Secure Authentication Process for High Sensitive Data E-Services: A Roadmap

Secure Authentication Process for High Sensitive Data E-Services: A Roadmap

Claudio Agostino Ardagna, Ernesto Damiani, Fulvio Frati, Salvatore Reale
ISBN13: 9781605660561|ISBN10: 1605660566|EISBN13: 9781605660578
DOI: 10.4018/978-1-60566-056-1.ch136
Cite Chapter Cite Chapter

MLA

Ardagna, Claudio Agostino, et al. "Secure Authentication Process for High Sensitive Data E-Services: A Roadmap." Electronic Business: Concepts, Methodologies, Tools, and Applications, edited by In Lee, IGI Global, 2009, pp. 2198-2213. https://doi.org/10.4018/978-1-60566-056-1.ch136

APA

Ardagna, C. A., Damiani, E., Frati, F., & Reale, S. (2009). Secure Authentication Process for High Sensitive Data E-Services: A Roadmap. In I. Lee (Ed.), Electronic Business: Concepts, Methodologies, Tools, and Applications (pp. 2198-2213). IGI Global. https://doi.org/10.4018/978-1-60566-056-1.ch136

Chicago

Ardagna, Claudio Agostino, et al. "Secure Authentication Process for High Sensitive Data E-Services: A Roadmap." In Electronic Business: Concepts, Methodologies, Tools, and Applications, edited by In Lee, 2198-2213. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-056-1.ch136

Export Reference

Mendeley
Favorite

Abstract

The widespread diffusion of online services provided by public and private organizations, firstly driven by e-commerce and more recently by egovernment applications, has stressed the need of secure ways to authenticate users who need to access online resources. The huge number of resources accessible on the Web leads to different authentication mechanisms implementations that often require multiple log-on actions also in intradomain multiservices scenario. In case of high sensitive services, users’ authentication plays a role of paramount importance. In this article is presented a case study that gives a roadmap of authentication mechanisms implemented at different levels of services’ software structure. The discussion starts by illustrating different authentication solutions implemented at operating system, application server or components level to conclude with Single Sign-On approach. For each solution, pros and cons are discussed. The SSO system, called CAS++, developed as an extension to Yale University’s CAS, is then presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.