A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://nslab.kaist.ac.kr/courses/2006/cs710/paperlist/security/26.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="ACM Press">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/67476bz3cbhwnis5552nd4vwdq" style="color: black;">Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03</a>
A serious impediment for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relationships with individuals and each supporting their own authentication schemes which may vary from one provider to the next. We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers. Users select the<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/941326.941343">doi:10.1145/941326.941343</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wmash/MatsunagaMSK03.html">dblp:conf/wmash/MatsunagaMSK03</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zgvge7s7bjgqvdppqobo5ilbuy">fatcat:zgvge7s7bjgqvdppqobo5ilbuy</a> </span>
more »... ropriate SSO authentication scheme from the authentication capabilities announced by the WLAN service provider, and can block the exposure of their privacy information while roaming. In addition, we have developed a compound layer 2 and Web authentication scheme that ensures cryptographically protected access while preserving pre-existing public WLAN payment models. Our experimental results, obtained from our prototype system, show the total authentication delay are well within 2 seconds. This is dominated primarily by our use of industry-standard XML-based protocols, yet are still small enough for practical use.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809214925/http://nslab.kaist.ac.kr/courses/2006/cs710/paperlist/security/26.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/f7/f1f73e41faa4e24234054111d3231742ecd68457.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/941326.941343"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>