Browse > Article

Single Sign-On for Distributed Computing Environment  

정연식 (성공회대학교 컴퓨터정보공학부)
김인겸 (성결대학교 정보통신공학부)
Abstract
In this paper, a single sign-on system has been designed and implemented. The purpose of the proposed system is that a user logs in once using a single password and gets authenticated access to all the servers that he is authorized to use without sending any passwords over the network. The proposed system involves the use of digital signature and cryptographic authentication protocols. For its implementation, a public-key infrastructure is also designed and implemented. To view the behavior of the proposed system, message sequence charts and state transition diagrams have been
Keywords
인증;전자서명;공개키 기반구조;통합 인증 시스템;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Tervo, 'Single sign on solutions in a mixed computing environment,' in Proceedings of Helsinki University of Technology, Seminar on Network Security: Authorization and Access Control in Open Network Environment, Chap. 7, 1998
2 B. C. Neuman and T. Ts'o, 'Kerberos: an authentication service for computer networks,' IEEE Communications Magazine, vol. 32, no. 9, pp. 33 38, Sep., 1994   DOI   ScienceOn
3 E. Rudolph, P. Graubmann, and J. Grabowski, 'Tutorial on message sequence charts,' Computer Networks and ISDN Systems, vol. 28, no. 12, pp. 16291641, Dec. 1996   DOI   ScienceOn
4 W. Yeong, T. A. Howes, and S. Kille, Lightweight Directory Access Protocol, RFC 1777, Mar. 1995
5 OpenLDAP, http://www.openldap.org.
6 RSA Laboratories, PKCS #1: RSA Cryptography Standard, RSA Laboratories, Sept. 1998, Version 2.0
7 RSA Laboratories, PKCS #5: Password-Based Cryptography Standard, RSA Laboratories, Mar. 1999, Version 2.0
8 RSA Laboratories, PKCS #7: Cryptographic Message Syntax Standard, RSA Laboratories, Nov. 1993, Version 1.5
9 RSA Laboratories, PKCS #8: Private-Key Information Syntax Standard, RSA Laboratories, Nov. 1993, Version 1.2
10 RSA Laboratories, PKCS #10: Certification Request Syntax Standard, RSA Laboratories, May 2000, Version 1.7
11 Netscape Communications Corporation, Single Sign-On Deployment Guide: Security, Netscape Communications Corporation, 1997
12 S. Chokhani, 'Toward a national public key infrastructure,' IEEE Communications Magazine, vol. 32, no. 9, pp. 70 74, Sep. 1994   DOI   ScienceOn
13 J. Hursti, 'Single sign-on,' in Proceedings of Helsinki University of Technology, Seminar on Network Security: Security of Corporate Net works, Chap. 2, 1997
14 R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signature and public key cryptosystems,' Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978   DOI   ScienceOn
15 D. Hogrefe, 'Validation of SDL systems,' Computer Networks and ISDN Systems, vol. 28, no. 12, pp. 1659-1667, Dec. 1996   DOI   ScienceOn
16 H. P. Konigs, 'Cryptographic identification methods for smart cards in the process of standardization,' IEEE Communications Magazine, vol. 29, no. 6, pp. 42 48, Jun. 1991   DOI   ScienceOn
17 L. Huovinen, 'Modern encryption methods in user authentication,' in Proceedings of Helsinki Uni versity of Technology, Seminar on Network Security: Security of Corporate Networks, Chap. 4, 1997