0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration
Authors :
Masoumeh Hashemi
1
Mehdi Sakhaei-nia
2
Morteza Yousef Sanati
3
1- دانشگاه بوعلی سینا
2- دانشگاه بوعلی سینا
3- دانشگاه بوعلی سینا
Keywords :
Authentication as a Service, Enterprise Service Bus, Event-Driven Architecture, Enterprise
Abstract :
AUTHaaS is a solution for various problems in an enterprise involving different software systems, each of which have a different authentication mechanism. Multiple usernames/passwords for a user, different security vulnerabilities for each software, and possible changes to the authentication mechanism are some of these problems. The solutions proposed for AUTHaaS are based on SOA. As communication in SOA is synchronous, the authentication process can confront problems if the authentication service is delayed for any reason. It is the purpose of this paper to answer these problems. In this paper, a security architecture is proposed for AUTHaaS through enterprise application integration. The core of the integration solution is the ESB technology. Proposed ESB-based architecture allows the user to authenticate only once for using different systems. Once the user is successfully authenticated for an application, other applications receive events through the ESB that indicate the user has successfully authenticated. So they do not need to be authenticated again by the authentication service for further access. The results show that after the 500th request, i.e. the second request of each user, the response time is reduced by50% and the number of visits to the authentication server for subsequent requests of users will bezero.
Papers List
List of archived papers
Exploring the Relationship Between Gameplay Log Data and Depression & Anxiety
Soroush Elyasi - Arya Varasteh Nezhad - Fattaneh Taghiyareh
طبقهبندی ترافیک رمز مبتنی بر یادگیری ماشین
افسانه معدنی - شقایق نادری - حسین قرایی
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
حفظ حریم خصوصی در انتشار نسخه های متوالی دادههای شبکه اجتماعی با امکان افزایش یال
طاهره سرزهی - دکتر مهری رجایی طاهره سرزهی - مهری رجایی -
شناسایی حملات فیشینگ با استفاده از الگوریتم عقاب آتشین و شبکه عصبی کانولوشن
علی کوشاری - مهدی فرتاش
OENMOP: Loss-Aware 4×4 and 5×5 and Scalable Non‑blocking Optical Switches Designed for Odd-Even Routing Algorithm for Chip-Scale Interconnection Networks
Negin Bagheri Renani - Elham Yaghoubi - Mina Mohammadirad
نظرکاوی در سطح مفهوم با استفاده از رویکردی ترکیبی
سیدرضا قادریان خیرآبادی سیدرضا قادریان خیرآبادی -
AI-based Message Spam Classification Framework for Secure Autonomous Vehicles Communication
Riya Upadhyay - Mili Virani - Lakshit Pathak - Rajesh Gupta - Sudeep Tanwar - Hossein Shahinzadeh
LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent
Arash Ebrahimnezhad - Faria Nassiri-Mofakham
پیشبینی حجم ترافیک شهری با استفاده از دادههای سرویس نشان مورد مطالعاتی: خیابان کمال اصفهان
مهسا لطیفی - جمشید مالکی
more
Samin Hamayesh - Version 41.3.1