Skip to main content
Top

2011 | OriginalPaper | Chapter

Single Sign-On in Cloud Computing Scenarios: A Research Proposal

Authors : S. Za, E. D’Atri, A. Resca

Published in: Information Technology and Innovation Trends in Organizations

Publisher: Physica-Verlag HD

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing and Software as a Service infrastructure are becoming important factors in E-commerce and E-business processes. Users may access simultaneously to different E-services supplied by several providers. An efficient approach to authenticate and authorize users is needed to avoid problems about trust and redundancy of procedure. In this paper we will focus on main approaches in managing Authentication and Authorization Infrastructures (AAI): i.e. federated and centralized and cloud based. Then we will discuss about related some critical issues in Cloud computing and SaaS contexts and will highlight the possible future researches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ambrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28 Ambrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I. Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28
2.
go back to reference Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I. (2009).Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25(6), Elsevier. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I. (2009).Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25(6), Elsevier.
3.
go back to reference Geer, D. (1998). Risk management is where the money is. Forum on Risks to the Public in Computers and Related Systems, ACM Committee on Computers and Public Policy 20(6) Geer, D. (1998). Risk management is where the money is. Forum on Risks to the Public in Computers and Related Systems, ACM Committee on Computers and Public Policy 20(6)
4.
go back to reference Olden M., Za S., (2010). Biometric authentication and authorization infrastructures in trusted intra-organizational relationships. In Management of the Interconnected World, D'Atri et al. Eds., ISBN: 978-3-7908-2403-2, Springer. Olden M., Za S., (2010). Biometric authentication and authorization infrastructures in trusted intra-organizational relationships. In Management of the Interconnected World, D'Atri et al. Eds., ISBN: 978-3-7908-2403-2, Springer.
5.
go back to reference Lopez J., Oppliger R., Pernul G. (2004). Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7), 578–590.CrossRef Lopez J., Oppliger R., Pernul G. (2004). Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security 23(7), 578–590.CrossRef
6.
go back to reference Rosenblatt B., Trippe B. and Mooney., S. (2001). Digital Rights Management: Business and Technology. Hungry Minds/John Wiley and Sons, New York. Rosenblatt B., Trippe B. and Mooney., S. (2001). Digital Rights Management: Business and Technology. Hungry Minds/John Wiley and Sons, New York.
7.
go back to reference Kohl J. And Neuman C. (1993), The Kerberos Network Authentication Service (V5), RFC-1510, DDN Network Information Center, 10 September 1993. Kohl J. And Neuman C. (1993), The Kerberos Network Authentication Service (V5), RFC-1510, DDN Network Information Center, 10 September 1993.
8.
go back to reference Ford W. And Baum M. (1998). Secure Electronic Commerce, Prentice Hall Ford W. And Baum M. (1998). Secure Electronic Commerce, Prentice Hall
9.
go back to reference Schläger, C.; Sojer, M.; Muschall, B.; Pernul, G. (2006): Attribute-Based Authentication and Au-thorisation Infrastructures for E-Commerce Providers, pp132-141 Springer-Verlag. Schläger, C.; Sojer, M.; Muschall, B.; Pernul, G. (2006): Attribute-Based Authentication and Au-thorisation Infrastructures for E-Commerce Providers, pp132-141 Springer-Verlag.
10.
go back to reference Lewis, K.D. and Lewis, J.E. (2009). Web Single Sign-On Authentication using SAML. International Journal of Computer Science Issues, IJCSI 2, 41–48 Lewis, K.D. and Lewis, J.E. (2009). Web Single Sign-On Authentication using SAML. International Journal of Computer Science Issues, IJCSI 2, 41–48
11.
go back to reference Cser, A. and Penn, J. (2008). Identity Management Market Forecast: 2007 To 2014. Forrester. Cser, A. and Penn, J. (2008). Identity Management Market Forecast: 2007 To 2014. Forrester.
Metadata
Title
Single Sign-On in Cloud Computing Scenarios: A Research Proposal
Authors
S. Za
E. D’Atri
A. Resca
Copyright Year
2011
Publisher
Physica-Verlag HD
DOI
https://doi.org/10.1007/978-3-7908-2632-6_6

Premium Partner