To see the other types of publications on this topic, follow the link: Single Sign-On.

Journal articles on the topic 'Single Sign-On'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Single Sign-On.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shaer, Caroline. "Single sign-on." Network Security 1995, no. 8 (1995): 11–15. http://dx.doi.org/10.1016/1353-4858(96)89743-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pandey, Prashant, and T. N. Nisha. "Challenges in Single Sign-On." Journal of Physics: Conference Series 1964, no. 4 (2021): 042016. http://dx.doi.org/10.1088/1742-6596/1964/4/042016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ormancey, E. "CERN single sign on solution." Journal of Physics: Conference Series 119, no. 8 (2008): 082008. http://dx.doi.org/10.1088/1742-6596/119/8/082008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ting, David. "Biometrics and single sign-on." Biometric Technology Today 13, no. 8 (2005): 8–9. http://dx.doi.org/10.1016/s0969-4765(05)70387-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roßnagel, Heiko, and Jan Zibuschka. "Single Sign On mit Signaturen." Datenschutz und Datensicherheit - DuD 30, no. 12 (2006): 773–77. http://dx.doi.org/10.1007/s11623-006-0238-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meyer, Helen. "Servers get single sign-on." Computers & Security 15, no. 4 (1996): 318. http://dx.doi.org/10.1016/0167-4048(96)88945-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Hyun-Jin, and Im-Yeong Lee. "A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack." Journal of the Korea Institute of Information Security and Cryptology 24, no. 5 (2014): 769–80. http://dx.doi.org/10.13089/jkiisc.2014.24.5.769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Suhartanta, I. Wayan Manik, and Nyoman Putra Sastra. "Survey Tingkat Penggunaan Single Sign On pada 500 Situs Peringkat Teratas Alexa.com." Majalah Ilmiah Teknologi Elektro 16, no. 1 (2017): 49–52. http://dx.doi.org/10.24843/mite.1601.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lei, Wen, Xing Jian Liang, and Hong Zhang. "Design on a Single Sign-On Scheme." Applied Mechanics and Materials 40-41 (November 2010): 531–36. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.531.

Full text
Abstract:
In practice, the single sign-on system is likely to suffer password attack and replay attack, etc. For the purpose of resolving these problems, a new single sign-on scheme is raised, which is based on dynamic password method. In the new scheme, a specific design is given, and the security of this scheme is analyzed in details. In this scheme, through the universal dynamic password authentication, the user can visit all the services in the visiting range. At the same time, the scheme implements the connect authentication between the client and application servers.
APA, Harvard, Vancouver, ISO, and other styles
10

Fink, Glenn, and Ivan Miller. "Digital Afterthoughts on Single Sign-on Technology." Emergency Medicine News 29, no. 4 (2007): 20–21. http://dx.doi.org/10.1097/01.eem.0000269590.03994.0b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Radha, V., and D. Hitha Reddy. "A Survey on Single Sign-On Techniques." Procedia Technology 4 (2012): 134–39. http://dx.doi.org/10.1016/j.protcy.2012.05.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mir, Omid, Michael Roland, and René Mayrhofer. "Decentralized, Privacy-Preserving, Single Sign-On." Security and Communication Networks 2022 (January 22, 2022): 1–18. http://dx.doi.org/10.1155/2022/9983995.

Full text
Abstract:
In current single sign-on authentication schemes on the web, users are required to interact with identity providers securely to set up authentication data during a registration phase and receive a token (credential) for future access to services and applications. This type of interaction can make authentication schemes challenging in terms of security and availability. From a security perspective, a main threat is theft of authentication reference data stored with identity providers. An adversary could easily abuse such data to mount an offline dictionary attack for obtaining the underlying pa
APA, Harvard, Vancouver, ISO, and other styles
13

Lin, Ping, Sunil Menon, Shailesh Patel, and Lin Lin. "Single Sign-On for Unified Communications." International Journal of Intelligent Computing Research 3, no. 3 (2012): 255–62. http://dx.doi.org/10.20533/ijicr.2042.4655.2012.0033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Goldis, Peter D. "Single Sign-on: Problems and Solutions." Information Systems Security 4, no. 2 (1995): 42–54. http://dx.doi.org/10.1080/10658989509342498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Goth, G. "Single Sign-on and Social Networks." IEEE Distributed Systems Online 9, no. 12 (2008): 1. http://dx.doi.org/10.1109/mdso.2008.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hardy, Gary. "The truth behind single sign-on." Information Security Technical Report 1, no. 2 (1996): 46–55. http://dx.doi.org/10.1016/s1363-4127(97)89356-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dai, Guiping, and Yong Wang. "Single Sign-On Under Quantum Cryptography." International Journal of Theoretical Physics 53, no. 1 (2013): 188–93. http://dx.doi.org/10.1007/s10773-013-1796-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

WANG, Guo-wei, and Man-jun XUE. "Token-based cross domain single sign on." Journal of Computer Applications 32, no. 6 (2013): 1766–68. http://dx.doi.org/10.3724/sp.j.1087.2012.01766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Aishwarya U et al.,, Aishwarya U. et al ,. "Review of Single Sign-On Authentication Framework." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 4387–94. http://dx.doi.org/10.24247/ijmperdjun2020417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gellert, George A., Ricardo Ramirez, Walter J. Jacobs, and Gabriel Maciaz. "Electronic Health Record Workstation Single Sign-on." JONA: The Journal of Nursing Administration 50, no. 9 (2020): 462–67. http://dx.doi.org/10.1097/nna.0000000000000917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Beltran, Victoria. "Characterization of web single sign-on protocols." IEEE Communications Magazine 54, no. 7 (2016): 24–30. http://dx.doi.org/10.1109/mcom.2016.7514160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Chinitz, Jonathan. "Single Sign-On: Is It Really Possible?" Information Systems Security 9, no. 3 (2000): 1–14. http://dx.doi.org/10.1201/1086/43310.9.3.20000708/31359.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Mansfield-Devine, Steve. "Single Sign-On: matching convenience with security." Biometric Technology Today 2011, no. 7 (2011): 7–11. http://dx.doi.org/10.1016/s0969-4765(11)70134-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Guntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (2018): 12–21. http://dx.doi.org/10.31849/digitalzone.v9i1.648.

Full text
Abstract:
Aplikasi single sign-on (SSO) adalah sebuah sistem otentikasi login yang mengizinkan bagi seorang pengguna dapat mengakses banyak sistem hanya dengan satu akun aja. Dengan sistem single sign-on (SSO) tersebut, seorang user sistem aplikasi hanya cukup melakukan otentikasi sekali saja untuk masuk ke semua layanan yang terdapat pada dalam sistem aplikasi. Otentikasi login berbasis teks pada sistem single sign-on (SSO) yang sudah ada saat ini, mempunyai kelemahan, salah satunya adalah pencurian password dengan aplikasi keylogger. Perancangan aplikasi sistem single sign-on (SSO) yang dikembangkan d
APA, Harvard, Vancouver, ISO, and other styles
25

Guntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (2018): 12–21. http://dx.doi.org/10.31849/dz.v9i1.648.

Full text
Abstract:
Aplikasi single sign-on (SSO) adalah sebuah sistem otentikasi login yang mengizinkan bagi seorang pengguna dapat mengakses banyak sistem hanya dengan satu akun aja. Dengan sistem single sign-on (SSO) tersebut, seorang user sistem aplikasi hanya cukup melakukan otentikasi sekali saja untuk masuk ke semua layanan yang terdapat pada dalam sistem aplikasi. Otentikasi login berbasis teks pada sistem single sign-on (SSO) yang sudah ada saat ini, mempunyai kelemahan, salah satunya adalah pencurian password dengan aplikasi keylogger. Perancangan aplikasi sistem single sign-on (SSO) yang dikembangkan d
APA, Harvard, Vancouver, ISO, and other styles
26

I, Putu Arie Pratama, Linawati, and Putra Sastra Nyoman. "Token-based Single Sign-on with JWT as Information System Dashboard for Government." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 4 (2018): 1745–51. https://doi.org/10.12928/TELKOMNIKA.v16i4.8388.

Full text
Abstract:
Various web-based information systems are developed by Indonesian government to improve quality of services for their society. It encourages users, generally civil servants, to perform different authentications on used information systems and have to remember credentials. Account management of the users poses another challenge for administrators. Single Sign-On (SSO) can be the solution by providing a service of centralized authentication and user account management. This study applies a token-based SSO architecture and uses Json Web Token (JWT) to grant permission authorities, since JWT can p
APA, Harvard, Vancouver, ISO, and other styles
27

Yinglan, Fang, Jin Hao, and Han Bing. "Single Sign-On Research and Expansion Based On CAS." Open Cybernetics & Systemics Journal 8, no. 1 (2015): 200–207. http://dx.doi.org/10.2174/1874110x01408010200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ramamoorthi, Lokesh Saravanan, and Dilip Sarkar. "Single Sign-On: A Solution Approach to Address Inefficiencies During Sign-Out Process." IEEE Access 8 (2020): 195675–91. http://dx.doi.org/10.1109/access.2020.3033570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ahmad, Adeel, Asier Aguado Corman, Maria Fava, et al. "The new (and improved!) CERN Single-Sign-On." EPJ Web of Conferences 251 (2021): 02015. http://dx.doi.org/10.1051/epjconf/202125102015.

Full text
Abstract:
The new CERN Single-Sign-On (SSO), built around an open source stack, has been in production for over a year and many CERN users are already familiar with its approach to authentication, either as a developer or as an end user. What is visible upon logging in, however, is only the tip of the iceberg. Behind the scenes there has been a significant amount of work taking place to migrate accounts management and to decouple Kerberos [1] authentication from legacy Microsoft components. Along the way the team has been engaging with the community through multiple fora, to make sure that a solution is
APA, Harvard, Vancouver, ISO, and other styles
30

., Priyanka Patil. "CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS." International Journal of Research in Engineering and Technology 03, no. 02 (2014): 308–11. http://dx.doi.org/10.15623/ijret.2014.0302055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

V. Thomas, Manoj, Anand Dhole, and K. Chandrasekaran. "Single Sign-On in Cloud Federation using CloudSim." International Journal of Computer Network and Information Security 7, no. 6 (2015): 50–58. http://dx.doi.org/10.5815/ijcnis.2015.06.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Müller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.

Full text
Abstract:
Extensible Markup Language (XML) is one of the most popular serialization languages. Since many security protocols are built using XML, it also provides cryptographic functionality. A central framework in this area is the Security Assertion Markup Language (SAML). This standard is one of the most widely used options for implementing Single Sign-On (SSO), which allows users to authenticate to different service providers using the credentials from a single identity provider. Like all other security protocols currently in use, the security and privacy of XML-based frameworks such as SAML is threa
APA, Harvard, Vancouver, ISO, and other styles
33

Suriadi, Suriadi, Ernest Foo, and Audun Jøsang. "A user-centric federated single sign-on system." Journal of Network and Computer Applications 32, no. 2 (2009): 388–401. http://dx.doi.org/10.1016/j.jnca.2008.02.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Han, Jinguang, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer, and Nick Wilson. "Anonymous Single Sign-On With Proxy Re-Verification." IEEE Transactions on Information Forensics and Security 15 (2020): 223–36. http://dx.doi.org/10.1109/tifs.2019.2919926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sun, San-Tsai, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. "Investigating Users’ Perspectives of Web Single Sign-On." ACM Transactions on Internet Technology 13, no. 1 (2013): 1–35. http://dx.doi.org/10.1145/2532639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dai, Guiping, and Yong Wang. "A Non-entanglement Quantum Single Sign-On Solution." International Journal of Theoretical Physics 53, no. 4 (2013): 1143–49. http://dx.doi.org/10.1007/s10773-013-1909-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Dai, Guiping, and Yong Wang. "A Non-Entanglement Quantum Single Sign-On Protocol." International Journal of Theoretical Physics 53, no. 8 (2014): 2587–92. http://dx.doi.org/10.1007/s10773-014-2057-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kroschewski, Maximilian, Anja Lehmann, and Cavit Özbay. "OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms." Proceedings on Privacy Enhancing Technologies 2025, no. 2 (2025): 629–49. https://doi.org/10.56553/popets-2025-0080.

Full text
Abstract:
Single Sign-On (SSO) allows users to conveniently authenticate to many Relying Parties (RPs) through a central Identity Provider (IdP). SSO supports unlinkable authentication towards the RPs via pairwise pseudonyms, where the IdP assigns the user an RP-specific pseudonym. This feature has been rolled out prominently within Apple's SSO service. While establishing unlinkable identities provides privacy towards RPs, it actually emphasizes the main privacy problem of SSO: with every authentication request, the IdP learns the RP that the user wants to access. Solutions to overcome this limitation e
APA, Harvard, Vancouver, ISO, and other styles
39

Bazaz, Tayibia, and Aqeel Khalique. "A Review on Single Sign on Enabling Technologies and Protocols." International Journal of Computer Applications 151, no. 11 (2016): 18–25. http://dx.doi.org/10.5120/ijca2016911938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Mecca, Giansalvatore, Michele Santomauro, Donatello Santoro, and Enzo Veltri. "On federated single sign-on in e-government interoperability frameworks." International Journal of Electronic Governance 8, no. 1 (2016): 6. http://dx.doi.org/10.1504/ijeg.2016.076684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ren, Xingtian, Yong Wang, and Guiping Dai. "A Quantum Single Sign-On Protocol Based on GHZ States." International Journal of Theoretical Physics 54, no. 10 (2015): 3733–38. http://dx.doi.org/10.1007/s10773-015-2611-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

S.Kom, M.T.I, Khanna Tiara, Fella Megita Putri, and Heni Triyani. "Optimalisasi Single Sign On Untuk Meningkatkan Sistem Keamanan OJRS+." Technomedia Journal 1, no. 2 (2017): 61–75. http://dx.doi.org/10.33050/tmj.v1i2.50.

Full text
Abstract:
Seiring perkembangan zaman dan juga teknologi yang semakin cepat, Perguruan Tinggi Raharja merupakan kampus yang memanfaatkan jaringan internet sebagai komunikasi antar Dosen dan Mahasiswa untuk kepentingan akademis. Perguruan Tinggi Raharja saat ini sedang berusaha membuat riset dalam membangun pengembangan secara terus menerus. Dalam Perguruan Tinggi Raharja terdapat suatu website yang khusus diperuntukan untuk melakukan batal tambah secara online, website tersebut merupakan OJRS+ (Online Jadwal Rencana Studi Plus). OJRS+ (Online Jadwal Rencana Studi Plus) pada STMIK Raharja sendiri inipun m
APA, Harvard, Vancouver, ISO, and other styles
43

Kakizaki, Yoshio, Kazunari Maeda, and Keiichi Iwamura. "Identifier Migration for Identity Continuance in Single Sign-On." Journal of Information Security 03, no. 04 (2012): 307–13. http://dx.doi.org/10.4236/jis.2012.34037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Pfitzmann, B., and M. Waidner. "Analysis of liberty single-sign-on with enabled clients." IEEE Internet Computing 7, no. 6 (2003): 38–44. http://dx.doi.org/10.1109/mic.2003.1250582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Fan, Li. "Design of A Ticket-Based Single Sign-On Protocol." Procedia Engineering 23 (2011): 537–42. http://dx.doi.org/10.1016/j.proeng.2011.11.2544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lordan, F., J. Jensen, and R. M. Badia. "Towards Mobile Cloud Computing with Single Sign-on Access." Journal of Grid Computing 16, no. 4 (2017): 627–46. http://dx.doi.org/10.1007/s10723-017-9413-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Harding, P., L. Johansson, and N. Klingenstein. "Dynamic Security Assertion Markup Language: Simplifying Single Sign-On." IEEE Security & Privacy Magazine 6, no. 2 (2008): 83–85. http://dx.doi.org/10.1109/msp.2008.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gellert, George A., John F. Crouch, Lynn A. Gibson, George S. Conklin, S. Luke Webster, and John A. Gillean. "Clinical impact and value of workstation single sign-on." International Journal of Medical Informatics 101 (May 2017): 131–36. http://dx.doi.org/10.1016/j.ijmedinf.2017.02.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

., K. karthika. "SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT." International Journal of Research in Engineering and Technology 03, no. 19 (2014): 137–41. http://dx.doi.org/10.15623/ijret.2014.0319026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Xing, Jiqiang Liu, Wei Wang, and Sencun Zhu. "Android single sign-on security: Issues, taxonomy and directions." Future Generation Computer Systems 89 (December 2018): 402–20. http://dx.doi.org/10.1016/j.future.2018.06.049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!