Identification of Secured Single Sign-on Approach and to find Attackers in Distributed Systems

Provided by: IJCTT-International Journal of Computer Trends and Technology
Topic: Security
Format: PDF
Distributed systems are the huge amount of telecommunicated and adopting based network systems. So to provide the security in that large network the authors are implemented this paper, users can sign in only one time in their account. The users cannot able to login in their account many times until they sign-out first time. When users' sign-on their account there is an automatic token will be generated and it can't be expire until the user sign-out from their account. And purpose of this application is to stop the many number accounts maintenance for the single user.

Find By Topic