008, 27 (5-6) :216-223