期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Evaluating the Efficiency and Effectiveness of a Federated SSO Environment Using Shibboleth
1
作者 parves kamal Saad Mustafiz +1 位作者 Faisal Md. Abdur Rahman Raihan Taher 《Journal of Information Security》 2015年第3期166-178,共13页
The notion of this project is derived from our practical use of user authentication system namely Shibboleth at the University of Bedfordshire. It has been found that the University of Bedfordshire controls its variou... The notion of this project is derived from our practical use of user authentication system namely Shibboleth at the University of Bedfordshire. It has been found that the University of Bedfordshire controls its various services including student portal Breo, Learning Resources and Student Email Access and others through the Shibboleth. Like the University of Bedfordshire the other Universities in the UK are also implementing the Shibboleth system in their access management control. Therefore, the researchers of this project have found it important to evaluate its efficiency and effectiveness of Shibboleth from different perspectives. In the first part of this paper it tries to explain the features of Shibboleth as SSO services and compares it with other SSO services like Athens, Kerberos, etc. Then in the middle section, the authors go through the steps of installation and configuration of the Shibboleth. In the end of the paper, based on the survey of real users of Shibboleth at the University of Bedfordshire, the authors give its insights on the effectiveness of the Shibboleth as SSO service. Throughout this investigation, the authors have applied a triangulation to find out user and service provider viewpoint about Shibboleth. Although there were some problems persisted, the authors also implemented the Shibboleth system successfully to figure out different problems, efficiency and effectiveness. The recommendations and conclusion have been provided at the end of this project. 展开更多
关键词 SHIBBOLETH SSO ATHENS Kerberos Identity PROVIDER (IdP) Service PROVIDER (SP) TOMCAT Microsoft PASSPORT
下载PDF
Security of Password Hashing in Cloud
2
作者 parves kamal 《Journal of Information Security》 2019年第2期45-68,共24页
Though the History of using password in computing can be traced back to as far as mid of last century little focus has been implied on how to securely store and retrieve password to authenticate and authorize services... Though the History of using password in computing can be traced back to as far as mid of last century little focus has been implied on how to securely store and retrieve password to authenticate and authorize services to the end users. In this paper the current security of various password hashing schemes that are in use today will be investigated through practical proof of concept-GPU based, password hash dump cracking using the power of cloud computing. We will be providing comparison on different password hashing cracking time using the cloud GPU power in AWS. The focus of this paper is to show the possible use of cloud computing in cracking hash dumps and the way to countermeasures them by using secure hashing algorithm and using complex passwords. 展开更多
关键词 Index Terms-Hash Collision GPGPU CUDA OPENCL
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部