Security Assertion mark-up language Authentication ADFS with BSF for Proof of Concept

Authors

  • Megha Rani Raigond  Department of Computer Studies and Computer Application, Visvesvaraya Technological University, Center for PG Studies, Kalburagi, Karnataka, India
  • Amaresh G T  Department of Computer Studies and Computer Application, Visvesvaraya Technological University, Center for PG Studies, Kalburagi, Karnataka, India

Keywords:

ADFS, BSF, SAML, HTTP, IDS, OOAD

Abstract

BSF achievement information framework is additionally outlined in single word as "numerous in one". This application are intended to supply the offices of machine-controlled business trade, on-line check, person to person communication, clear record exchange and exchange with some unique functionalities like picture exchange, relationship of data with outperform sheet, direct Arcanum recuperation, gets, mail and sms benefit, news refreshes, climate report and discovering area of the obligation space in Google outline, time and date on date-book. As assets move to the cloud, client’s ability a multiplication of certifications - the usernames, passwords and, once in a while, gadgets they use to sign in (or confirm) to cloud-based administrations. Single sign-on advancements come back to the save, allowing clients to validate at one area and get to a spread of administrations while not re-verifying.

References

  1. S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proc.14th Financial Cryptography Data Security, 2010, pp. 136–149.
  2. K. Ren, C. Wang, and Q. Wang, "Security challenges for the servers," IEEE Internet Comput., vol. 16, no. 1, pp. 69–73, Jan.-Feb.2012.
  3. A. Sahai and B. Waters, "Fuzzy identity-based encryption," inProc.24th Annu. Int. Conf. Theory Appl. Cryptographic Techn 5R. Ostrovsky, A. Sahai, and ., 2005,pp. 457–473.
  4. B. Waters, "Attribute-based encryptionwith non-monotonic access structures," in Proc. 14th ACMConf. Comput.Commun. Security, 2014, pp. 195–203.
  5. A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,"Fully secure functional encryption: Attribute-based encryptionand (hierarchical) inner product encryption," in Proc. 29th Annu.Int. Conf. Theory Appl. Cryptographic Techn., 2010, pp. 62–91.
  6. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute1P. Mell and T. Grance, "The NIST definition of servers,"Nat. Instit.Standards Technol., vol. 53, no. 6, p. 50, 2009. basedencryption for fine-grained access control of encrypted data," inProc.13th ACM Conf. Comput.Commun.S ecurity, 2006, pp. 89–98.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Megha Rani Raigond, Amaresh G T, " Security Assertion mark-up language Authentication ADFS with BSF for Proof of Concept, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.373-378, July-August-2017.