Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme Based on RP Anonymization
AbstractOpenID Connect (OIDC) is one of the most widely used single sign-on (SSO) protocols today. However, like all other popular SSO protocols, it does not take user privacy into account, which means that Identity Providers (IdPs) and colluding Relying ...
- research-articleDecember 2023
SSOLogin: A framework for automated web privacy measurement with SSO logins
AINTEC '23: Proceedings of the 18th Asian Internet Engineering ConferencePages 69–77https://doi.org/10.1145/3630590.3630599Single Sign-On (SSO) enables users to access multiple websites and applications using a single set of login credentials. Undoubtedly, SSO makes it easy for users to log in to multiple websites without remembering credentials. However, it is also ...
- ArticleDecember 2023
Blockchain-Enhanced IoHT: A Patient-Centric Internet of Healthcare Things Platform with Smart Contract-Driven Data Management
- N. H. Bang,
- T. D. Khoa,
- M. N. Triet,
- V. H. Khanh,
- H. G. Khiem,
- Q. T. Bao,
- N. T. Phuc,
- M. D. Hieu,
- V. C. P. Loc,
- T. L. Quy,
- N. T. Anh,
- Q. N. Hien,
- L. K. Bang,
- D. P. N. Trong,
- N. T. K. Ngan,
- H. Son,
- H. H. Luong
Advances in Mobile Computing and Multimedia IntelligencePages 50–56https://doi.org/10.1007/978-3-031-48348-6_4AbstractThe Internet of Things (IoT) has seen rapid adoption across various sectors, with healthcare being one of the most significant. The IoHT-MBA platform, an Internet of Healthcare Things (IoHT) system based on microservice and brokerless architecture,...
- research-articleFebruary 2024
Uncovering the effects of unified user profiles in local institutions and organizations
- Eric B Blancaflor,
- Vladimir D. Beduya,
- Thea Suzanne M. Cunanan,
- Treasure V. Frias,
- Francesca Jacinthe C. Navarro
CIIS '23: Proceedings of the 2023 6th International Conference on Computational Intelligence and Intelligent SystemsPages 154–159https://doi.org/10.1145/3638209.3638232The unified user profiles (UUPs) include the creation of a single account to keep all data about a user across numerous platforms or websites. This data may contain sensitive information such as private details, preferences, and authentication ...
- ArticleSeptember 2023
SPaMeR: Securing Patient Medical Records in the Cloud - A Microservice and Brokerless Architecture Approach
- T. B. Nam,
- H. G. Khiem,
- M. N. Triet,
- K. V. Hong,
- T. D. Khoa,
- Q. T. Bao,
- N. T. Phuc,
- M. D. Hieu,
- V. C. P. Loc,
- T. L. Quy,
- N. T. Anh,
- Q. N. Hien,
- L. K. Bang,
- D. P. N. Trong,
- N. T. K. Ngan,
- H. Son,
- H. H. Luong
AbstractThe expansion of Internet of Things (IoT) technologies has revolutionized various sectors, one of the most critical being healthcare. The effective management of Patient Medical Records (PMRs) is an area where IoT plays a significant role, and its ...
-
- research-articleApril 2022
The Design and Implementation of A E-Commerce Platform Based on SpringCloud
ICITEE '21: Proceedings of the 4th International Conference on Information Technologies and Electrical EngineeringArticle No.: 57, Pages 1–6https://doi.org/10.1145/3513142.3513201With the continuous development of cloud computing and network technology. Online shopping on websites has become an important way to sell goods. With the increase of consumer groups, the single architecture of e-commerce platform has been difficult to ...
- ArticleSeptember 2021
Toward a Unique IoT Network via Single Sign-On Protocol and Message Queue
- Tran Thanh Lam Nguyen,
- The Anh Nguyen,
- Hong Khanh Vo,
- Hoang Huong Luong,
- Huynh Tuan Khoi Nguyen,
- Anh Tuan Dao,
- Xuan Son Ha
Computer Information Systems and Industrial ManagementPages 270–284https://doi.org/10.1007/978-3-030-84340-3_22AbstractInternet of Things (IoT), currently, is one of the most rapidly developing technology trends. However, at present, users, devices, and applications using IoT services mainly connect to IoT service providers in a client-server model. Each IoT ...
- research-articleJune 2021
An Investigation of Identity-Account Inconsistency in Single Sign-On
Single Sign-On (SSO) has been widely adopted for online authentication due to its favorable usability and security. However, it also introduces a single point of failure since all service providers fully trust the identity of a user created by the SSO ...
- research-articleMay 2020
Web OAuth-based SSO Systems Security
NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & SecurityArticle No.: 69, Pages 1–7https://doi.org/10.1145/3386723.3387888In the present digital world, users have to access multiple applications for carrying out their day-to-day business activities. As the amount of apps increase, the number of credentials (e.g. username/password) for each user increases and thereby the ...
- articleJanuary 2018
Trust Evaluation Strategy for Single Sign-on Solution in Cloud
International Journal of Digital Crime and Forensics (IJDCF), Volume 10, Issue 1Pages 1–11https://doi.org/10.4018/IJDCF.2018010101In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust ...
- ArticleJuly 2016
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution
ICETE 2016: Proceedings of the 13th International Joint Conference on e-Business and TelecommunicationsPages 147–158https://doi.org/10.5220/0005969001470158While there exist many secure authentication and authorization solutions for web applications, their adaptation in the mobile context is a new and open challenge. In this paper, we argue that the lack of a proper reference model for Single Sign-On (SSO) ...
- articleJuly 2016
LiftingDoneRight: A Privacy-Aware Human Motion Tracking System for Healthcare Professionals
- Wenbing Zhao,
- Roanna Lun,
- Connor Gordon,
- Abou-Bakar M. Fofana,
- Deborah D Espy,
- Ann Reinthal,
- Beth Ekelman,
- Glenn D Goodman,
- Joan E Niederriter,
- Chaomin Luo,
- Xiong Luo
This article describes the design and implementation of LiftingDoneRight, a novel system for healthcare professionals to enhance their compliance with best practices and regulations regarding proper body mechanics for lifting and pulling activities. The ...
- articleJuly 2016
LiftingDoneRight: A Privacy-Aware Human Motion Tracking System for Healthcare Professionals
- Wenbing Zhao,
- Roanna Lun,
- Connor Gordon,
- Abou-Bakar M. Fofana,
- Deborah D Espy,
- Ann Reinthal,
- Beth Ekelman,
- Glenn D Goodman,
- Joan E Niederriter,
- Chaomin Luo,
- Xiong Luo
This article describes the design and implementation of LiftingDoneRight, a novel system for healthcare professionals to enhance their compliance with best practices and regulations regarding proper body mechanics for lifting and pulling activities. The ...
- articleJuly 2016
LiftingDoneRight: A Privacy-Aware Human Motion Tracking System for Healthcare Professionals
- Wenbing Zhao,
- Roanna Lun,
- Connor Gordon,
- Abou-Bakar M. Fofana,
- Deborah D Espy,
- Ann Reinthal,
- Beth Ekelman,
- Glenn D Goodman,
- Joan E Niederriter,
- Chaomin Luo,
- Xiong Luo
This article describes the design and implementation of LiftingDoneRight, a novel system for healthcare professionals to enhance their compliance with best practices and regulations regarding proper body mechanics for lifting and pulling activities. The ...
- research-articleAugust 2015
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services
WCI '15: Proceedings of the Third International Symposium on Women in Computing and InformaticsPages 502–509https://doi.org/10.1145/2791405.2791487The emerging Cloud computing technology, offering computing resources as a service is gaining increasing attention of both the public and private sector. For the whole hearted adoption of Cloud, the service providers need to ensure that only valid users ...
- ArticleAugust 2014
NFC Based Mobile Single Sign-On Solution as a Chrome Extension
ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 4Pages 337–343https://doi.org/10.5220/0005056703370343We describe the design and implementation of Single Sign-On authentication solution that uses a Near Field Communication enabled mobile phone. Such a solution relieves the users from remembering multiple username and passwords when authenticating ...
- articleMarch 2014
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces (CSAI), Volume 36, Issue 3Pages 438–453https://doi.org/10.1016/j.csi.2013.08.018OpenID is an open standard providing a decentralized authentication mechanism to end users. It is based on a unique URL (Uniform Resource Locator) or XRI (Extensible Resource Identifier) as identifier of the user. This fact of using a single identifier ...
- ArticleSeptember 2013
Anonymous Single Sign-On Schemes Transformed from Group Signatures
INCOS '13: Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative SystemsPages 560–567https://doi.org/10.1109/INCoS.2013.104Single Sign-on (SSO) allows a user to obtain a single credential from a Trusted Third Party (TTP) once and then authenticates himself/herself to different service providers by using the same credential. Though different SSO schemes have been obtained ...
- ArticleSeptember 2013
Federated Identity Access Broker Pattern for Cloud Computing
NBIS '13: Proceedings of the 2013 16th International Conference on Network-Based Information SystemsPages 134–140https://doi.org/10.1109/NBiS.2013.23With the adoption of cloud computing, a multitude of front-end mobile devices are emerging that require access to services in the cloud. Applications in the cloud are now commonly deployed as software as a service (SaaS). However, with the introduction ...
- articleMarch 2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations
- Alessandro Armando,
- Roberto Carbone,
- Luca Compagna,
- Jorge Cuéllar,
- Giancarlo Pellegrino,
- Alessandro Sorniotti
Browser-based Single Sign-On (SSO) protocols relieve the user from the burden of dealing with multiple credentials thereby improving the user experience and the security. In this paper we show that extreme care is required for specifying and ...