Your software at my service: Security analysis of saas single sign-on solutions in the cloud

C Mainka, V Mladenov, F Feldmann… - … of the 6th Edition of the …, 2014 - dl.acm.org
C Mainka, V Mladenov, F Feldmann, J Krautwald, J Schwenk
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, 2014dl.acm.org
Software-as-a-Service (SaaS) is typically defined as a rental model for using a complex
software product, running on a centralized computing platform, using a thin client (most
frequently a web browser). As such, it is one of the major categories of Cloud Computing,
besides IaaS and PaaS. While there are many economic benefits in using SaaS, each
company must nevertheless enforce control over its own data processed in the Cloud. One
of the most important building blocks of such an enforcement scheme is idM, whereat the …
Software-as-a-Service (SaaS) is typically defined as a rental model for using a complex software product, running on a centralized computing platform, using a thin client (most frequently a web browser). As such, it is one of the major categories of Cloud Computing, besides IaaS and PaaS.
While there are many economic benefits in using SaaS, each company must nevertheless enforce control over its own data processed in the Cloud. One of the most important building blocks of such an enforcement scheme is idM, whereat the industry standard for idM is SAML, the Security Assertion Markup Language.
In this paper, we study the security of the SAML implementations of 22 CPs and show that 90% of them can be broken, resulting in company data exposure to attackers on the Internet. The detected vulnerabilities are exploited by a wide variety of attack techniques, ranging from classical web attacks to problems specific to XML processing.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果