Cross-domain single sign-on authentication of information security in network environment

Author(s):  
A jun Cui ◽  
Wei Wang ◽  
Hua feng Zhang ◽  
Yan hong Ma ◽  
Chen Li ◽  
...  
Author(s):  
Hua feng Zhang ◽  
Chen Li ◽  
Yan hong Ma ◽  
Wei Wang ◽  
A jun Cui ◽  
...  

2013 ◽  
Vol 32 (6) ◽  
pp. 1766-1768
Author(s):  
Guo-wei WANG ◽  
Man-jun XUE
Keyword(s):  

2016 ◽  
Vol 7 (1) ◽  
pp. 26-42 ◽  
Author(s):  
Avinash Ramtohul ◽  
K.M.S. Soyjaudah

Purpose – Highly sensitive information pertaining to citizens and government transactions is processed in an electronic format, making information security a critical part of e-Government applications and architectures. Information security measures should ideally span from authentication to authorisation and from logical/physical access control to auditing of electronic transactions and log books. The lack of such measures compromises confidentiality, integrity and availability of information. Today, most e-Government projects in developing countries in Southern Africa Developing Community (SADC) face challenges in two main areas, namely, information security and application software integration. This paper aims to discuss and analyse the information security requirements for e-Government projects and proposes an information security governance model for service-based architectures (SBAs). Design/methodology/approach – The current state of information security in emerging economies in SADC countries was researched. The main problems identified were the lack of software integration and information security governance, policy and administration. The design consists of three basic layers: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures, implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study. Findings – The main problems identified were the lack of software integration and information security governance, policy and administration. These challenges are causing e-government projects to stagnate. Practical implications – The proposed approach for implementing information security in e-Government systems will ensure a holistic approach to ensuring confidentiality, integrity and non-repudiation, allowing e-Government maturity to progress from “interaction” to “online transaction” stage in emerging economies. Originality/value – Research has not focused on developing a solution for emerging economies which are facing difficulties in integration software applications to deploy end-to-end e-services and to produce an underlying identity management architecture and information security governance to secure the e-services developed and deployed using an SBA. The work produced in this paper is specific to SBAs in e-government environments where legacy systems already exist. The work includes: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study.


2015 ◽  
Vol 713-715 ◽  
pp. 2147-2151
Author(s):  
Ling Yu Chen ◽  
Guo Min Song

Geographic Information Service is open service based on the network environment. DEM should be protected because of its significance. This paper gives three methods for DEM information protecting, they are DEM encrypting, DEM information hiding and DEM Information disguising, and researches their theories and techniques. Then, this paper analyses their differences and relation. This paper could provide theory support for DEM information security research in Geographic Information Service.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4010
Author(s):  
Rohit A. Deshmukh ◽  
Dileepa Jayakody ◽  
Alexander Schneider ◽  
Violeta Damjanovic-Behrendt

Today, the Internet of Things (IoT) is pervasive and characterized by the rapid growth of IoT platforms across different application domains, enabling a variety of business models and revenue streams. This opens new opportunities for companies to extend their collaborative networks and develop innovative cross-platform and cross-domain applications. However, the heterogeneity of today’s platforms is a major roadblock for mass creation of IoT platform ecosystems, pointing at the current absence of technology enablers for an easy and innovative composition of tools/services from the existing platforms. In this paper, we present the Data Spine, a federated platform enabler that bridges IoT interoperability gaps and enables the creation of an ecosystem of heterogeneous IoT platforms in the manufacturing domain. The Data Spine allows the ecosystem to be extensible to meet the need for incorporating new tools/services and platforms. We present a reference implementation of the Data Spine and a quantitative evaluation to demonstrate adequate performance of the system. The evaluation suggests that the Data Spine provides a multitude of advantages (single sign-on, provision of a low-code development environment to support interoperability and an easy and intuitive creation of cross-platform applications, etc.) over the traditional approach of users joining multiple platforms separately.


Sign in / Sign up

Export Citation Format

Share Document