0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration
نویسندگان :
Masoumeh Hashemi
1
Mehdi Sakhaei-nia
2
Morteza Yousef Sanati
3
1- دانشگاه بوعلی سینا
2- دانشگاه بوعلی سینا
3- دانشگاه بوعلی سینا
کلمات کلیدی :
Authentication as a Service, Enterprise Service Bus, Event-Driven Architecture, Enterprise
چکیده :
AUTHaaS is a solution for various problems in an enterprise involving different software systems, each of which have a different authentication mechanism. Multiple usernames/passwords for a user, different security vulnerabilities for each software, and possible changes to the authentication mechanism are some of these problems. The solutions proposed for AUTHaaS are based on SOA. As communication in SOA is synchronous, the authentication process can confront problems if the authentication service is delayed for any reason. It is the purpose of this paper to answer these problems. In this paper, a security architecture is proposed for AUTHaaS through enterprise application integration. The core of the integration solution is the ESB technology. Proposed ESB-based architecture allows the user to authenticate only once for using different systems. Once the user is successfully authenticated for an application, other applications receive events through the ESB that indicate the user has successfully authenticated. So they do not need to be authenticated again by the authentication service for further access. The results show that after the 500th request, i.e. the second request of each user, the response time is reduced by50% and the number of visits to the authentication server for subsequent requests of users will bezero.
لیست مقالات
لیست مقالات بایگانی شده
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
Context Awareness Gate for Retrieval Augmented Generation
Mohammad Hassan Heydari - Arshia Hemmat - Erfan Naman - Afsaneh Fatemi
A method for image steganography based on chaotic maps and advanced compression algorithms
Mohammad Yousefi Sorkhi
An integrated approach for estimating software cost estimation using Adaptive Neuro-Fuzzy Inference System and the Grey Wolf Optimization algorithm
Maryam Karimi - Taghi Javdani Gandomani - Mahdi Mosleh
بهبود عنواننگاری تصویر با استفاده از روشهای یادگیری عمیق
مهدی صیادجو - محمدجواد فدائی اسلام
IT-based and Non-IT-based methods to separate and collect waste
Hoda Harati - Farzad Haghighi-Rad - Reza Yousefi Zenouz
A Topic Based Method to Classify the Question Clarity in CQA Networks
Alireza Khabbazan - Dr Ahmad Ali Abin
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration
Masoumeh Hashemi - Mehdi Sakhaei-nia - Morteza Yousef Sanati
خوشه بندی شبکههای بیسیم ادهاک مبتنی بر محدودیتهای فازی
پروا کلیبری - کریم صمدزمینی
سیستم توصیه گر برای خرید لوازم آرایشی و بهداشتی مبتنی بر الگوریتم جنگل تصادفی
فاطمه رمضانی خوزستانی - مجید رفیعی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.2.4