A lot of research papers have shown that there are logical flaws existing in web-based single sign-on schemes th
have been deployed by those authentication providers and relying party websites. Attackers are able to authentic
as a user and perform unauthorized activities.
- Decompose the problem into smaller problems. Describe the specific domains that map the problems.
- Hypothesize a solution to the problem. Compare your proposed solution to historical methods. Describe how it
differs from current solutions to the problem. - Discuss how you would gather evidence and expected results.
Sample Solution