Share This Article:

Implications of SSO Solutions on Cloud Applications

Abstract Full-Text HTML Download Download as PDF (Size:2673KB) PP. 186-190
DOI: 10.4236/cn.2014.63020    2,513 Downloads   2,932 Views   Citations

ABSTRACT

The trend in businesses is moving towards a single browser tool on portable devices to access cloud applications which would increase portability but at the same time would introduce security vulnerabilities. This resulted in the need for several layers of password authentications for cloud applications access. Single Sign-On (SSO) is a tool of access control of multiple software systems. This research explores the effects and implications of SSO solutions on cloud applications. We utilize a new framework of different attributes developed by acquiring IT experts’ opinions through extensive interviews to expand significant strategic parameters at the workplace. The framework was further tested using data collected from a sample of 400+ users in the UAE.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Watfa, M. , Khan, S. and Radmehr, A. (2014) Implications of SSO Solutions on Cloud Applications. Communications and Network, 6, 186-190. doi: 10.4236/cn.2014.63020.

References

[1] OpenID. www.openid.net
[2] Anchan, D. and Pegah, M. (2003) Regaining Single Sign-On Taming the Beast. Proceedings of the 31st Annual ACM SIGUCCS Conference on User Services, 166-171.
http://dx.doi.org/10.1145/947469.947514
[3] Kakizaki, Y., Maeda, K. and Iwamura, K. (2011) Identity Continuance in Single Sign-On with Authentication Server Failure. Proceedings of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2011), Seoul, 30 June-2 July 2011, 597-602.
[4] Kontaxis, G., Polychronakis, M. and Markatos, P. (2012) Minimizing Information Disclosure to Third Parties in Social Login Platforms. International Journal of Information Security, 11, 321-332. http://dx.doi.org/10.1007/s10207-012-0173-6
[5] Josang, A., Fabre, J., et al. (2005) Trust Requirements in Identity Management. Australasian Information Security Workshop, Newcastle, 99-108.
[6] Meniya, A. and Jethva, H. (2012) Single-Sign-On (SSO) across Open Cloud Computing Federation. International Journal of Engineering Research and Applications, 2, 891-895.
[7] Zhu, F. and Diao, H. (2010) Single Sign-On Assistant: An Authentication Broker for Web Applications. 3rd International Conference on Knowledge Discovery and Data Mining, 2010, 146-149.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.