메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Single sign-on with one time password

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION MECHANISMS; BUSINESS NEEDS; COST EFFECTIVE; DIFFERENT PROTOCOLS; END-USERS; EXISTING SYSTEMS; KERBEROS; ONE TIME PASSWORDS; SINGLE SIGN ON; SMALL ORGANIZATIONS; SYSTEM ADMINISTRATORS; WEB BASED PLATFORM;

EID: 71849106158     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AHICI.2009.5340290     Document Type: Conference Paper
Times cited : (9)

References (10)
  • 1
    • 63449115454 scopus 로고    scopus 로고
    • A Taxonomy of Single Sign-On Systems
    • R. Safavi-Naini and J. Seberry editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings, Springer-Verlag, Berlin
    • A. Pashalidis and C. J. Mitchell, "A Taxonomy of Single Sign-On Systems" , in R. Safavi-Naini and J. Seberry (editors), Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings, Springer-Verlag (LNCS 2727), Berlin (2003), pp.249-264.
    • (2003) LNCS , vol.2727 , pp. 249-264
    • Pashalidis, A.1    Mitchell, C.J.2
  • 2
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • Sept
    • B.C. Newman, and T Ts'o,., "Kerberos: An Authentication Service for Computer Networks," IEEE Communications, 32(9):33-38, Sept. 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Newman, B.C.1    Ts'o, T.2
  • 6
    • 71849088141 scopus 로고    scopus 로고
    • The J2EE™ 1.4 Tutorial.. 8.2
    • ed, E-book
    • E. Armstrong, J. Ball, S. Bodoff,, D. B. Carson, I. Evans , D. Green, et al., The J2EE™ 1.4 Tutorial.. 8.2 ed., Santa Clara, CA: Sun Microsystems, 2005. [E-book] Available: http://java.sun.com/j2ee/1.4/docs/tutorial/doc/ J2EETutorial.pdf
    • (2005) Available
    • Armstrong, E.1    Ball, J.2    Bodoff, S.3    Carson, D.B.4    Evans, I.5    Green, D.6
  • 7
    • 71849119129 scopus 로고    scopus 로고
    • G. King, C. Bauer, M.R. Andersen, E. Bernard, E. Bernard, and S. Ebersole, Hibernate Reference Documentation, 3.3.2 GA, Raleigh North Carolina, USA: Red Hat, Inc., 2009. [E-book] Available: http://docs.jboss.org/hibernate/ stable/core/reference/en/pdf/hibernate-reference.pdf
    • G. King, C. Bauer, M.R. Andersen, E. Bernard, E. Bernard, and S. Ebersole, Hibernate Reference Documentation, 3.3.2 GA, Raleigh North Carolina, USA: Red Hat, Inc., 2009. [E-book] Available: http://docs.jboss.org/hibernate/ stable/core/reference/en/pdf/hibernate-reference.pdf
  • 8
    • 71849100966 scopus 로고    scopus 로고
    • National Institute of Standards and Technology,U.S. Department of Commerce. Secure Hash Standard, 2002. FIPS PUB180-2. Available: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf
    • National Institute of Standards and Technology,U.S. Department of Commerce. Secure Hash Standard, 2002. FIPS PUB180-2. Available: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf
  • 9
    • 77954334497 scopus 로고    scopus 로고
    • Single sign-on for java web start applications using myproxy
    • New York, NY, USA: ACM Press, Available
    • T. Fleury, J. Basney, and V. Welch, "Single sign-on for java web start applications using myproxy," in SWS '06: Proceedings of the 3rd ACM workshop on Secure web services. New York, NY, USA: ACM Press, 2006, pp. 95-102.Available: http://grid.ncsa.illinois.edu/papers/sws-myproxy-jws.pdf.
    • (2006) SWS '06: Proceedings of the 3rd ACM workshop on Secure web services , pp. 95-102
    • Fleury, T.1    Basney, J.2    Welch, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.