Back to Results
First PageMeta Content
Computing / Identity management / Security Assertion Markup Language / Internet standards / Federated identity / Shibboleth / SAML 2.0 / PERMIS / Federated identity management / System software / Computer security / Identity management systems


Security Analysis of the SAML Single Sign-on Browser/Artifact Profile Thomas Groß IBM Zurich Research Laboratory [removed] Abstract
Add to Reading List

Document Date: 2003-10-03 10:38:58


Open Document

File Size: 90,10 KB

Share Result on Facebook

City

Browser / Washington / DC / Zurich / Berlin / /

Company

IBM / TARGET / ACM Press / DBank / Needham / Artifact Profile Thomas Groß IBM Zurich Research Laboratory / Microsoft / /

Country

Germany / /

/

Event

FDA Phase / /

IndustryTerm

e-banking account / authentication protocol / federated identity management / malicious destination site / protocol-specific software / browser-based authentication protocols / public key protocols / software engineers / Web browsers / browser-based authentication protocol / business to business / Web browser / large networks / honest source site / protocols / public-key protocol / Possible solutions / intercompany services / message security solutions / e-commerce implementations / canonical solution / important browser-based protocols / cryptographic protocols / public-key protocols / e-banking application ebank / secure protocol / bank / certificate chain / information destination site / normal authentication protocols / sign-on protocol / passport single signon protocol / attribute-exchange protocols / communication protocols / Token-based web single signon / e-banking transactions / well-analyzed authentication protocols / publickey protocol / valid certificate chain / identity supplier / well-written protocol / transfer protocol / /

Movie

D. 7 / D. 3 / /

OperatingSystem

Dos / /

Organization

SAML Single Sign-on Browser/Artifact Profile Thomas Groß IBM Zurich Research Laboratory / Electronic Society / Domain Name Service / /

Person

M. Schroeder / Lilli-Marie Pavka / R. Then / R. Let / Charlotte Bolliger / Michael Backes / Birgit Pfitzmann / /

Position

forward all communication / forward this communication / forward the communication / /

Product

OASIS / Possible solutions / /

ProgrammingLanguage

R / XML / /

ProvinceOrState

Alberta / /

PublishedMedium

IEEE Transactions on Software Engineering / Communications of the ACM / /

Technology

XML / browser-based authentication protocol / needham-schroeder publickey protocol / normal authentication protocols / Hypertext transfer protocol / important browser-based protocols / well-analyzed authentication protocols / sign-on protocol / SSL / browser-based authentication protocols / Public-Key protocol / public-key protocols / TLS protocol / DNS / Signon protocol / browser-based protocols / three-party authentication protocol / HTTP / well-written protocol / attribute-exchange protocols / public key protocols / communication protocols / secure protocol / Using encryption / newly developed protocols / /

SocialTag