Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
LanguageLanguage
-
SubjectSubject
-
Item TypeItem Type
-
DisciplineDiscipline
-
YearFrom:-To:
-
More FiltersMore FiltersIs Peer Reviewed
Done
Filters
Reset
459
result(s) for
"single sign-on"
Sort by:
Usability Testing for Student Academic Information System in State Polytechnic of Creative Media
2021
SIAM (Student Academic Information System) is an academic services information system that has been implemented at the State Polytechnic of Creative Media (Polimedia). It’s been two months SIAM has been integrated using Single Sign On (SSO). After we implemented SIAM new version we received a lot of complaints every day. In this research, the authors conducted a usability test on the SIAM new version in order to determine the effectiveness and performance of the application. Usability test components include effectiveness, efficiency, and satisfaction. The average usability 70% indicates that the SIAM new version has a good usability performance.
Journal Article
A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems
2021
Healthcare is now an important part of daily life because of rising consciousness of health management. Medical professionals can know users’ health condition if they are able to access information immediately. Telemedicine systems, which provides long distance medical communication and services, is a multi-functional remote medical service that can help patients in bed in long-distance communication environments. As telemedicine systems work in public networks, privacy preservation issue of sensitive and private transmitted information is important. One of the means of proving a user’s identity are user-controlled single sign-on (UCSSO) authentication scheme, which can establish a secure communication channel using authenticated session keys between the users and servers of telemedicine systems, without threats of eavesdropping, impersonation, etc., and allow patients access to multiple telemedicine services with a pair of identity and password. In this paper, we proposed a smartcard-based user-controlled single sign-on (SC-UCSSO) for telemedicine systems that not only remains above merits but achieves privacy preservation and enhances security and performance compared to previous schemes that were proved with BAN logic and automated validation of internet security protocols and applications (AVISPA).
Journal Article
Challenges in Single Sign-On
by
Pandey, Prashant
,
Nisha, T N
in
Downtime
,
Information Technology (IT)
,
Multi-Factor Authentication (MFA)
2021
Single sign-on uses a centralized session concept, and it is a service that authenticates one and one-on-one designated platform. Later, with this, we can use various services and products without logging in every time. However, there are sure demanding situations in implementing SSO. Business enterprise no longer is most effective and needs to integrate user network logon with a nearby application and software program (SaaS) cloud offering. Simultaneously, in an enterprise, SSO’s centralized solution does not include all the users, applications, devices, and equipment. Another undertaking from the records angle is that the user can log on outside SSO answers. Its user identification may also exist in exceptional forms. Simultaneously, the enterprise desires to cope with bequest desktop programs that do not coordinate with users’ listing logins which may be the frail hyperlink that reasons SSO to fail in the company. With the efficiently applied SSO and designing framework keeping in mind the challenges, we can enable and disable users to enter more than one system, platform, apps, and different resources. Also, it may effectively resolve and dispose of the problem of password-related downtime and reset expenses. Simultaneously, it removes the danger of threat from an insider, improves authentication processes and user experience, delivers authority to the company, and simultaneously provides them with the right of entry to firmly on top of the user’s things.
Journal Article
Single Sign-On Security and Privacy: A Systematic Literature Review
by
Belfaik, Yousra
,
Rehaimi, Abdeslam
,
Zineddine, Abdelhadi
in
Literature reviews
,
Privacy
,
Security
2025
With the proliferation of online services and applications, adopting Single Sign-On (SSO) mechanisms has become increasingly prevalent. SSO enables users to authenticate once and gain access to multiple services, eliminating the need to provide their credentials repeatedly. However, this convenience raises concerns about user security and privacy. The increasing reliance on SSO and its potential risks make it imperative to comprehensively review the various SSO security and privacy threats, identify gaps in existing systems, and explore effective mitigation solutions. This need motivated the first systematic literature review (SLR) of SSO security and privacy, conducted in this paper. The SLR is performed based on rigorous structured research methodology with specific inclusion/exclusion criteria and focuses specifically on the Web environment. Furthermore, it encompasses a meticulous examination and thematic synthesis of 88 relevant publications selected out of 2315 journal articles and conference/proceeding papers published between 2017 and 2024 from reputable academic databases. The SLR highlights critical security and privacy threats relating to SSO systems, reveals significant gaps in existing countermeasures, and emphasizes the need for more comprehensive protection mechanisms. The findings of this SLR will serve as an invaluable resource for scientists and developers interested in enhancing the security and privacy preservation of SSO and designing more efficient and robust SSO systems, thus contributing to the development of the authentication technologies field.
Journal Article
Leveraging identity and access management technology to accelerate emergency COVID-19 vaccine delivery
2023
COVID-19-related vaccine demand and delivery volume challenged delivery organizations as few crises have. Imperatives to ensure security of patient information, defend against cybersecurity threats, and accurately identify/authenticate clinician identity for patients remained unchanged. Deployment of identity access and management (IAM) and single sign-on (SSO) can accelerate operationalization of a vaccine delivery center when urgently needed in a crisis. Innovative application of existing IAM/SSO technology, combined with an identity governance solution, greatly accelerated vaccine delivery. Secure access enabled by IAM technology facilitated a rapid expansion (25 minutes) where 500 new vaccine delivery personnel were identified and authenticated during a period of high pandemic incidence. Existing digital identity solutions enabled a vaccine delivery organization to accelerate secure IAM of clinical staff during the peak of the COVID-19 pandemic. Existing IAM investments and capabilities that are widely implemented in nations with mature health information technology systems can greatly accelerate standing up emergent vaccine delivery capabilities and sites in the midst of a public health crisis.
Journal Article
Integration of an Open Source Identity Management System in Educational Platforms
by
Pozo, Alejandro
,
Barra, Enrique
,
López-Pernas, Sonsoles
in
Access control
,
Access to information
,
Education
2024
Making research advances available to the community in the shape of open source software has the potential to introduce cutting-edge innovations from early on, foster collaborative development, and revolutionize industrial applications. However, including open source software resulting from a research project as part of a production system poses some risks and must be evaluated in detail, considering all pros and cons. This is especially delicate when that piece of software is in charge of authentication and authorization. This article reports on an experience of integrating open source identity and access management (IAM) software that is the result of multiple research projects, the FIWARE Keyrock IAM, into three educational web-based platforms: two learning object repositories and a course management platform. We intend to draw the lessons learned from this experience so they can guide software practitioners when deciding if they should integrate open source software developed in research projects.
Journal Article
Analyzing Privacy Implications and Security Vulnerabilities in Single Sign-On Systems: A Case Study on OpenID Connect
2024
Single Sign-On (SSO) systems have gained popularity for simplifying the login process, enabling users to authenticate through a single identity provider (IDP). However, their widespread adoption raises concerns regarding user privacy, as IDPs like Google or Facebook can accumulate extensive data on user web behavior. This presents a significant challenge for privacy-conscious users seeking to restrict disclosure of their online activities to third-party entities. This paper presents a comprehensive study focused on the OpenID Connect protocol, a widely utilized SSO standard. Our analysis delves into the protocol's operation, identifying security flaws and vulnerabilities across its various stages. Additionally, we systematically examine the privacy implications associated with user access to SSO systems. We offer a detailed account of how easily user information can be accessed, shedding light on potential risks. The findings underscore the imperative to address privacy vulnerabilities within SSO infrastructures. We advocate for proactive measures to enhance system security and safeguard user privacy effectively. By identifying weaknesses in the OpenID Connect protocol and its implementations, stakeholders can implement targeted strategies to mitigate risks and ensure the protection of user data. This research aims to foster a more secure and privacy-respecting environment within the evolving landscape of SSO systems.
Journal Article
UIP2SOP: A Unique IoT Network applying Single Sign-On and Message Queue Protocol
by
Anh, Tuan Dao
,
Nguyen, The Anh
,
Tuan, Khoi Nguyen Huynh
in
Client servers
,
Communication
,
Internet of Things
2021
Internet of Things (IoT), currently, plays an importance role in our life, also, this is one of the most rapidly developing technology trends. However, the present structure has some limitation - one of these is the communication via client-server model - the users, devices, and applications using IoT services where all the connection/requirement is managed at IoT service providers. On the one hand, the IoT service providers (e.g., individual, organization) have different method to manage their devices, services, and users. Thus, the unique standard (i.e., communication method among the service providers and between client server) is still the challenge for the developers. On the other hand, Message Queuing Telemetry Protocol (MQTT) that is one of the most popular protocols in IoT deployments, has signif-icant security and privacy issues by itself (e.g., authentication, authorization, as well as privacy problem). Therefore, this paper proposes UIP2SOP - an unique IoT network by using Single Sign-On (SSO) and message queue to improve the MQTT protocol’s security problem. Besides, this model allows the organizations to provide the IoT services to connect into a single network but does not change the architecture of organization at all. The evaluation section proves the effectiveness of our proposed model. In particular, we consider the number of concurrent users publishing messages simultaneously in the two scenarios i) internal communication and ii) external communication. In addition, we evaluate recovery ability of system when occurred broken connection. Finally, to engage further reproducibility and improvement, we share a complete code solution is publicized on the GitHub repository.
Journal Article
IoHT-MBA: An Internet of Healthcare Things (IoHT) Platform based on Microservice and Brokerless Architecture
by
Anh, Tuan Dao
,
Nguyen, The Anh
,
Tuan, Khoi Nguyen Huynh
in
Access control
,
Big Data
,
Computer architecture
2021
Internet of Thing (IoT), currently, is one of the technology trends that are most interested. IoT can be divided into five main areas including: Health-care, Environmental, Smart city, Commercial and Industrial. The IoHT-MBA Platform is considered the backbone of every IoT architecture, so the optimal design of the IoHT-MBA Platform is essential issue, which should be carefully considered in the different aspects. Although, IoT is applied in multiple domains, however, there are still three main features that are challenge to improve: i) data collection, ii) users, devices management, and iii) remote device control. Today’s medical IoT systems, often too focused on the big data or access control aspects of participants, but not focused on collecting data accurately, quickly, and efficiently; power redundancy and system expansion. This is very important for the medical sector - which always prioritizes the availability of data for therapeutic purposes over other aspects. In this paper, we introduce the IoHT Platform for Healthcare environment which is designed by microservice and brokerless architecture, focusing strongly on the three aforementioned characteristics. In addition, our IoHT Platform considers the five other issues including (1) the limited processing capacity of the devices, (2) energy saving for the device, (3) speed and accurate of the data collection, (4) security mechanisms and (5) scalability of the system. Also, in order for the IoHT Platform to be suitable for the field of health monitoring, we also add realtime alerts for the medical team. In the evaluation section, moreover, we describe the evaluation to prove the effectiveness of the proposed IoHT Platform (i.e. the proof-of-concept) in the performance, non-error, and non affected by geographical distance. Finally, a complete code solution is publicized on the authors’ GitHub repository to engage further reproducibility and improvement.
Journal Article
Non-transferable blockchain-based identity authentication
2023
Due to the identification functionality, identity authentication is the first and primary security step in many information systems. There exist many works dedicated to giving secure identity authentication. However, most of the existing schemes suffer from at least one of the following problems: heavy account management, single point of failure, and privacy leakage. To tackle these challenges, we propose two blockchain-based identity authentication schemes in this paper. One is based on the famous Diffie-Hellman key exchange protocol and is efficient but with user-verifier interaction. The other utilizes the ring signature, which is non-interactive with a small computational cost. Besides the traditional security properties, such as unforgeability and identity anonymity, our proposed schemes can hold non-transferability, i.e., the verifier cannot prove the user’s identity authentication to any third party. At last, the extensive experimental results demonstrate that our proposals are practical and efficient.
Journal Article