Please wait a minute...
New Technology of Library and Information Service  2008, Vol. 24 Issue (10): 75-80    DOI: 10.11925/infotech.1003-3513.2008.10.14
Current Issue | Archive | Adv Search |
Research and Implementation of Single Sign-on Mechanisms in Library Portal
Qi Huiying 1,2,3   Xu Shuwei 1,2
1 (National Science Library, Chinese Academy of Sciences, Beijing 100190, China)
2 (Graduate University of Chinese Academy of Sciences, Beijing 100049, China)
3(Computer Division,Peking University Health Science Center, Beijing 100083, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper firstly analyzes the actuality and problems of  SSO research work using the credential library and proposes a model to implement SSO for library portal. And then it analyzes and compares common SSO mechanisms which are being deployed for Web applications at present. It designs the architecture of a credential-based SSO system, and introduces the principle of credential library, credential manager and users mapping mechanism. Finally, a prototype system of credential-based SSO is designed.

Key wordsCredential library      Single sign-on(SSO)      Users mapping mechanism     
Received: 16 July 2008      Published: 25 October 2008
: 

TP393.09 

 
  G250.76

 
Corresponding Authors: Qi Huiying     E-mail: qihy@mail.las.ac.cn
About author:: Qi Huiying,Shu wei

Cite this article:

Qi Huiying,Shu wei. Research and Implementation of Single Sign-on Mechanisms in Library Portal. New Technology of Library and Information Service, 2008, 24(10): 75-80.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2008.10.14     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2008/V24/I10/75

[1] Taylor L. Understanding Single Sign- on[ EB/OL].[2008-07-10]. http://www.intranetjournal.com/articles/200205/pse_05_28_02a.html.
[2] Gilmore B, Farvis K, Maddock J. Core Middleware and Shared Services Studies Single Sign-on Report. (2004-09-22)[2008-09-14]. http://www.jisc.ac.uk/publications/publications/singlesignonreport.aspx.
[3] Pashalidis A,Mitchell CJ. A Taxonomy of Single Sign-On Systems[C]. In:Proceedings of 8th Australasian Conference on the Information Security and Privacy,ACISP.Australia:Wollongong,2003:249-264.
[4] Jan De Clercq. Single Sign-On Architectures[S].RSA Conference.2003.
[5] 徐福仓,蔡玲玲,吴敏. 电子政务内门户单点登录系统的实现[J]. 计算机系统应用,2007(1):99-101.
[6] UTrust SSO单点登录系统[EB/OL].[2008-08-26].http://www.chinautrust.com/ownproduct/sso.htm.
[7] Neuman C, Yu T, Hartman S, et al. The Kerberos Network Authentication Service. (RFC4120),2005-07.
[8] Kerberos: The Network Authentication Protocol[EB/OL].[2008-07-10]. http://web.mit.edu/kerberos/www.
[9] Dunne C. Build and Implement a Single Sign-on Solution[EB/OL].[2008-07-10].http://www-128.ibm.com/developerworks/web/library/wa-singlesign/.
[10] Corradini F, Paganelli E, Polzonetti A. The e-Government Digital Credentials[J]. International Journal of Electronic Governance, 2007,1(1):17-37.

[1] Shen Kuilin,Du Jin. Ajax Technology and Its Application in Digital Libraries[J]. 现代图书情报技术, 2007, 2(9): 88-91.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn