{"id":"https://openalex.org/W4362496474","doi":"https://doi.org/10.1109/kst57286.2023.10086933","title":"Design and Implementation of Fast and Secure SSO Authentication for Multi-Application Services Deployed in Cloud","display_name":"Design and Implementation of Fast and Secure SSO Authentication for Multi-Application Services Deployed in Cloud","publication_year":2023,"publication_date":"2023-02-21","ids":{"openalex":"https://openalex.org/W4362496474","doi":"https://doi.org/10.1109/kst57286.2023.10086933"},"language":"en","primary_location":{"id":"doi:10.1109/kst57286.2023.10086933","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/kst57286.2023.10086933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065674337","display_name":"Somchart Fugkeaw","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Somchart Fugkeaw","raw_affiliation_strings":["Thammasat University,Sirindhorn International Institute of Technology,School of ICT,Pathum Thani,Thailand","School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"Thammasat University,Sirindhorn International Institute of Technology,School of ICT,Pathum Thani,Thailand","institution_ids":["https://openalex.org/I108108428"]},{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028252778","display_name":"Intanont Langsanam","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Intanont Langsanam","raw_affiliation_strings":["Thammasat University,Sirindhorn International Institute of Technology,School of ICT,Pathum Thani,Thailand","School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"Thammasat University,Sirindhorn International Institute of Technology,School of ICT,Pathum Thani,Thailand","institution_ids":["https://openalex.org/I108108428"]},{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089392796","display_name":"Hasatorn Saviphan","orcid":null},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Hasatorn Saviphan","raw_affiliation_strings":["Thammasat University,Sirindhorn International Institute of Technology,School of ICT,Pathum Thani,Thailand","School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"Thammasat University,Sirindhorn International Institute of Technology,School of ICT,Pathum Thani,Thailand","institution_ids":["https://openalex.org/I108108428"]},{"raw_affiliation_string":"School of ICT, Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065674337"],"corresponding_institution_ids":["https://openalex.org/I108108428"],"apc_list":null,"apc_paid":null,"fwci":0.9163,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77256654,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8111343383789062},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7603244781494141},{"id":"https://openalex.org/keywords/single-sign-on","display_name":"Single sign-on","score":0.7103602886199951},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6383651494979858},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6243330836296082},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.609588623046875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48603206872940063},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.45912113785743713},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4394659101963043},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.41898176074028015},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3702242970466614}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8111343383789062},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7603244781494141},{"id":"https://openalex.org/C2776362682","wikidata":"https://www.wikidata.org/wiki/Q568494","display_name":"Single sign-on","level":3,"score":0.7103602886199951},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6383651494979858},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6243330836296082},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.609588623046875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48603206872940063},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.45912113785743713},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4394659101963043},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.41898176074028015},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3702242970466614},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kst57286.2023.10086933","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/kst57286.2023.10086933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1591233415","https://openalex.org/W1985851532","https://openalex.org/W2054702684","https://openalex.org/W2072122569","https://openalex.org/W2126414598","https://openalex.org/W2129496924","https://openalex.org/W2398150108","https://openalex.org/W2782851224","https://openalex.org/W2891922784","https://openalex.org/W2968408339","https://openalex.org/W2981186629","https://openalex.org/W3110485478","https://openalex.org/W3116338436","https://openalex.org/W3156366177"],"related_works":["https://openalex.org/W2354590300","https://openalex.org/W2213995339","https://openalex.org/W2137529864","https://openalex.org/W2809905916","https://openalex.org/W2802209085","https://openalex.org/W4231540918","https://openalex.org/W2076312449","https://openalex.org/W2388000644","https://openalex.org/W2005308538","https://openalex.org/W2383992966"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"the":[3,59,68,78,83,98,103,111,115,118],"design":[4],"and":[5,20,39,47,63,71,73,109,120],"implementation":[6,104],"of":[7,33,53,93,105,117,122],"a":[8,51,90],"cloud-based":[9],"Single":[10],"Sign-On":[11],"(SSO)":[12,42],"authentication":[13,23,65,72],"system":[14,31,99,108],"called":[15],"D-IAM":[16,123],"that":[17],"supports":[18],"fast":[19],"secure":[21,60,69],"SSO":[22,64,84],"for":[24,88],"multi-application":[25],"hosted":[26],"on":[27],"cloud":[28],"computing.":[29],"The":[30],"consists":[32],"three":[34],"main":[35],"modules":[36],"including":[37],"Identity":[38],"single":[40],"sign-on":[41],"Authentication":[43],"module,":[44],"OAuth":[45,74],"system,":[46],"authorization":[48],"system.":[49,124],"At":[50],"core":[52],"our":[54,106],"proposed":[55],"scheme,":[56],"we":[57,101],"introduced":[58],"user":[61,94],"identification":[62,70],"method":[66],"leveraging":[67],"2.0.":[75],"We":[76],"implemented":[77],"multi-thread":[79],"programming":[80],"to":[81,113],"enhance":[82],"token":[85],"generation":[86],"performance":[87,121],"supporting":[89],"high":[91],"number":[92],"access":[95],"requests.":[96],"For":[97],"evaluation,":[100],"presented":[102],"prototype":[107],"conducted":[110],"experiments":[112],"substantiate":[114],"correctness":[116],"functionality":[119]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
