scholarly journals Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login

2020 ◽  
Vol 23 (3) ◽  
pp. 1-37
Author(s):  
Giada Sciarretta ◽  
Roberto Carbone ◽  
Silvio Ranise ◽  
Luca Viganò
Author(s):  
Alessandro Armando ◽  
Roberto Carbone ◽  
Luca Compagna ◽  
Jorge Cuellar ◽  
Llanos Tobarra

2005 ◽  
Vol 14 (05) ◽  
pp. 923-930 ◽  
Author(s):  
DONGXI ZHENG ◽  
SHAOHUA TANG ◽  
SHAOFA LI

Web Services technology is suitable for cross-platform and cross-application integration. To secure systems based on Web Services, a single sign-on protocol for Web Services supporting several login modes are presented. The architecture and the formalized flow of the protocol are described. The protocol is also analyzed and proven using an extended SVO logic.


2020 ◽  
Vol 5 (01) ◽  
pp. 19-33
Author(s):  
A. Taqwa Martadinata ◽  
Firdaus Firdaus

Teknologi Informasi (TI) serta Sistem Informasi (SI) saat ini wajib ada dalam menunjang sebuah organisasi atau perusahaan. Arsitektur yang baik beserta dokumentasinya yang sesuai memungkinkan kemudahan pemeliharaan agar sistem tidak menjadi usang. Dalam  hal  ini  arsitektur  TI didefinisikan  sebagai framework yang  terintegrasi  untuk  mengembangkan  atau memelihara  TI  yang  ada  dan  memperoleh  TI  yang  baru  untuk  mencapai  tujuan strategis organisasi. The Open Group Architectural Framework (TOGAF): Kuat pada Aspek Arsitektur Bisnis dan Arsitektur Teknis. Pada penelitian ini menggunakan TOGAF ADM mulai dari fase pendahuluan, kebutuhan manajemen, visi arsitektur, bisnis arsitektur, arsitektur system informasi, arsitektur teknologi,serta solusi dan peluang. Menetapkan 3 prinsip pengembangan arsitektur informasi teknologi adaptif pada Universitas Bina Insan. Pengembangan aplikasi berbasis single sign on (sso) untuk intergrasi antar system. Merupakan sebuah hasil dari penelitian ini yang dapat menghasilkan sebuah rancangan infrastruktur teknologi informasi yang berifat adaftip dengan konsep yang di adopsi berupa teknologi virtualisasi server, serta pemanfaatan proses bisnis mampu berjalan efisien, efektif serta sesuai yang diinginkan manajemen.


Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


Author(s):  
Steve Ferrier ◽  
Kevin D. Martin ◽  
Donald Schulte

Abstract Application of a formal Failure Analysis metaprocess to a stubborn yield loss problem provided a framework that ultimately facilitated a solution. Absence of results from conventional failure analysis techniques such as PEM (Photon Emission Microscopy) and liquid crystal microthermography frustrated early attempts to analyze this low-level supply leakage failure mode. Subsequently, a reorganized analysis team attacked the problem using a specific toplevel metaprocess.(1,a) Using the metaprocess, analysts generated a specific unique step-by-step analysis process in real time. Along the way, this approach encouraged the creative identification of secondary failure effects that provided repeated breakthroughs in the analysis flow. Analysis proceeded steadily toward the failure cause in spite of its character as a three-way interaction among factors in the IC design, mask generation, and wafer manufacturing processes. The metaprocess also provided the formal structure that, at the conclusion of the analysis, permitted a one-sheet summary of the failure's cause-effect relationships and the analysis flow leading to discovery of the anomaly. As with every application of this metaprocess, the resulting analysis flow simply represented an effective version of good failure analysis. The formal and flexible codification of the analysis decision-making process, however, provided several specific benefits, not least of which was the ability to proceed with high confidence that the problem could and would be solved. This paper describes the application of the metaprocess, and also the key measurements and causeeffect relationships in the analysis.


Sign in / Sign up

Export Citation Format

Share Document