Littérature scientifique sur le sujet « Central authentication service »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Central authentication service ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Central authentication service"
Li, Wei, Yuan Bo Zhu et Ming Zou. « Applied Research of Single Sign on Technology in Cloud Services ». Applied Mechanics and Materials 602-605 (août 2014) : 3552–55. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3552.
Texte intégralOrbán, Anna, et Annamária Beláz. « eIdentification - Renewable regulated electronic administration services ». Central and Eastern European eDem and eGov Days 325 (14 février 2018) : 463–76. http://dx.doi.org/10.24989/ocg.v325.38.
Texte intégralNiewolski, Wojciech, Tomasz W. Nowak, Mariusz Sepczuk et Zbigniew Kotulski. « Token-Based Authentication Framework for 5G MEC Mobile Networks ». Electronics 10, no 14 (18 juillet 2021) : 1724. http://dx.doi.org/10.3390/electronics10141724.
Texte intégralKIM, YOUNG-GAB, CHANG-JOO MOON, DONGWON JEONG et DOO-KWON BAIK. « FORMAL VERIFICATION OF BUNDLE AUTHENTICATION MECHANISM IN OSGi SERVICE PLATFORM : BAN LOGIC ». International Journal of Software Engineering and Knowledge Engineering 16, no 02 (avril 2006) : 153–73. http://dx.doi.org/10.1142/s0218194006002793.
Texte intégralBrandão, Luís T. A. N., Nicolas Christin et George Danezis. « Toward Mending Two Nation-Scale Brokered Identification Systems ». Proceedings on Privacy Enhancing Technologies 2015, no 2 (1 juin 2015) : 135–55. http://dx.doi.org/10.1515/popets-2015-0022.
Texte intégralKim, MyeongHyun, KiSung Park, SungJin Yu, JoonYoung Lee, YoungHo Park, Sang-Woo Lee et BoHeung Chung. « A Secure Charging System for Electric Vehicles Based on Blockchain ». Sensors 19, no 13 (9 juillet 2019) : 3028. http://dx.doi.org/10.3390/s19133028.
Texte intégralMishra*, Arjit, Surendra Gupta et Swarnim Soni. « Designing Information System for Private Network using RBAC, FGAC and Micro service Architecture ». International Journal of Engineering and Advanced Technology 10, no 4 (30 avril 2021) : 195–200. http://dx.doi.org/10.35940/ijeat.d2474.0410421.
Texte intégralWeitzel, Derek, Brian Bockelman, Jim Basney, Todd Tannenbaum, Zach Miller et Jeff Gaynor. « Capability-Based Authorization for HEP ». EPJ Web of Conferences 214 (2019) : 04014. http://dx.doi.org/10.1051/epjconf/201921404014.
Texte intégralUdayana, I. Putu Agus Eka Darma. « Integrasi Sistem Single Sign On Pada Sistem Informasi Akademik, Web Information System Dan Learning Management System Berbasis Central Authentication Service ». Jurnal RESISTOR (Rekayasa Sistem Komputer) 1, no 1 (21 avril 2018) : 48–54. http://dx.doi.org/10.31598/jurnalresistor.v1i1.265.
Texte intégralZeng, Lijun, Xiaoxia Yao, Juanjuan Liu et Qiang Zhu. « Construction of a one-stop document supply service platform ». Interlending & ; Document Supply 42, no 2/3 (12 août 2014) : 120–24. http://dx.doi.org/10.1108/ilds-01-2014-0013.
Texte intégralThèses sur le sujet "Central authentication service"
Holm, Kristian, et Morgan Hallgren. « Hur hanterar institutioner en miljö med blandade Operativsystem ? » Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5169.
Texte intégralKovářík, Jiří. « Implementace autentizace Cosign v PHP ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235873.
Texte intégral内藤, 久資, et Hisashi NAITO. « Web Application のための Single Sign On と Authorization 環境 : Central Authentication and Authorization Service ». 2006. http://hdl.handle.net/2237/9604.
Texte intégralEstanqueiro, FranciscoWallenstein Teixeira. « SINGLE SIGN-ON NA FCUL ». Master's thesis, 2010. http://hdl.handle.net/10451/15274.
Texte intégralEstanqueiro, Francisco Wallenstein Teixeira. « Single sign-on na FCUL ». Master's thesis, 2010. http://hdl.handle.net/10451/8729.
Texte intégralEste projecto insere-se no âmbito da cadeira de Projecto em Engenharia Informática (PEI) do Mestrado de Engenharia Informática da Faculdade de Ciências da Universidade de Lisboa (FCUL). Este trabalho teve como principal objectivo a criação de um sistema de Single Sign-On (SSO) para as aplicações web disponibilizadas pelo Centro de Informática (CI) da FCUL. Single Sign-On (SSO) é um processo de autenticação em sessão, que permite a um utilizador introduzir as suas credenciais de acesso apenas uma vez para aceder a múltiplas aplicações protegidas. O processo autentica o utilizador para todas as aplicações a que este tem direito de acesso e elimina a necessidade de se autenticar novamente ao mudar de aplicação durante a sessão. Deste modo, toda a autenticação passará a ser feita de um modo centralizado, ficando o serviço de SSO com a responsabilidade de fornecer informação confiável de identidade dos utilizadores às aplicações. De forma a atingir os objectivos propostos, foi necessário estudar com detalhe o estado da arte, assim como as possíveis soluções para a implementação de um sistema deste género, tendo já em conta os requisitos das aplicações web na FCUL. Esta análise levou à escolha do software Central Authentication Service (CAS) que, após os devidos testes, entrou em produção no CI, tendo mais de mil acessos diários por funcionários e alunos da FCUL. Adicionalmente, foi criado um novo modo de introdução¸ de credenciais através do Cartão de Cidadão Português, um sistema de autenticação para serviços federados e uma aplicação web para uma gestão eficaz de todo o sistema de SSO.
This document describes in detail the project set up for the module of Computer Engineering Project (PEI) integrating the postgraduate programme for Master of Computer Engineering in the Faculty of Science of the Lisbon University (FCUL). This project was primarily aimed at the analysis and development of a Single Sign-On (SSO) system for web applications made available by the IT Centre (CI) at FCUL. Single Sign-On (SSO) is a session authentication process, which allows a user to enter their credentials only once to access multiple protected applications. The process authenticates the user for all applications which he’s entitled to access to, eliminating the need to authenticate again when changing applications during the same session. With an SSO solution, all authentication is done in a centralized manner, thus making it the responsibility of the SSO system to provide reliable information about the user’s identity to the web applications. In order to achieve these objectives, it was necessary to examine in detail the state of the art and study the potential solutions to implementing this kind of service. After detailed analysis, Central Authentication Service (CAS) was selected as the SSO system. Following an appropriate testing stage, the CAS was effectively made available at FCUL campus, counting over a thousand daily logins among FCUL staff and students. To expand the SSO system it was also created an alternative way to authenticate users using the Portuguese Citizen Card, a federated authentication system and a web application to manage the entire system.
Chiu, Yen-Hsun, et 邱彥勳. « Using Central Authentication and Authorization Mechanism for Web Services Management ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/67240042669101804771.
Texte intégral中原大學
資訊管理研究所
98
Currently, distribution Service-Oriented Architecture (SOA) maintain authorization policy by service provider-self, and assign appropriate role to service requester for ensure service access control policy, but, using Web Services concept in formal business transaction, difference authentication mechanism and authorization policy maybe to cause (1) service integrate issue and (2) requester role inconsistent issue in formal business process, for improve these questions, in our research will provide (1) central authentication integrate concept to transfer identity authentication to reduce service composed time consuming and (2) using central authorization policy and authorization service to ensure in service access control process to help our system could keep the requester’s role, this research except develop central authentication and authorization policy and build a e-Tendering system situation to explain service integrate process, improve distribution Service-Oriented Architecture (SOA) append difference authentication and authorization policy bring about service management issue, after we will highlight using distribution Service-Oriented Architecture (SOA) and additional central management concept, increase business entity pleasure for using web services to develop core information system.
Chapitres de livres sur le sujet "Central authentication service"
Mahrt, Christian, et Andreas Speck. « Simple Anti-fraud Document Authentication Concept for Public Services ». Dans Human Centred Intelligent Systems, 13–25. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3264-8_2.
Texte intégralAndriamilanto, Nampoina, Tristan Allard et Gaëtan Le Guelvouit. « “Guess Who?” Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication ». Dans Innovative Mobile and Internet Services in Ubiquitous Computing, 161–72. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50399-4_16.
Texte intégralGupta, Sachin Kumar, Aabid Rashid Wani, Santosh Kumar, Ashutosh Srivastava et Diwankshi Sharma. « Wireless Mesh Network Security, Architecture, and Protocols ». Dans Security and Privacy Issues in Sensor Networks and IoT, 1–27. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch001.
Texte intégralMussabbir, Qazi Bouland, et Thomas Owens. « IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA ». Dans IT Policy and Ethics, 539–61. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2919-6.ch025.
Texte intégralMussabbir, Qazi Bouland, et Thomas Owens. « IEEE802.21 Assisted Fast Re-Authentication Scheme over GSABA ». Dans Situational Awareness in Computer Network Defense, 221–43. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0104-8.ch013.
Texte intégralZhu, Feng, et Wei Zhu. « Secure and Private Service Discovery in Pervasive Computing Environments ». Dans Security and Privacy Assurance in Advancing Technologies, 295–309. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-200-0.ch018.
Texte intégralZhu, Feng, et Wei Zhu. « Secure and Private Service Discovery in Pervasive Computing Environments ». Dans Applied Cryptography for Cyber Security and Defense, 229–43. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch010.
Texte intégralAdamson, Greg. « Portals and the Challenge of Simplifying Internet Business Use ». Dans Electronic Services, 1802–15. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-967-5.ch110.
Texte intégralSamin, Nadav. « Marriage and Lineal Authentication ». Dans Of Sand or Soil. Princeton University Press, 2015. http://dx.doi.org/10.23943/princeton/9780691164441.003.0005.
Texte intégralKaushik, Shweta, et Charu Gandhi. « Ensure Hierarchal Identity Based Data Security in Cloud Environment ». Dans Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government, 368–84. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5351-0.ch022.
Texte intégralActes de conférences sur le sujet "Central authentication service"
Naito, Hisashi, Shoji Kajita, Yasushi Hirano et Kenji Mase. « Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service ». Dans 2007 International Symposium on Applications and the Internet Workshops. IEEE, 2007. http://dx.doi.org/10.1109/saint-w.2007.80.
Texte intégralAziminejad, Arash, et Mustafa Seckin. « Secure Communication-Based Train Control : Performance Evaluation of a Design Framework ». Dans 2014 Joint Rail Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/jrc2014-3816.
Texte intégralAad, Imad, Torsten Braun et Dima Mansour. « Authentication and Trust in Service-Centric Networking ». Dans 2016 IEEE 41st Conference on Local Computer Networks (LCN). IEEE, 2016. http://dx.doi.org/10.1109/lcn.2016.93.
Texte intégralMoon, Jong Sik, Sun Ho Lee, Im-Yeong Lee et Sang-Gu Byeon. « Authentication Protocol Using Authorization Ticket in Mobile Network Service Environment ». Dans 2010 3rd International Conference on Human-Centric Computing (HumanCom). IEEE, 2010. http://dx.doi.org/10.1109/humancom.2010.5563339.
Texte intégralBeltran, Marta, Miguel Calvo et Sergio Gonzalez. « Federated system-to-service authentication and authorization combining PUFs and tokens ». Dans 2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC). IEEE, 2017. http://dx.doi.org/10.1109/recosoc.2017.8016157.
Texte intégralSennyey, Pongrácz, et Károly Kokas. « Digitális ökoszisztéma a könyvtár katalógusból ? Egy texas-i könyvtári kísérlet és tanulságai ». Dans Networkshop. HUNGARNET Egyesület, 2020. http://dx.doi.org/10.31915/nws.2020.2.
Texte intégral