Security Assertion mark-up language Authentication ADFS with BSF for Proof of Concept

Authors(2) :-Megha Rani Raigond, Amaresh G T

BSF achievement information framework is additionally outlined in single word as "numerous in one". This application are intended to supply the offices of machine-controlled business trade, on-line check, person to person communication, clear record exchange and exchange with some unique functionalities like picture exchange, relationship of data with outperform sheet, direct Arcanum recuperation, gets, mail and sms benefit, news refreshes, climate report and discovering area of the obligation space in Google outline, time and date on date-book. As assets move to the cloud, client’s ability a multiplication of certifications - the usernames, passwords and, once in a while, gadgets they use to sign in (or confirm) to cloud-based administrations. Single sign-on advancements come back to the save, allowing clients to validate at one area and get to a spread of administrations while not re-verifying.

Authors and Affiliations

Megha Rani Raigond
Department of Computer Studies and Computer Application, Visvesvaraya Technological University, Center for PG Studies, Kalburagi, Karnataka, India
Amaresh G T
Department of Computer Studies and Computer Application, Visvesvaraya Technological University, Center for PG Studies, Kalburagi, Karnataka, India

ADFS, BSF, SAML, HTTP, IDS, OOAD

  1. S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proc.14th Financial Cryptography Data Security, 2010, pp. 136–149.
  2. K. Ren, C. Wang, and Q. Wang, "Security challenges for the servers," IEEE Internet Comput., vol. 16, no. 1, pp. 69–73, Jan.-Feb.2012.
  3. A. Sahai and B. Waters, "Fuzzy identity-based encryption," inProc.24th Annu. Int. Conf. Theory Appl. Cryptographic Techn 5R. Ostrovsky, A. Sahai, and ., 2005,pp. 457–473.
  4. B. Waters, "Attribute-based encryptionwith non-monotonic access structures," in Proc. 14th ACMConf. Comput.Commun. Security, 2014, pp. 195–203.
  5. A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,"Fully secure functional encryption: Attribute-based encryptionand (hierarchical) inner product encryption," in Proc. 29th Annu.Int. Conf. Theory Appl. Cryptographic Techn., 2010, pp. 62–91.
  6. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute1P. Mell and T. Grance, "The NIST definition of servers,"Nat. Instit.Standards Technol., vol. 53, no. 6, p. 50, 2009. basedencryption for fine-grained access control of encrypted data," inProc.13th ACM Conf. Comput.Commun.S ecurity, 2006, pp. 89–98.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 373-378
Manuscript Number : CSEIT1724110
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Megha Rani Raigond, Amaresh G T, "Security Assertion mark-up language Authentication ADFS with BSF for Proof of Concept", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.373-378, July-August-2017.
Journal URL : http://ijsrcseit.com/CSEIT1724110

Article Preview