References
- I. M. Khalil, A. Khreishah, and M. Azeem, "Cloud Computing Security: A Survey," Computers, vol.3, no.1, pp.1-35, 2014. https://doi.org/10.3390/computers3010001
- OneLogin. OneLogin 2014 State of SaaS Identity Management [Internet]. Available: https://resources.onelogin.com/WP-OneLogin-2014-SaaS-Identity-Management.pdf?path=wp-content/images/OneLogin_2014_SaaS_Identity_Management.pdf.
- S. Droz, C. Hassenstein, G. Heim, T. Meier, D. Monnard, and H. C. Tschudin, "Concept for an Electronic Academic Community in Switzerland and the creation of a Common Authentication and Authorization Infrastructure (AAI) for the Swiss Higher Education System," Inter-University Working Group, Oct., 2001.
- Metadata Explorer Tool [Internet]. Available: https://met.refeds.org/.
- eduGAIN [Internet]. Available: https://www.edugain.org/.
- Korean Access Federation [Internet]. Available: https://www.kafe.or.kr/.
- A. Costa, M. Pietro, B. Marilena, B. Ugo, K. Mel, P. Costantino, R. Simone, S. Eva, and V. Fabio, "An Innovative Science Gateway for the Cherenkov Telescope Array," Journal of Grid Computing, vol.13, no.4, pp.547-559, 2015. https://doi.org/10.1007/s10723-015-9330-2
- M. Linden, M. Prochazka, I. Lappalainen, D. Ducik, P. Vyskocil, M. Kuba, S. Silen, P. Belmann, A. Sczrba, S. Newhouse, L. Matyska, and T. Nyronen, "Common ELIXIR Service for Researcher Authentication and Authorisation," F1000Research 7, pp.1-15. Aug., 2018. https://doi.org/10.12688/f1000research.13428.1
- H. Short, A. Manzi, V. D. Notaris, O. Keeble, A. Kiryanov, H. Mikkonen, P. Tedesco, and R. Wartel, "x509-free Access to WLCG Resources," Journal of Physics: Conference Series, vol.898, no.8, pp.1-7, Oct., 2017.
- M. Brinn, "GENI Architecture Foundation," The GENI Book, Springer, Cham, p.101-116, 2016.
- Shibboleth Consortium [Internet]. Available: https://shibboleth.net/.
- simpleSAMLphp, [Internet]. Available: https://www.simplesamlphp.org/.
- K. Kim and K. Lee, "Visualization of Geo-spatial Data and Public Data Using Mobile Operating Environment in the eGovernment Standard Framework," Journal of Korea Spatial Information Society, vol.23, no.1, pp.9-17, Feb., 2015.
- J. Park, Ranked 1st in the WAS Market in 2017, Electronic Times Internet [Internet]. Available: https://news.v.daum.net/v/20180802140303883.
- C. Linhart, A. Klein, R. Heled, and S. Orrin, HTTP REQUEST SMUGGLING. (2005) [Internet]. Available: http://www.cgisecurity.com/lib/HTTP-Request-Smuggling.pdf.
- Shibboleth Wiki [Internet]. Available: https://wiki.shibboleth.net/confluence/display/SP3/ReleaseNotes.
- OneLogin's SAML Java Toolkit [Internet]. Available: https://github.com/onelogin/java-saml.
- Danish Agency for Digitisation, "OIOSAML Web SSO Profile 3.0 'Release Candidate'," 2019.
- Spring Security SAML Extension [Internet]. Available: https://docs.spring.io/autorepo/docs/spring-security-saml/1.0.x-SNAPSHOT/reference/htmlsingle/.
- Ministry of the Interior and Safety, "Technical Specification of SSO Authentication Gateway," June 2018.
- SAML Entity Category [Internet]. Available: https://refeds.org/specifications.
- PyFF - A SAML Metadata Appliance [Internet]. Available: http://pyff.io/.
- C. Lorentzen, M. Fiedler, H. Johnson, J. Shaikh, and J. Ivar, "On User Perception of Web Login - a Study on QoE in the Context of Security," in Proceedings of the Australasian Telecommunication Networks and Applications Conference, Auckland, New Zealand, pp.84-89, 2010.
- J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, and M. Jensen, "On Breaking SAML: Be Whoever You Want to Be," in Proceedings of the 21st USENIX Security Symposium, Bellevue, USA, Aug., 2012.
- N. Engelbertz, N. Erinola, D. Herring, J. Somorovsky, V. Mladenov, and J. Schwenk, "Security Analysis of eIDAS - The Cross-Country Authentication Scheme in Europe," in Proceedings of the 12th USENIX Workshop on Offensive Technologies, Baltimore, USA, 2018.
- M. Christian, M. Vladislav, G. Tim, and J. Schwenk, "Automatic Recognition, Processing and Attacking of Single Sign-on Protocols with BURP Suite," Open Identity Summit, 2015.
- H. Phong, How to use Brup Suite to Verify SAML Signature Wrapping Attack [Internet]. Available: https://blog.ritvn.com/testing/2018/02/16/burp-suite-saml-signature-wrapping-attack.html.