CFP last date
20 May 2024
Reseach Article

To Study the Performance of ACL (Access Control Model) to Identify the Security Issues and to resolve the Problem of Assign Authorization to Object Through SSO (Single Sign-On)

by Dharmendra Choukse, Umesh Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 22
Year of Publication: 2018
Authors: Dharmendra Choukse, Umesh Kumar Singh
10.5120/ijca2018916412

Dharmendra Choukse, Umesh Kumar Singh . To Study the Performance of ACL (Access Control Model) to Identify the Security Issues and to resolve the Problem of Assign Authorization to Object Through SSO (Single Sign-On). International Journal of Computer Applications. 179, 22 ( Feb 2018), 13-18. DOI=10.5120/ijca2018916412

@article{ 10.5120/ijca2018916412,
author = { Dharmendra Choukse, Umesh Kumar Singh },
title = { To Study the Performance of ACL (Access Control Model) to Identify the Security Issues and to resolve the Problem of Assign Authorization to Object Through SSO (Single Sign-On) },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 179 },
number = { 22 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number22/28999-2018916412/ },
doi = { 10.5120/ijca2018916412 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:07.984676+05:30
%A Dharmendra Choukse
%A Umesh Kumar Singh
%T To Study the Performance of ACL (Access Control Model) to Identify the Security Issues and to resolve the Problem of Assign Authorization to Object Through SSO (Single Sign-On)
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 22
%P 13-18
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Access control models to identify the benefits and security challenges associated with them and then also discusses how can reduce the complexity of Web services development through access control model to resolve the identified issues. Information Security involves the activities that organisations, enterprises, and institutions undertake to defend the value and continuing usability of assets, the integrity, and continuity of operations. The term Access Control really mentions to the control over access to system resources after a user's account credentials and identity have been authenticated and access to the system granted. Several Data, Access Control models, have been introduced by keeping in view the requirements of an organisation, and the sensitivity of the data.

References
  1. R. Bhatti, J. B. D. Joshi, E. Bertino, A. Ghafoor, “Access Control in Dynamic XML-based Web-Services with XRBAC”, In Proceedings of The First International Conference on Web Services, Las Vegas, June 23-26, 2003.
  2. The eXtensible Access Control Markup Language (XACML), Version 3.0, OASIS Standard, January 22, 2013. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-osen.pdf
  3. M. Hillenbrand, J. G. otze, J. Muller, and P. Muller, "A Single Sign-On Framework for Web-Services based Distributed Applications", 8th International Conference on Telecommunications, 2005, pp 273-279.
  4. T. Grob, "Security Analysis of the SAML Single Sign-on Browser/Artifact Profile", Proceedings of the 19th Annual Computer Security Applications Conference, 2003, pp 298-307.
  5. Microsoft. .net passport review guide, 2002.
  6. J. Gantner, A. G. Schulz, and A. Thede, "A Single Sign-On Protocol for Distributed Web Applications Based on Standard Internet Mechanisms", e-business and telecommunications networks Springer Netherland, 2006, pp I53-I59.
  7. T. Fleury, J. Basney, and V. Welch, "Single sign-on for Java web start applications using MyProxy", Proceedings of the 3rd ACM workshop on Secure web services, 2006, pp 95-I0I.
Index Terms

Computer Science
Information Sciences

Keywords

Webservices ACL SSO