Skip to main content

Use of SAML for Single Sign-On Access to Multimedia Contents in a Peer-to-Peer Network

  • Conference paper
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (OTM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

  • 978 Accesses

Abstract

The Single Sign-on technique (SSO) facilitates the management of authentication and authorization functions in a federation of servers providing access to protected resources. Different approaches to SSO exist, among them the XML-based Security Assertion Markup Language (SAML) standard, which has been used in applications such as intranet access within organizational domains. This paper focuses on the use of SAML for authentication and authorization in a project aimed at providing peer-to-peer access to high-definition audiovisual streams. Adaptation of various elements are proposed herein in order to cope with the specific characteristics of SSO in a P2P architecture.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cantor, S., Kemp, J., Philpott, R., Maler, E.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005), http://www.oasis-open.org/committees/security/Doc.IDsaml-core-2.0-os

  2. i2CAT web site, http://www.i2cat.org/

  3. Erdos, M., Cantor, S.: Shibboleth Architecture (2002), http://shibboleth.internet2.edu/docs/draft-internet2-shibboleth-arch-v05.pdf

  4. Eastlake, D., Reagle, J., Solo, D.: XML-Signature Syntax and Processing (also published as RFC 3275) (2002), http://www.w3.org/TR/xmldsig-core/

  5. Eastlake, D., Reagle, J.: XML Encryption Syntax and Processing (2002), http://www.w3.org/TR/xmlenc-core/

  6. Moses, T.: Extensible Access Control Markup Language (XACML) Version 2.0 (2005), http://www.oasis-open.org/committees/xacml/Doc.IDaccess_control-xacml-2.0-core-spec-os

  7. Hughes, J., Cantor, S., Hodges, J., Hirsch, F., Mishra, P., Philpott, R., Maler, E.: Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005), http://www.oasis-open.org/committees/security/Doc.IDsaml-profiles-2.0-os

  8. Netscape: Persistent Client State — HTTP Cookies (1999), http://wp.netscape.com/newsref/std/cookie_spec.html

  9. Groß, T.: Security Analysis of the SAML Single Sign-on Browser Artifact Profile. In: 19th Annual Computer Security Applications Conference, Las Vegas (2003)

    Google Scholar 

  10. Netscape: SSL 3.0 Specification (1996), http://wp.netscape.com/eng/ssl3/

  11. Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246 (1999)

    Google Scholar 

  12. Linn, J., Mishra, P.: SSTC Response to Security Analysis of the SAML Single Sign-on Browser/Artifact Profile (2005), http://www.oasis-open.org/committees/security/,Doc.IDsstc-gross-sec-analysis-response-cd-01

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Barrio, R., Perramon, X., Delgado, J. (2006). Use of SAML for Single Sign-On Access to Multimedia Contents in a Peer-to-Peer Network. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_58

Download citation

  • DOI: https://doi.org/10.1007/11915034_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics