• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2011 Vol.3(4): 571-574 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2011.V3.372

A Generalized Pseudo-SSO Scheme

Sergey Panasenko
Abstract—Single sign-on (SSO) systems allow to solve the following problem: how to store and to use a large amount of authentication information (e. g. username and password pairs) to gain access to different resources. SSO systems can be divided into two main types. One of them is pseudo-SSO systems. Their main feature is that they simply act by the following scheme: first, the pseudo-SSO component authenticates a user once; second, when the user requires any service of the covered system, the pseudo-SSO component uses certain user’s data required to gain access to the desirable service. In this paper we propose a generalized scheme of data interchanging among users and SSO modules with specifics of pseudo-SSO systems. We describe relations between pseudo-SSO component’s datasets required to perform SSO functions. Also we discuss that the single entry point to the secured system (such as a pseudo-SSO component) raises extra security problems.

Index Terms—SSO, pseudo-SSO systems, authentication.

Dr. S. Panasenko, head of software development, ANCUD Ltd., Moscow, Russia (e-mail: serg@panasenko.ru).

[PDF]

Cite: Sergey Panasenko, "A Generalized Pseudo-SSO Scheme," International Journal of Computer Theory and Engineering vol. 3, no. 4, pp. 571-574, 2011.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com