To see the other types of publications on this topic, follow the link: SSO.

Dissertations / Theses on the topic 'SSO'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'SSO.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chripko, Juraj. "Systém Excalibur - implementace SSO." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445588.

Full text
Abstract:
Cieľom systému Excalibur je presunúť autentifikáciu od hesiel používaných v súčastnosti ku bezheslovej budúcnosti. Zámerom tejto práce je integrácia systému Excalibur s webovými bezheslovými protokolmi SAML a FIDO2.    Štandard SAML bol integrovaný do systému Excalibur a úspešne otestovaný s niekoľkými známymi aplikáciami. Excalibur má na starosti samotnú autentifikáciu a manažment používateľov a SAML je použitý na predanie týchto informácii aplikáciam tretích strán.   FIDO2 je, na druhú stranu, kompletný autentifikačný štandard, ktorý môže byť do systému Excalibur integrovaný viacerými spôsobmi. Ako najsľubnejší spôsob sa javí výmena autentifikačného mechanizmu systému Excalibur za FIDO2, ale slabá podpora štandardu a chýbajúce funkcie to zatiaľ nedovoľujú.
APA, Harvard, Vancouver, ISO, and other styles
2

Křenek, Jan. "Konfigurace SSO ve vnitropodnikové síti proti Active Directory." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-199213.

Full text
Abstract:
This work discusses about configuration and integration of Single Sign On against to Active Directory which serves as an authorization into web applications for Air Navigation Services, CZECH REPUBLIC by company Ifield Computer Consultancy Limited. Part of the work is performed the results of testing of the performance these two type of implementations for two different applications. For the theory part I've been using relevant literature, but for some tools, namely Scimark and JMeter, there is none, so I had to settle with internet sources. The main benefit of this thesis is the result of testing of comparison two different implementations of the Single Sign On generated using NTLMv2 and SPNEGO/Kerberos.
APA, Harvard, Vancouver, ISO, and other styles
3

Alcántara, Pope Moisés, and Cruz Eileen Belinda Loayza. "Implementación de un Sistema de Gestión de Seguridad y Salud Ocupacional en Minería Subterránea basado en las Normas Peruanas en la Contrata Minera Madsur SRL." Bachelor's thesis, Universidad Continental, 2019. http://repositorio.continental.edu.pe/handle/continental/5755.

Full text
Abstract:
El proyecto de investigación titulada: “Implementación de un sistema de gestión de seguridad y salud ocupacional en minería subterránea basado en las normas peruanas en la contrata minera Madsur SRL.” mostrará la metodología para implementar un Sistema de Gestión Seguridad y Salud Ocupacional en Minería Subterránea basada en las normas peruanas. Los índices de Seguridad emitido por el Ministerio de Energía y Minas, OSINERGMIN son documentos legales donde se observan los índices de seguridad que utilizaremos para poder evaluar el desempeño de la Empresa y verificar el cumplimiento del Sistema de Gestión de Seguridad y Salud Ocupacional en Minería.
APA, Harvard, Vancouver, ISO, and other styles
4

Maachaoui, Mohamed. "Sécurité et performances des réseaux de nouvelle génération." Phd thesis, Toulouse, INPT, 2015. http://oatao.univ-toulouse.fr/14266/1/Maachaoui.pdf.

Full text
Abstract:
L’IMS (IP Multimedia Subsystem) constitue l’architecture clé de contrôle pour les réseaux de nouvelle génération (NGN : Next Generation Network). IMS offre aux opérateurs réseaux la possibilité d'étendre leurs services, en intégrant la voix et des communications multimédia et de les livrer dans de nouveaux environnements avec de nouveaux objectifs. Sa sécurité totale mais à moindre coût est donc primordiale, principalement l’authentification. En IMS l’authentification est divisée en deux phases, une au niveau du domaine PS (Packet-Switch) avec le protocole 3GPP-AKA, et l’autre au niveau IMS en utilisant le protocole IMS-AKA. Dans notre première contribution, nous proposons un nouveau protocole d’authentification plus sécurisé que celui utilisé en IMS (IMS-AKA) et plus performant en termes d’utilisation de la bande passante et de temps de traitement. Notre méthode d’analyse repose sur la quantification de la signalisation induite par l’authentification IMS. La quantification est effectuée à l’aide d’expérimentations réelles. Sur la base des résultats obtenues, nous pouvons confirmer que notre protocole (1) peut économiser au moins 21,5% du trafic SIP/Cx par rapport à l’IMS-AKA, (2) permet de réduire la consommation de la bande passante de 27% par rapport à l’IMS-AKA, (3) résiste aux attaques atteignant la confidentialité et l’intégrité des données lors d’un enregistrement IMS (validé par AVISPA). Dans notre seconde contribution, nous avons présenté un nouveau modèle, nommé virtual walled-garden, de fourniture de services centré sur l'utilisateur en IMS. Ce modèle de fourniture de service permet d'offrir plus de liberté d'utiliser les services de tout fournisseur de contenu en fonction des besoins et préférences des utilisateurs. De cette manière les trois parties (utilisateur, fournisseurs de services et opérateur IMS) sont satisfaites. Les utilisateurs auront accès à un plus large éventail de services soutenus par l'IMS, les fournisseurs de services peuvent mettre en œuvre un large éventail de services IMS/SIP sans aucun investissement sur la mise en œuvre d'un réseau de cœur IMS ou de sa maintenance. Quant aux opérateurs cette façon de faire constitue une nouvelle forme de partenariat d'affaires avec les fournisseurs de services. Le modèle virtual walled-garden se base sur une fédération d'identité multi niveaux pour prendre en considération plusieurs niveaux de sécurité selon la criticité des applications sollicitées.
APA, Harvard, Vancouver, ISO, and other styles
5

Feldmann, Florian [Verfasser], Jörg [Akademischer Betreuer] Schwenk, and Christina [Akademischer Betreuer] Pöpper. "Binding credentials : securing (SSO) authentication / Florian Feldmann. Gutachter: Jörg Schwenk ; Christina Pöpper." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1081246677/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pérez, Méndez Alejandro. "Proporcionando acceso federado y SSO a servicios de internet mediante kerberos e infraestructuras AAA = Providing federated access and SSO to internet services by means of kerberos and AAA infrastructures." Doctoral thesis, Universidad de Murcia, 2015. http://hdl.handle.net/10803/287163.

Full text
Abstract:
A día de hoy las federaciones de identidad para servicios web y para el acceso a la red están bastante asentadas y aceptadas. Pero, ¿qué ocurre con otros tipos de servicio que no soportan estas tecnologías? El objetivo de esta tesis es diseñar soluciones que permitan el establecimiento de federaciones de identidad más allá del Web, evitando los problemas que presentan las soluciones disponibles en el estado del arte. Para ello se han analizado y seleccionado un conjunto de tecnologías asociadas al control de acceso que, una vez integradas, proporcionan la funcionalidad completa deseada: • Kerberos, para realizar el control de acceso a los servicios de aplicación, dadas las grandes cualidades que presenta (seguro, ligero, SSO, etc.), su amplio despliegue y su gran rango de servicios y sistemas operativos soportados. • Infraestructuras AAA, para el soporte de federación, por su amplio uso para proporcionar acceso federado a la red (p.ej. eduroam). • SAML, para el soporte de autorización, por su gran historial de éxito y amplio despliegue en federaciones basadas en Web. Por tanto, el objetivo general de esta tesis puede expresarse como: Analizar, diseñar y validar soluciones que permitan a los usuarios obtener credenciales Kerberos para un proveedor de servicios específico, como resultado de un proceso de autenticación realizado a través de una federación AAA y de un proceso de autorización basado en el intercambio de sentencias SAML con la organización origen. Este objetivo se ha abordado de tres formas diferentes, dependiendo del escenario de uso, dando lugar a tres sub-objetivos más específicos: 1. Diseñar una solución que permita la generación de credenciales Kerberos mediante la integración directa de las infraestructuras Kerberos y AAA en el proveedor de servicios. 2. Diseñar una solución que permita la generación de credenciales Kerberos mediante el uso de un protocolo auxiliar (out-of-band) que haga uso de la infraestructura AAA para autenticar al usuario. 3. Diseñar una solución que permita la generación de credenciales Kerberos como consecuencia del proceso de autenticación federada en la red. Además, se definen los siguientes sub-objetivos transversales: 4. Diseñar un modelo de autorización que permita la distribución de información de autorización a través de la infraestructura AAA. 5. Validar las soluciones diseñadas mediante modelos analíticos e implementación de prototipos. A fin de cumplir con estos objetivos, esta tesis define tres soluciones al problema planteado: • FedKERB integra las infraestructuras Kerberos y AAA mediante la definición un nuevo mecanismo de pre-autenticación para Kerberos basado en tecnologías como GSS-API y EAP (objetivo 1). Además, incluye la posibilidad de realizar una autorización avanzada mediante la generación y el transporte de una sentencia SAML desde el IdP de la organización origen hasta la infraestructura Kerberos del proveedor de servicios (objetivo 4). • PanaKERB define una alternativa a FedKERB que no requiere la modificación del mecanismo de pre-autenticación de Kerberos, sino que utiliza un protocolo out-of-band con soporte nativo para infraestructuras AAA (en este caso PANA) para realizar la autenticación federada del usuario (objetivo 2). • EduKERB proporciona una arquitectura cross-layer que integra Kerberos con la autenticación realizada durante el acceso a la red (basada en AAA), mediante la utilización de un nuevo mecanismo de pre-autenticación para Kerberos que utiliza el resultado de una ejecución EAP exitosa previa (objetivo 3). Además, esta tesis proporciona un análisis funcional y de rendimiento de las contribuciones (objetivo 5), consistente en la definición de un modelo teórico de rendimiento, la implementación de prototipos para demostrar su viabilidad y la medición de su rendimiento real, basado en la ejecución de estos prototipos. De este análisis se han extraído dos conclusiones principales. En primer lugar, las tres propuestas presentan tiempos de ejecución aceptables (es decir, similares a los que se dan durante el acceso a la red, que sirve como referencia). Además, al haberse implementado y ejecutado en un entorno real, su viabilidad real queda demostrada.
Nowadays identity federations for web applications and for the network access service are widely used and accepted. But, what happens with other kind of applications that do not support these technologies? The objective of this thesis is designing solutions to allow establishing identity federations beyond the web, avoiding the issues shown by the state of the art alternatives. For doing that, this thesis has analyzed and selected a set of technologies associated to access control. These technologies, once integrated, provide the totality of the desired functionality. • Kerberos, to perform the access control to application services, given the great features it has (secure, lightweight, SSO, etc.), its wide deployment, and its extensive range of supported applications and operating systems. • AAA infrastructures, to provide federation substrate, given their wide usage to provide federated access to the network service (e.g. eduroam). • SAML, to provide support for authorization, due to its great history of success and wide deployment for web-based federations. Hence, the general objective of this PhD thesis can be expressed as: To analyse, design, and validate solutions that enable end users to bootstrap Kerberos credentials for a specific service provider, as the result of an authentication process conducted through the AAA-based federation, and an authorization process based on the exchange of SAML statements with the home organization. This objective has been approached in the different ways, depending on the target scenario, and resulting into three more specific sub-objectives: 1. To design a solution allowing the bootstrapping of Kerberos credentials by means of the integration of the Kerberos and AAA infrastructures in the service provider. 2. To design a solution enabling the bootstrapping of Kerberos credentials by means of an auxiliary protocol (out-of-band) which makes use of the AAA infrastructure to authenticate the end user. 3. To design a solution enabling the bootstrapping of Kerberos credentials as a result of the federated authentication to the network service. Besides, the following transversal sub-objectives are defined: 1. To design an authorization model enabling the distribution of authorization information through the AAA infrastructure. 1. To validate the designed solutions by means of analytical models and prototype implementations. In order to accomplish with these objectives, this PhD thesis defines three solutions to the problem stated problem: • FedKERB integrates the Kerberos and AAA infrastructures by means of the definition of a new pre-authentication mechanism for Kerberos based on GSS-API and EAP (objective 1). Besides, it includes the possibility of performing advanced authorization based on the generation and transport of a SAML assertion from the IdP in the home organization to the Kerberos infrastructure in the service provide (objective 4). • PanaKERB defines an alternative to FedKERB that does not require the modification of the Kerberos pre-authentication mechanism. Instead, it makes use of an out-of-band protocol with native support for AAA infrastructures (i.e. PANA) to perform the federated authentication of the end user (objective 2). • EduKERB provides a cross-layer architecture integrating Kerberos with the authentication process performed during the network access process (based on AAA), by means of a new pre-authentication mechanism that makes use of the results of a successful previous EAP authentication (objective 3). Besides, this PhD thesis provides a functional and performance analysis of the aforementioned contributions (objective 5), consisting of the definition of a theoretical performance model, the implementation of prototypes to demonstrate their feasibility, and the actual performance measurement based on these prototypes. To major conclusions have been extracted from the results of this analysis. On the one hand, the three contributions have shown reasonable execution times (i.e. similar to the ones shown for the network access service, used as a reference). Besides, since they have been implemented and executed in a real environment, they feasibility has been proven.
APA, Harvard, Vancouver, ISO, and other styles
7

Bertilsson, Emil, and Sebastian Arvidsson. "Fartygsskydd och rollen som SSO : En kvalitativ undersökning om fartygsskyddet och SSOrollenombord på olika typer av fartyg efter införandet avISPS." Thesis, Linnéuniversitetet, Sjöfartshögskolan (SJÖ), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-52406.

Full text
Abstract:
Detta examensarbete handlar om fartygsskydd och rollen som SSO på olika fartygstyper. Syftet med undersökningen var att ta reda på vilket sätt fartygstypen och fartområdet fartyget går i påverkar hur man ombord arbetar med fartygsskyddet och ISPS. Denna undersökning genomfördes under sommaren och hösten 2015 genom kvalitativa semistrukturerade intervjuer med SSO:erna på fyra fartyg av olika typ i olika fartområden. Fartygen i undersökningen består av ett kryssningsfartyg i oceanfart, ett tankfartyg i europafart, ett biltransportfartyg i oceanfart samt en färja i närfart. Resultatet av vår undersökning visar att det finns skillnader mellan både de undersökta fartygstyperna och fartområdena samt att detta påverkar hur de intervjuade SSO:erna uppfattar sin roll. Resultatet pekar på att den största skillnaden i organiseringen av fartygsskyddet finns mellan de två huvudtyperna av fartyg i studien, dvs. passagerarfartyg och lastfartyg, och att den skillnaden till stor del kan förklaras av besättningens storlek.
This thesis is about ship security and the role of the SSO on different types of vessels. The purpose of the survey was to find out how the ship type and trade area of the ship affects how the on-board work with security and ISPS is conducted. The study was carried out during the summer and autumn 2015 by making qualitative semi-structured interviews with the SSOs on four vessels of different type in different trade areas. The vessels in the survey consist of a cruise ship in ocean traffic, a tanker in European traffic, a car carrier in world-wide ocean traffic and a ferry in short voyage traffic. In the study it was concluded that there are differences between both the investigated vessel types and trade areas, and that this affects how the interviewees: the SSOs perceive their role. The result indicates that the largest difference in the organization of ship security is found between the two main types of vessels in the study, between passenger ships and cargo ships, and that this difference can largely be explained by the size of the crew.
APA, Harvard, Vancouver, ISO, and other styles
8

Calagua, Begazo Gian Carlo. "Propuesta de Gestión por procesos aplicada a la Seguridad y Salud Ocupacional adaptada a la ley N°29783 que permita la integración y desarrollo de los procesos en las MYPES de Lima metropolitana pertenecientes al sector hotelero." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/626456.

Full text
Abstract:
La presente tesis busca diseñar un sistema de gestión con datos reales, tomados de encuestas realizadas a hoteles de lima metropolitana, el enfoque fue puesto en las medianas y pequeñas empresas (MYPES) cuyo potencial de crecimiento es alto, dentro de este desarrollo se propone el sistema de gestión haciendo uso de herramientas de gestión en la ingeniería industrial. El sistema de gestión es basado en las normas OHSAS 18001, así como la legislación peruana Ley 29783 _ Ley de Seguridad y Salud en el Trabajo, buscando, de esta forma, minimizar cualquier riesgo y/o penalidad que pueda sufrir la empresa, maximizando su tiempo de vida, este sistema también busca la interacción con los demás procesos existentes en los hoteles.
This thesis seeks to development a management system using real data, taken from surveys conducted in metropolitan Lima hotels, the focus was placed on medium and small companies whose growth potential is high, within this development is proposed the management system use of management tools in industrial engineering. The management system is based on standards. OHSAS 18001, as well as the Peruvian company Law 29783 _ Occupational Health and Safety Law, looking, in this way, to minimize any risk and/or penalty that the company may suffer, maximizing its life time, this system also seeks interaction with other existing processes in hotels.
Tesis
APA, Harvard, Vancouver, ISO, and other styles
9

Pinto, Telêmaco Janson Mendes. "Caracterização ecológica da herpetofauna de uma Reserva de Sso Sustentável na Amazônia central, Amazonas, Brasil." Universidade Federal do Amazonas, 2011. http://tede.ufam.edu.br/handle/tede/3025.

Full text
Abstract:
Made available in DSpace on 2015-04-13T12:17:42Z (GMT). No. of bitstreams: 1 Telemaco Pinto.pdf: 998560 bytes, checksum: 65f3a9978d657507abaed9d443a009ed (MD5) Previous issue date: 2011-11-04
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
We present here the ecological assessment of the herpetofauna of a sustainable use reserves in the Central Amazonia, Amazonas State, Brazil. Besides the list of species, issues such as potential impacts on the herpetofauna are discussed, as well as the sampling methods employed in the study. The study was conducted during the rainy season in the region with the application of six complementary methods often used this type of study: time limited visual search, pitfall traps with drift fence, collections made by others, occasional collections, hearing record and interviews. We recorded 74 species of amphibians and reptiles included in the orders Anura (33), Testudine (05), Crocodylia (03) and Squamata (33; 17 lizards and 16 snakes). An undescribed genus of lizard family Gymnophtalmidae and four species of frogs of the families Hylidae and Aromobatidae were recorded in this study. Some of the recorded species are cited in the lists of endangered animals such as turtles belonging to the family of Podocnemididae. Apparently consumption by communities is identified as the main threat to turtle populations in this region. Certainly the location of this species list is not complete. This study deals with a point sampling herpetofauna in a region hitherto unknown herpetofaunistic the point of view, and is therefore by the inflow of new information about the area where it was held
Apresentamos aqui a avaliação ecológica da herpetofauna de uma reserva de uso sustentável na Amazônia Central, Estado do Amazonas, Brasil. Além da lista de espécies, questões como os impactos em potencial sobre a herpetofauna são discutidos, bem como os métodos de amostragem empregados no estudo. O trabalho foi realizado durante a estação chuvosa na região com a aplicação de seis métodos complementares frequentemente utilizados neste tipo de estudo: procura visual limitada por tempo, armadilha de interceptação e queda com cerca guia, coletas por terceiros, encontros ocasionais, registro auditivo e entrevistas. Foram registradas 74 espécies entre anfíbios e répteis incluídas nas ordens Anura (33), Testudines (05), Crocodylia (03) e Squamata (33; 17 lagartos e 16 serpentes). Um gênero de lagarto da família Gymnophtalmidae e quatro espécies de anuros das famílias Aromobatidae e Hylidae ambos não descritos foram registrados neste estudo. Algumas das espécies registradas são citadas nas listas de animais ameaçados de extinção como é o caso dos quelônios pertencentes à família Podocnemididae. Aparentemente o consumo pelas comunidades tradicionais é apontado como a principal ameaça às populações de quelônios nesta região. Certamente a lista de espécies desta localidade não está completa. O estudo trata de uma amostragem pontual 24 da herpetofauna de uma região até então desconhecida do ponto de vista herpetofaunístico, justificando-se assim pelo aporte de informações inéditas sobre a área onde foi realizado. Palavras-chave: anfíbios, répteis, diversidade, conservação, Amazonas, Brasil
APA, Harvard, Vancouver, ISO, and other styles
10

Panasiuk, Oleksandr. "Towards better practices in detection of wastewater pollution in stormwater sewers and volume estimation of SSO discharges." Licentiate thesis, Luleå tekniska universitet, Arkitektur och vatten, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17406.

Full text
Abstract:
Separate sewerage systems are designed so that the wastewater and stormwater are carried separately. However, in practice, untreated wastewater discharges to receiving waters are not that rare, impairing the quality of the receiving waters and increasing the risks to public health and aquatic organisms. The two main causes for such discharges are wastewater that enters stormwater sewers as well as sanitary sewer overflows (SSOs) from the separate wastewater sewers. The overall aim of this licentiate thesis is to review and improve the strategies used for detection of wastewater inputs to stormwater sewers and their location, and to address the issue of quantification of untreated wastewater discharges into the receiving waters by developing two methods: one for SSO discharges and one for the estimation of the wastewater amounts in stormwater sewers.A review of methods for detecting the entry of wastewater into stormwater sewers and the location of the entry points has been carried out by a critical literature review of the effectiveness of the current methods, their advantages, weaknesses and limitations in use. Additionally, an evaluation of the factors affecting the performance of a selected number of methods has been made from specially designed field studies, focusing on detectability of certain indicative pollution parameters and the effects of travel distance. The parameters selected based on those identified as being potentially the most useful in the literature review were E. coli, total coliform, Enterococci, conductivity, turbidity, TSS, and ammonium.The estimation of the volumes of untreated wastewater discharged into receiving waters was addressed by developing two methods: (1) volume estimation of SSO discharges based on already available infrastructure—backflow preventing flap gates—by performing full-scale studies to establish flow rating curves as a function of water head; and (2) estimation of wastewater ingress volumes into a stormwater system by using data from field studies as input to a Monte Carlo simulation to generate the probability distribution of possible fractions of wastewater in stormwater sewers.The reviewed indicator parameters and methods all demonstrated potential for detecting stormwater contamination by wastewater. However, there was no single method or strategy that would work under all conditions investigated. Human waste specific indicators—microbiological (adopted in microbial source tracking methods) and chemical markers (e.g., caffeine and carbamazepine)—as well as the Distributed Temperature Sensing method provided the best indication of wastewater pollution in the literature. However, these methods are currently beyond the capabilities of typical municipal expertise due to their costs and/or complexity and, therefore, combinations of methods that minimise the limitations of individual approaches have been identified in this thesis as the most effective provided these are tailored to specific cases.The travel distance from the point at which the wastewater entered the stormwater sewer is an important factor affecting the detectability of the investigated parameters, as the concentrations of the indicator parameters may change along the sewer length due to dilution, dispersion, physical, chemical, and microbiological processes. A Maximum Detection Distance (MDD) away from the origin of the input was determined which was in general shorter for the microbiological parameters than for the physicochemical parameters. Among the microorganisms analysed, Enterococci showed the shortest MDD of about 330–550 m, and E. coli — the longest of about 635–1245 m. Of the physicochemical parameters, the shortest MDD was for TSS (800–1130 m) and the longest for conductivity (1220–1560 m). MDD itself is not the main factor for selecting what parameters should be used, but rather how the sampling strategy for a particular parameter should be planned.The full-scale experiments on circular flap gates provided flow-rating curves for diameters of 200, 300, 400, 500 and 600 mm with high precision (R2>0.99). There are a large number of such gates installed in Sweden and the flow rating curves developed in this study could help practitioners to monitor SSO discharges with minimal onsite measurements (water head before and after the flap gate) in a reliable and inexpensive way.From the field study results, an equation was developed to estimate the volume of wastewater entering into the stormwater sewer. Monte Carlo simulation was selected as a means to increase the robustness of the outcome of the developed equation. The results of the simulation showed that the efficiency of the suggested method varied to a great extent depending on the selected combination of parameters: for example, for TSS and conductivity the percent error between the most probable and actual wastewater fractions in the sewer was less than 2%, while TSS combined with microbiological parameters failed as a combination to estimate the wastewater fraction in sewer.

Godkänd; 2015; 20151102 (olepan); Nedanstående person kommer att hålla licentiatseminarium för avläggande av teknologie licentiatexamen. Namn: Oleksandr Panasiuk Ämne: VA-teknik/Urban Water Engineering Uppsats: Towards Better Practices in Detection of Wastewater Pollution in Stormwater Sewers and Volume Estimation of SSO Discharges Examinator: Professor Maria Viklander, Institutionen för samhällsbyggnad och naturresurser, Avdelning: Arkitektur och vatten, Luleå tekniska universitet. Diskutant: Professor Sveinung Sægrov, NTNU Department of Hydraulic and Environmental Engineering. Tid: Onsdag 9 december, 2015 kl 10.00 Plats: E632, Luleå tekniska universitet

APA, Harvard, Vancouver, ISO, and other styles
11

Miranda, Luís Henrique Fernandes Moura. "Context-aware multi-factor authentication." Master's thesis, Faculdade de Ciências e Tecnologia, 2009. http://hdl.handle.net/10362/4111.

Full text
Abstract:
Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática
Authentication systems, as available today, are inappropriate for the requirements of ubiquitous, heterogeneous and large scale distributed systems. Some important limitations are: (i) the use of weak or rigid authentication factors as principal’s identity proofs, (ii) non flexibility to combine different authentication modes for dynamic and context-aware interaction criteria, (iii) not being extensible models to integrate new or emergent pervasive authentication factors and (iv) difficulty to manage the coexistence of multi-factor authentication proofs in a unified single sign-on solution. The objective of this dissertation is the design, implementation and experimental evaluation of a platform supporting multi-factor authentication services, as a contribution to overcome the above limitations. The devised platform will provide a uniform and flexible authentication base for multi-factor authentication requirements and context-aware authentication modes for ubiquitous applications and services. The main contribution is focused on the design and implementation of an extensible authentication framework model, integrating classic as well as new pervasive authentication factors that can be composed for different context-aware dynamic requirements. Flexibility criteria are addressed by the establishment of a unified authentication back-end, supporting authentication modes as defined processes and rules expressed in a SAML based declarative markup language. The authentication base supports an extended single sign-on system that can be dynamically tailored for multi-factor authentication policies, considering large scale distributed applications and according with ubiquitous interaction needs.
APA, Harvard, Vancouver, ISO, and other styles
12

Romanelli, Matteo. "Un sistema di ticketing per i tecnici del Dipartimento di Informatica." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/4488/.

Full text
Abstract:
Il documento fa un introduzione sui sistemi di ticketing e sul sistema di autenticazione SSO, per poi passare a descrivere nel dettaglio il sistema OTRS, la sua installazione, la sua configurazione, la sua customizzazione e l'integrazione di questo con il nuovo sistema di autenticazione di Ateneo (SSO).
APA, Harvard, Vancouver, ISO, and other styles
13

Mokitlane, Ofentse Clifford. "Exploratory study : how do Somali shop owners (SSO) succeed in running businesses in Soweto : a South African perspective." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1015653.

Full text
Abstract:
This is a qualitative study which seeks to understand how Somali shop owners run successful businesses in the township of Soweto in South Africa. This research report has three sections, namely (1) the academic paper which comprises a shortened literature review, the research method, findings, and the discussion; (2) an extended literature review and (3) the research methodology. It is important to mention that these three sections are related and not necessarily stand-alone sections. Despite the hostilities faced by the Somali shop owners from the host communities in South Africa, it is notable that they are successful, small-sized entrepreneurs in most townships of South Africa (SA). Previous research on Somalis has predominantly focused on their assimilation into the societies in their host countries, and on how they are led into self-employment because of the unfavourable labour markets in the host country. In this vein, there is a need to understand how they run successful businesses in the townships of SA. This study seeks to answer the following research question: How Do Somali Shop Owners Succeed in Running Businesses in Soweto, South Africa (SA)? In pursuit of answers to the above research question, this study was confined to three locations in Soweto, namely Orlando West, Chiawelo and Rockville which have a relatively high number of Somali entrepreneurs who have been in operation for longer than three years. This qualitative study explored the multiple perspectives of reality of Somali shop owners. Purposively, 14 Somali shop owners were identified initially using purposive sampling. Subsequently, theoretical sampling was used to identify Somali shop owners who were interviewed regarding how they successfully run their businesses in the locations of Orlando West, Chiawelo and Rockville in the township of Soweto. A total of eighteen semi-structured, in-depth and face-to-face interviews were conducted with these shop owners as a means of gathering data to the point of saturating their perspectives. Data collection ceased when new perspectives were no longer evident as interviewees were being repetitive. Open-coding and constant comparison was used to analyse the data. The findings of the study show that ethnicity plays a predominant role in the success of the Somali shop owners. The intra-ethnic networks and trust-based support systems are pivotal to how Somali shop owners run successful businesses in Soweto. The key findings manifested showed that various forms of support came from Somali communities, family and fellow countrymen which were also central to their success. Another key finding showed that Somali shop owners run their businesses by complementing, rather than predominantly competing with the other local businesses, which ultimately differentiates them in this way. The study also revealed that responsiveness to local customer needs by enhancing the value of their business to the locality is also characteristic of how Somali shop owners build customer loyalty. This study contributes to our understanding of how Somali entrepreneurs conduct successful businesses in a hostile host country. The findings have implications for business development training and programmes which support immigrant entrepreneurs. The findings may also be extended to inform how business development programmes would be designed to equally support local entrepreneurs.
APA, Harvard, Vancouver, ISO, and other styles
14

Topal, Baran. "Comparison of Methods of Single Sign-On : Post authentication methods in single sign on." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-183144.

Full text
Abstract:
Single sign-on (SSO) is a session verification mechanism that allows a client to use a single password and name combination to be able to access multiple applications. The mechanism validates the client for all the applications and eliminates the need for authentication prompts when a user switches between applications within a session. SSO mechanisms can be classified as software versus hardware or customer-requirements oriented versus server-side arrangements. The five commonly used mechanisms of Single Sign-On currently are: Web Single Sign-On, Enterprise Single Sign-On, Kerberos (or Ticket/Token Authentication), Open ID, and Federation or Federated Identity. SSO has the main benefit of allowing a user to access many different systems without having to log on to each and every one of them separately. However, SSO introduces a security risk as once an attacker gains access to a single system, then the attacker has access to all of the systems. This thesis describes SSO technology, the Security Assertion Markup Language, and the advantages and risks involved in using SSO. It examines authentication mechanisms and their suitability for SSO integration. The main emphasis is a description of a mechanism that ameliorates some of the disadvantages of SSO by monitoring the user behavior with respect to a template. If a user performs actions that fit the defined template behavior, then the post authentication mechanism will not get activated. If, on the other hand, a user does something unforeseen, the mechanism will not perform authentication for this user, but rather trigger manual authentication. If this manual authentication succeeds, then the user will continue to interact with the system, otherwise user session will be ended. This behavior extension authentication mechanism is a method that eases the authentication process in which users are not expected to remember any username and password that can be forgotten easily or have a biometric attribute that can change over time. This method can be integrated to existing web application without a major risk and increase in cost.
Single sign-on (SSO) är en sessionkontrollmekanism som gör det möjligt för en kund att använda en ett enda par av lösenord och namn för att kunna få tillgång till flera olika program. Mekanismen validerar klienten för alla anrop och eliminerar behovet av ytterligare inloggningsdialoger när en användare växlar mellan program inom en session. SSO-mekanismer kan klassificeras enligt olika kriterier, såsom programvara kontra hårdvara eller kunder krav orienterade mot serversidan arrangemang. De fem vanligen använda mekanismerna för Single Sign-On är närvarande: Web Single Sign-On Enterprise Single Sign-On, Kerberos (eller Token autentisering), Open ID och Federation eller Federated Identity. SSO har den stora fördelen att en användare kan få tillgång till många olika system utan att behöva logga in på vart och ett av dem separat. Men SSO inför också en säkerhetsrisk i och med att tillgång till ett enda av systemen också automatiskt innebär tillgång till samtliga. Denna avhandling beskriver SSO-teknik, Security Assertion Markup Language, och fördelarna och riskerna med att använda SSO, samt undersöker autentiseringsmekanismer och deras lämplighet för SSO integration. Tyngdpunkten är en beskrivning av en mekanism som minskar några av nackdelarna med SSO genom att övervaka användarnas beteende med avseende på en mall. Om en användare utför åtgärder som passar det beteende som beskrivs av mallen, då den föreslagna mekanismen kommer att hantera autentiseringen automatiskt. Om, å andra sidan, en användare gör något oförutsett, kommer mekanismen inte att automatiskt utföra autentisering för den här användaren, utan utlöser manuellt autentisering. Om denna manuella autentiseringen lyckas, så kan användare fortsätta att fortsätta att interagera med systemet, annars kommer användarsessionen att avslutas. Denna beteendebaserade utvidgning av autentiseringsmekanismen är en lovande metod som minskar behovet av att komma ihåg många namn och lösenord, utan att lämna delsystem öppna till de säkerhetsproblem som uppstår i ren SSO, och utan att vara beroende av biometriska egenskaper som kan förändras över tiden. Denna metod kan integreras med befintliga webbaserade lösningar utan ökad risk och ökade kostnader.
APA, Harvard, Vancouver, ISO, and other styles
15

Hellberg, Axel. "Autentisering, hantering och provisionering av användare : Ett koncepttest med PhenixID." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42158.

Full text
Abstract:
The goal of this project has been to configure and present a solution that covers a customer’s needs for user authentication, identity and access management and identity provisioning. The solution consists of products from PhenixID and the configuration is carried out on behalf of a company acting as a consultant. At the same time, the project is intended to generate new knowledge within the company about the possibilities and functions of the products used. The resulting solution enables the provisioning of users from a simple CSV file to a central user directory, and from this directory to Google. Identity Provisioning software is used for this purpose. The solution includes a recommendation for the same process to Azure through a first-party solution from Microsoft. The solution includes a configuration of the PhenixID Authentication Services system that can be used by the provisioned users to log in to Google and Microsoft services, so-called single sign-on, SSO. This authentication is SAML-based and adopts multi-factor authentication through a mobile application. A web-based and role-based identity and access management system, Identity Manager, is configured to manage users in the central user directory. Through this system, roles with associated rights are used with the purpose of delegating user management to the necessary instances of the customer’s organization. The overall configuration represents a proof of concept of the products for the customer's use cases and is therefore relatively fundamental in nature.
Målet med detta arbete har varit att konfigurera och presentera en lösning som omfattar en kunds behov av system för autentisering, hantering och provisionering av användare. Lösningen tillämpar produkter från PhenixID och konfigurationsarbetet sker på uppdrag av en verksamhet som här agerar konsult åt kunden. Arbetet ämnar samtidigt att ge upphov till ny kunskap inom verksamheten om de tillämpade verktygens möjligheter och funktioner. Den resulterande lösningen möjliggör provisionering av användare från en enkel CSV-fil till ett central användarkatalog, via denna katalog till Google. Till detta används programvaran Identity Provisioning. Lösningen omfattar en rekommendation för samma process till Azure genom ett första-partslösning från Microsoft. Lösningen omfattar konfiguration av autentiseringssystemet PhenixID Authentication Services som kan användas av de provisionerade användarna till att logga in på tjänster från Google och Microsoft, så kallad single sign-on, SSO. Denna autentisering är SAML-baserad och tillämpar multifaktorsautentisering genom en mobilapplikation. Ett webbaserat system för rollbaserad användarhantering, Identity Manager, konfigureras till att hantera användare i den centrala användarkatalogen. Genom detta system tillämpas roller med associerade rättigheter vars syfte är att delegera användarhanteringen till de nödvändiga instanserna av en verksamhet. Den sammantagna konfigurationen utgör ett koncepttest av produkterna för kundens användningsområden och är därför relativt grundläggande till naturen.
APA, Harvard, Vancouver, ISO, and other styles
16

Jenčík, Štěpán. "Autentizace v informačních systémech." Master's thesis, Česká zemědělská univerzita v Praze, 2017. http://www.nusl.cz/ntk/nusl-260529.

Full text
Abstract:
This thesis is focused on authentication methods, for regular private users and company solutions. Based on the analysis of individual authentication methods discussed in a theoretical part, the most suitable solutions are chosen. The practical part then offers various solutions divided into categories based on the users profiles. This presented overview suggests possible follow up discussion topics and an outline of the future development in the area of authentication methods and tools.
APA, Harvard, Vancouver, ISO, and other styles
17

Pellegrino, Giancarlo. "Détection d'anomalies logiques dans les logiciels d'entreprise multi-partis à travers des tests de sécurité." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0064/document.

Full text
Abstract:
Les logiciels multi-partis sont des applications distribuées sur le web qui mettent en oeuvre des fonctions collaboratives. Ces applications sont les principales cibles des attaquants qui exploitent des vulnérabilités logicielles dans le cadre d'activités malveillantes. Récemment, un type moins connu de vulnérabilité, les anomalies logiques, a attiré l'attention des chercheurs. Sur la base d'informations tirées de la documentation des applications, il est possible d'appliquer deux techniques de test: la vérification du modèle, autrement appelé ``model checking'', et les tests de sécurité de type ``boîte noire''. Le champs d'application du model checking ne prend pas en suffisamment en compte les implémentations actuelles, tandis que les tests de type boîte noire ne sont pas assez sophistiqués pour découvrir les vulnérabilités logique. Dans cette thèse, nous présentons deux techniques d'analyse modernes visant à résoudre les inconvénients de l'état de l'art. Pour commencer, nous présentons la vérification de deux protocoles de sécurité utilisant la technique du model checking. Ensuite, nous nous concentrons sur l'extension du model checking pour soutenir les tests automatisés d'implémentations. La seconde technique consiste en une analyse boîte noire qui combine l'inférence du modèle, l'extraction du processus et du flot de donnée, ainsi qu'une génération de tests basés sur les modèles d'attaque d'une application. En conclusion, nous discutons de l'application de techniques développées au cours de cette thèse sur des applications issues d'un contexte industrielle
Multi-party business applications are distributed computer programs implementing collaborative business functions. These applications are one of the main target of attackers who exploit vulnerabilities in order to perform malicious activities. The most prevalent classes of vulnerabilities are the consequence of insufficient validation of the user-provided input. However, the less-known class of logic vulnerabilities recently attracted the attention of researcher. According to the availability of software documentation, two testing techniques can be used: design verification via model checking, and black-box security testing. However, the former offers no support to test real implementations and the latter lacks the sophistication to detect logic flaws. In this thesis, we present two novel security testing techniques to detect logic flaws in multi-party business applicatons that tackle the shortcomings of the existing techniques. First, we present the verification via model checking of two security protocols. We then address the challenge of extending the results of the model checker to automatically test protocol implementations. Second, we present a novel black-box security testing technique that combines model inference, extraction of workflow and data flow patterns, and an attack pattern-based test case generation algorithm. Finally, we discuss the application of the technique developed in this thesis in an industrial setting. We used these techniques to discover previously-unknown design errors in SAML SSO and OpenID protocols, and ten logic vulnerabilities in eCommerce applications allowing an attacker to pay less or shop for free
APA, Harvard, Vancouver, ISO, and other styles
18

Kirchner, Peter. "Verteilte Autorisierung innerhalb von Single Sign-On-Umgebungen : Analyse, Architektur und Implementation eines Frameworks für verteilte Autorisierung in einer ADFS-Umgebung." Master's thesis, Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2008/2228/.

Full text
Abstract:
Aktuelle Softwaresysteme erlauben die verteilte Authentifizierung von Benutzern über Ver-zeichnisdienste, die sowohl im Intranet als auch im Extranet liegen und die über Domänen-grenzen hinweg die Kooperation mit Partnern ermöglichen. Der nächste Schritt ist es nun, die Autorisierung ebenfalls aus der lokalen Anwendung auszulagern und diese extern durchzu-führen – vorzugsweise unter dem Einfluss der Authentifizierungspartner. Basierend auf der Analyse des State-of-the-Art wird in dieser Arbeit ein Framework vorges-tellt, das die verteilte Autorisierung von ADFS (Active Directory Federation Services) authenti-fizierten Benutzern auf Basis ihrer Gruppen oder ihrer persönlichen Identität ermöglicht. Es wird eine prototypische Implementation mit Diensten entwickelt, die für authentifizierte Be-nutzer Autorisierungsanfragen extern delegieren, sowie ein Dienst, der diese Autorisierungs-anfragen verarbeitet. Zusätzlich zeigt die Arbeit eine Integration dieses Autorisierungs-Frameworks in das .NET Framework, um die praxistaugliche Verwendbarkeit in einer aktuel-len Entwicklungsumgebung zu demonstrieren. Abschließend wird ein Ausblick auf weitere Fragestellungen und Folgearbeiten gegeben.
Current software systems allow distributed authentication of users using directory services, which are located both in the intranet and in the extranet, to establish cooperation with part-ners over domain boundaries. The next step is to outsource the authorization out of the local applications and to delegate the authorization decisions to external parties. In particular the authorization request is back delegated to the authentication partner. Based on an analysis of the state of the art this paper presents a framework which allows the distributed authorisation of ADFS authenticated users. The authorization decisions are based on the user’s identity and groups. In this work there will be developed a prototypical imple-mentation of services which are capable of delegating authorization requests. Additionally, this work points out the integration of these services into the .NET framework to demonstrate the usability in a modern development environment. Finally there will be a prospect of further questions and work.
APA, Harvard, Vancouver, ISO, and other styles
19

Musolesi, Nicolò. "Sviluppo di un software per la valutazione della porzione di sfera celeste osservabile da un satellite LEO con payload astronomico." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cakir, Ece. "Single Sign-On : Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-24377.

Full text
Abstract:
Main concern of this thesis is to help design a secure and reliable network system which keeps growing in complexity due to the interfaces with multiple logging sub-systems and to ensure the safety of the network environment for everyone involved. The parties somewhat involved in network systems are always in need of developing new solutions to security problems and striving to have a secure access into a network so as to fulfil their job in safe computing environments. Implementation and use of SSO (Single Sign-On) offering secure and reliable network in complex systems has been specifically defined for the overall security aspects of enterprises. The information to be used within and out of organization was structured layer by layer according to the organizational needs to define the sub-systems. The users in the enterprise were defined according to their role based profiles. Structuring the information layer by layer was shown to improve the level of security by providing multiple authentication mechanisms. Before implementing SSO system necessary requirements are identified. Thereafter, user identity management and different authentication mechanisms were defined together with the network protocols and standards to insure a safe exchange of information within and outside the organization. A marketing research was conducted in line of the SSO solutions. Threat and risk analysis was conducted according to ISO/IEC 27003:2010 standard. The degree of threat and risk were evaluated by considering their consequences and possibilities. These evaluations were processed by risk treatments. MoDAF (Ministry of Defence Architecture Framework) used to show what kind of resources, applications and the other system related information are needed and exchanged in the network. In essence some suggestions were made concerning the ideas of implementing SSO solutions presented in the discussion and analysis chapter.
APA, Harvard, Vancouver, ISO, and other styles
21

Mezzetti, Cristian. "Progettazione e implementazione di un servizio di autenticazione a più fattori per i servizi dell'ateneo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9593/.

Full text
Abstract:
I sistemi di autenticazione con secondo fattore permettono una migliore protezione dell'identità digitale degli utenti. Questo lavoro descrive l'analisi e progettazione della soluzione di autenticazione a più fattori da integrare nel sistema di Ateneo, conclusasi con lo sviluppo del modulo di integrazione tra il servizio di autenticazione Web Single Sign-On dell'Università di Bologna (ADFS 3.0) e la piattaforma scelta per la fornitura (Time4ID). L'integrazione è stata effettuata programmando un Authentication Provider, costituito da una libreria di integrazione scritta in C#, capace di integrarsi con la piattaforma cloud-based di verifica del secondo fattore.
APA, Harvard, Vancouver, ISO, and other styles
22

P, Svensson Gustav, and Filip Eriksson. "En säkerhetsanalys och jämförelse av SAML och OAuth." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166571.

Full text
Abstract:
Vi har utfört en jämförelse av två populära SSO protokoll, OAuth och SAML. Detta för att göra valet av protokoll enklare för företag. Två simplistiska SSO-implementationer har utvecklats för att testa säkerheten av de två protokollen. En simplistisk SSO-implementation betyder i detta fallet att inga säkerhetsfunktioner har lagts till utöver vad protokollen kräver. Tre attacker har utförts: 307 redirect attack, Man in the middle och Replay attack. Resultatet visar att en simplistisk SAML implementation är säkrare än en simplistisk OAuth implementation. Vidare arbete krävs dock för att få en bättre bild av säkerheten för de olika protokollen.
APA, Harvard, Vancouver, ISO, and other styles
23

Hedmark, Alice. "Undersökning av webbsidors säkerhet vid användning avFacebook Login : Vidareutveckling och analys av OAuthGuard." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36859.

Full text
Abstract:
Single Sign-On (SSO) är en autentiseringsprocess som tillåter en utvecklare att delegera autentiseringsansvaret till en dedikerad tjänst. OAuth 2.0 är ett auktoriseringsramverk som ofta står som grund för ett autentiseringslager som i sin tur möjliggör SSO. En identitetsleverantör är tjänsten som står för hantering av användaruppgifterna och autentiseringen, två vanliga identitetsleverantörer är Google och Facebook som i sin tur implementerar SSO med hjälp utav autentiseringslagren OpenID Connect respektive Facebooks egna autentiseringslager. Det har visat sig att många klienter som ska utnyttja SSO med OAuth 2.0 implementerar det fel så att säkerhetsbrister uppstår, studier har utförts med förslag till lösningar men många bristande implementationer fortsätter produceras och existera. Att skapa diverse verktyg för att främja säkerhet i dessa sammanhang är en metod där OAuthGuard utvecklats med visionen att även kunna skydda användaren, direkt från en webbläsare. OAuthGuard har även tidigare använts för att analysera säkerheten med Google SSO och visat att 50% av undersökta klienter har brister, men motsvarande studie eller verktyg saknas för Facebook SSO. Denna studie gjorde en motsvarande undersökning för Facebook SSO-klienter med en vidareutvecklad version av OAuthGuard och fann att de lider av brister med liknande trend som tidigare studies resultat mot Google-SSO-klienter, men att färre Facebook- SSO-klienter har brister i jämförelse. Vid vidareutvecklingen av OAuthGuard upptäcktes ett antal svårigheter och framtiden för denna typ av verktyg behöver vidare analyseras. Vidare analys behöver även göras för att bedöma om Facebook-SSO kan vara att föredra över Google-SSO ur säkerhetsperspektiv samt vidare utforskande av nya säkerhetsfrämjande metoder behöver utföras.
Single Sign-On (SSO) is an authentication process that allows a developer to delegate the authentication responsibility to a dedicated service. OAuth 2.0 is an authorization framework that often serves as a base for authentication layers to be built upon that in turn allows for SSO. An identity provider is the service that is responsible for handling user credentials and the authentication, two common identity providers are Google and Facebook that implement SSO with the authentication layers OpenID Connect respectively Facebooks own authentication layer. It has been shown that many clients using OAuth 2.0 as base for SSO make faulty implementations leading to security issues, a number of studies has proposed solutions to these issues but faulty implementations are continually being made. To create various tools to promote security in these contexts is a method where OAuthGuard has been developed with the vision to also directly protect the common website user directly from the browser. OAuthGuard has been used in an earlier study to analyze the security of clients using Google SSO and discovered that 50% of the analyzed clients had flaws, no comparable study has been done for clients using Facebook SSO, which is the second largest third party log in variant. This study made a comparable investigation for Facebook SSO clients with a further developed version of OAuthGuard and found that these clients suffer from flaws with a similar trend as the previous study with Google-SSO clients, although fewer Facebook-SSO clients suffer from these flaws. When further developing OAuthGuard a dumber of difficulties was discovered and the future of these kind of tools needs to be investigated. Further analysis needs to be done to assess if Facebook-SSO should be recommended over Google-SSO from a security perspective and also further exploration of new methods to promote security needs to be done.
APA, Harvard, Vancouver, ISO, and other styles
24

Лісачук, Георгій Вікторович, Руслан Вікторович Кривобок, Ярослав Миколайович Пітак, П. П. Вабіщевич, and О. П. Карпович. "Геометро-топологічна характеристика фаз системи SrO – TiO₂ – SiO₂." Thesis, Діса Плюс, 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Пітак, Ярослав Миколайович, Георгій Вікторович Лісачук, Руслан Вікторович Кривобок, А. П. Гребенюк, and Л. С. Лимаренко. "Термодинамічний аналіз реакцій у системі SrO – TiO₂ – SiO₂." Thesis, Діса Плюс, 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Питак, Ярослав Николаевич, Георгий Викторович Лисачук, А. П. Гребенюк, and П. С. Кораблева. "Термодинамический анализ реакций в системе SrO – TiO₂ – SiO₂." Thesis, Національний технічний університет України "Київський політехнічний інститут" ім. Ігоря Сікорського, 2017. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Nop, Dominik. "Vylepšení architektury systému správy identit ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399861.

Full text
Abstract:
The master thesis focuses on assessment of current implementation of identity management system and proposal of a new implementation to increase level of stability and information security in the company, primarily regarding the systems that process financial data. In first part, basic theoretical knowledge related to identity management systems is defined. In second part, an analysis of current system state is performed. Based on this analysis, new organizational and technical solutions are proposed to the company. Finally, an implementation project proposal as well as with risk analysis and economic evaluation is completed in the end of this thesis.
APA, Harvard, Vancouver, ISO, and other styles
28

Rasiwasia, Akshay. "A Framework To Implement OpenID Connect Protocol For Federated Identity Management In Enterprises." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64848.

Full text
Abstract:
Federated Identity Management (FIM) and Single-Sign-On (SSO) concepts improve both productivity andsecurity for organizations by assigning the responsibility of user data management and authentication toone single central entity called identity provider, and consequently, the users have to maintain only oneset of credential to access resources at multiple service provider. The implementation of any FIM and SSOprotocol is complex due to the involvement of multiple organizations, sensitive user data, and myriadsecurity issues. There are many instances of faulty implementations that compromised on security forease of implementation due to lack of proper guidance. OpenID Connect (OIDC) is the latest protocolwhich is an open standard, lightweight and platform independent to implement Federated IdentityManagement; it offers several advantages over the legacy protocols and is expected to have widespreaduse. An implementation framework that addresses all the important aspects of the FIM lifecycle isrequired to ensure the proper application of the OIDC protocol at the enterprise level. In this researchwork, an implementation framework was designed for OIDC protocol by incorporating all the importantrequirements from a managerial, technical and security perspective of an enterprise level federatedidentity management. The research work closely follows the design science research process, and theframework was evaluated for its completeness, efficiency, and usability.
APA, Harvard, Vancouver, ISO, and other styles
29

Pellegrino, Giancarlo. "Détection d'anomalies logiques dans les logiciels d'entreprise multi-partis à travers des tests de sécurité." Electronic Thesis or Diss., Paris, ENST, 2013. http://www.theses.fr/2013ENST0064.

Full text
Abstract:
Les logiciels multi-partis sont des applications distribuées sur le web qui mettent en oeuvre des fonctions collaboratives. Ces applications sont les principales cibles des attaquants qui exploitent des vulnérabilités logicielles dans le cadre d'activités malveillantes. Récemment, un type moins connu de vulnérabilité, les anomalies logiques, a attiré l'attention des chercheurs. Sur la base d'informations tirées de la documentation des applications, il est possible d'appliquer deux techniques de test: la vérification du modèle, autrement appelé ``model checking'', et les tests de sécurité de type ``boîte noire''. Le champs d'application du model checking ne prend pas en suffisamment en compte les implémentations actuelles, tandis que les tests de type boîte noire ne sont pas assez sophistiqués pour découvrir les vulnérabilités logique. Dans cette thèse, nous présentons deux techniques d'analyse modernes visant à résoudre les inconvénients de l'état de l'art. Pour commencer, nous présentons la vérification de deux protocoles de sécurité utilisant la technique du model checking. Ensuite, nous nous concentrons sur l'extension du model checking pour soutenir les tests automatisés d'implémentations. La seconde technique consiste en une analyse boîte noire qui combine l'inférence du modèle, l'extraction du processus et du flot de donnée, ainsi qu'une génération de tests basés sur les modèles d'attaque d'une application. En conclusion, nous discutons de l'application de techniques développées au cours de cette thèse sur des applications issues d'un contexte industrielle
Multi-party business applications are distributed computer programs implementing collaborative business functions. These applications are one of the main target of attackers who exploit vulnerabilities in order to perform malicious activities. The most prevalent classes of vulnerabilities are the consequence of insufficient validation of the user-provided input. However, the less-known class of logic vulnerabilities recently attracted the attention of researcher. According to the availability of software documentation, two testing techniques can be used: design verification via model checking, and black-box security testing. However, the former offers no support to test real implementations and the latter lacks the sophistication to detect logic flaws. In this thesis, we present two novel security testing techniques to detect logic flaws in multi-party business applicatons that tackle the shortcomings of the existing techniques. First, we present the verification via model checking of two security protocols. We then address the challenge of extending the results of the model checker to automatically test protocol implementations. Second, we present a novel black-box security testing technique that combines model inference, extraction of workflow and data flow patterns, and an attack pattern-based test case generation algorithm. Finally, we discuss the application of the technique developed in this thesis in an industrial setting. We used these techniques to discover previously-unknown design errors in SAML SSO and OpenID protocols, and ten logic vulnerabilities in eCommerce applications allowing an attacker to pay less or shop for free
APA, Harvard, Vancouver, ISO, and other styles
30

Захаров, Артем Вячеславович. "Радіопрозорі керамічні матеріали на основі системи SrO – Al₂O₃ – SiO₂." Thesis, НТУ "ХПІ", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/36526.

Full text
Abstract:
Дисертація на здобуття наукового ступеня кандидата технічних наук (доктора філософії) за спеціальністю 05.17.11 – технологія тугоплавких неметалічних матеріалів. – Національний технічний університет "Харківський політехнічний інститут", Харків, 2018 р. Дисертацію присвячено розробці керамічних РПМ на основі кристалічної фази – славсоніту зі зниженою температурою синтезу. Створено базу для термодинамічного аналізу реакцій фазоутворення в системі SrO – Al₂O₃ – SiO₂. Здійснено комплексне дослідження процесу синтезу славсоніту та визначено нестехіометричне співвідношення оксидів в полі первинної кристалізації славсоніту, що забезпечує синтез славсоніту при температурі до 1250 °С. Досліджено вплив однокомпонентних і багатокомпонентних евтектичних інтенсифікуючих добавок на процеси спікання та фазоутворення славсонітової кераміки. З використанням нових даних розроблено склади та технологічні параметри виготовлення керамічних РПМ з заданими функціональними властивостями (ε = 3,57…5,26, tgδ = 0,0073…0,0122) та підвищеним ресурсом експлуатації. Проведено лабораторні та промислові випробовування на підприємствах та розроблено практичні рекомендації щодо використання результатів.
Thesis for the degree of Candidate of Technical Sciences (pre-Ph.D. in Philosophy), specialty 05.17.11 – technology of refractory non-metallic materials. – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2018 The thesis is devoted to the development of radio-transparent ceramic materials on the basis of the crystalline phase – slavsonite the synthesis of which is carried out at a reduced temperature. A database was created for the thermodynamic analysis of phase formation reactions in the SrO – Al₂O₃ – SiO₂ system. The process of solid-phase synthesis of slavsonite was thoroughly investigated and possible ways of the reaction of formation of slavsonite from different intermediate compounds were found. It has been established that due to the formation of intermediate silicon strontium from 400 and 500 °C (Sr₂SiO₄ and SrSiO₃ respectively), the synthesis of slavsonite begins at 1200 °C. In the case of the formation of strontium aluminates Sr₃Al₂O₆ and SrAl₂O₄ (in the case of SiO₂ deficiency), the synthesis of slavsonite occurs after crystallization and subsequent decomposition of Sr-gelite at a temperature of ~ 1600 °C. Within primary slavsonite crystallization in SrO – Al₂O₃ – SiO₂ systems non-stechiometric composition (SrAl₂,₀₃₄Si₃,₁₀₈O₁₀,₂₆₇), that ensures the synthesis of the slavsonite at temperatures up to 1250 °С, were found. The influence of single-component (SnO₂, Cr₂O₃, Li₂O, ZrSiO₄, TiO₂, B₂O₃, MoO₃, CaF₂) and multicomponent eutectic (LiF : NaF, LiF : KF, KF : NaF, LiF : KF : NaF, Li₂O : SnO₂) additives on the intensification of sintering and phase formation processes of slavonite ceramics was studied. The patternes of the formation of microstructure and phase composition of low temperature radio-transparent ceramics in the presence of additives of complex intensifiers which enables the formation of eutectic alloys, and the reduction of the temperature of the formation of the slavonite phase are established. The influence of the Li₂O additive (2% by weight over 100% by weight) on the formation of the non - stoichiometric composition of slavsonite, and Li₂O : SnO₂ eutectic additive (in the amount of 1 mass % over 100 mass %) for the synthesis of the stoichiometric composition of the slavsonite in the temperature interval of 1250 – 1350 °C were proved. On the basis of new data, the formulae and the technological parameters for the production of radio-transparent ceramic materials with certain electrophysical properties (ε = 3.57...5.26, tgδ = 0.0073...0.0122 in the microwave range 26 – 37.5 GHz) and increased resource exploitation which determines their functional reliability were developed. Industrial and laboratory-industrial tests were conducted at the enterprises and practical recommendations for the use of the results were developed. The research results are introduced into the educational process of the department of technology of ceramics, refractories, glass and enamels of NTU "KhPI".
APA, Harvard, Vancouver, ISO, and other styles
31

Захаров, Артем Вячеславович. "Радіопрозорі керамічні матеріали на основі системи SrO – Al₂O₃ – SiO₂." Thesis, НТУ "ХПІ", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/36525.

Full text
Abstract:
Дисертація на здобуття наукового ступеня кандидата технічних наук (доктора філософії) за спеціальністю 05.17.11 – технологія тугоплавких неметалічних матеріалів. – Національний технічний університет "Харківський політехнічний інститут", Харків, 2018 р. Дисертацію присвячено розробці керамічних РПМ на основі кристалічної фази – славсоніту зі зниженою температурою синтезу. Створено базу для термодинамічного аналізу реакцій фазоутворення в системі SrO – Al₂O₃ – SiO₂. Здійснено комплексне дослідження процесу синтезу славсоніту та визначено нестехіометричне співвідношення оксидів в полі первинної кристалізації славсоніту, що забезпечує синтез славсоніту при температурі до 1250 °С. Досліджено вплив однокомпонентних і багатокомпонентних евтектичних інтенсифікуючих добавок на процеси спікання та фазоутворення славсонітової кераміки. З використанням нових даних розроблено склади та технологічні параметри виготовлення керамічних РПМ з заданими функціональними властивостями (ε = 3,57…5,26, tgδ = 0,0073…0,0122) та підвищеним ресурсом експлуатації. Проведено лабораторні та промислові випробовування на підприємствах та розроблено практичні рекомендації щодо використання результатів.
Thesis for the degree of Candidate of Technical Sciences (pre-Ph.D. in Philosophy), specialty 05.17.11 – technology of refractory non-metallic materials. – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2018 The thesis is devoted to the development of radio-transparent ceramic materials on the basis of the crystalline phase – slavsonite the synthesis of which is carried out at a reduced temperature. A database was created for the thermodynamic analysis of phase formation reactions in the SrO – Al₂O₃ – SiO₂ system. The process of solid-phase synthesis of slavsonite was thoroughly investigated and possible ways of the reaction of formation of slavsonite from different intermediate compounds were found. It has been established that due to the formation of intermediate silicon strontium from 400 and 500 °C (Sr₂SiO₄ and SrSiO₃ respectively), the synthesis of slavsonite begins at 1200 °C. In the case of the formation of strontium aluminates Sr₃Al₂O₆ and SrAl₂O₄ (in the case of SiO₂ deficiency), the synthesis of slavsonite occurs after crystallization and subsequent decomposition of Sr-gelite at a temperature of ~ 1600 °C. Within primary slavsonite crystallization in SrO – Al₂O₃ – SiO₂ systems non-stechiometric composition (SrAl₂,₀₃₄Si₃,₁₀₈O₁₀,₂₆₇), that ensures the synthesis of the slavsonite at temperatures up to 1250 °С, were found. The influence of single-component (SnO₂, Cr₂O₃, Li₂O, ZrSiO₄, TiO₂, B₂O₃, MoO₃, CaF₂) and multicomponent eutectic (LiF : NaF, LiF : KF, KF : NaF, LiF : KF : NaF, Li₂O : SnO₂) additives on the intensification of sintering and phase formation processes of slavonite ceramics was studied. The patternes of the formation of microstructure and phase composition of low temperature radio-transparent ceramics in the presence of additives of complex intensifiers which enables the formation of eutectic alloys, and the reduction of the temperature of the formation of the slavonite phase are established. The influence of the Li₂O additive (2% by weight over 100% by weight) on the formation of the non - stoichiometric composition of slavsonite, and Li₂O : SnO₂ eutectic additive (in the amount of 1 mass % over 100 mass %) for the synthesis of the stoichiometric composition of the slavsonite in the temperature interval of 1250 – 1350 °C were proved. On the basis of new data, the formulae and the technological parameters for the production of radio-transparent ceramic materials with certain electrophysical properties (ε = 3.57...5.26, tgδ = 0.0073...0.0122 in the microwave range 26 – 37.5 GHz) and increased resource exploitation which determines their functional reliability were developed. Industrial and laboratory-industrial tests were conducted at the enterprises and practical recommendations for the use of the results were developed. The research results are introduced into the educational process of the department of technology of ceramics, refractories, glass and enamels of NTU "KhPI".
APA, Harvard, Vancouver, ISO, and other styles
32

Andersson, Johan. "Rekommendationer för införande av public key infrastructure." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1177.

Full text
Abstract:

The use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure. In this thesis we shall se what PKI really is in a more detailed way and which entities it constitutes of. We will also investigate some of the areas in which we could make use of it, for instance secure e-mail and virtual private networks. Next, we will look into some of the drawbacks with PKI and what you should think of in order to aviod these. Finally, we'll give recommendations for the implementation itself. As for the theory of cryptography, the basics is presented to the interested reader in a separate appendix.

APA, Harvard, Vancouver, ISO, and other styles
33

Rocha, Nicole Andrade da. "Observação social sistemática: estudo de caso em duas regiões urbanas de Juiz de Fora - MG." Universidade Federal de Juiz de Fora, 2015. https://repositorio.ufjf.br/jspui/handle/ufjf/107.

Full text
Abstract:
Submitted by Renata Lopes (renatasil82@gmail.com) on 2015-12-07T11:09:22Z No. of bitstreams: 1 nicoleandradedarocha.pdf: 5589274 bytes, checksum: e35a9c2511e226e70b29092b3dd7f8b9 (MD5)
Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2015-12-07T21:39:14Z (GMT) No. of bitstreams: 1 nicoleandradedarocha.pdf: 5589274 bytes, checksum: e35a9c2511e226e70b29092b3dd7f8b9 (MD5)
Made available in DSpace on 2015-12-07T21:39:14Z (GMT). No. of bitstreams: 1 nicoleandradedarocha.pdf: 5589274 bytes, checksum: e35a9c2511e226e70b29092b3dd7f8b9 (MD5) Previous issue date: 2015-02-25
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Este trabalho tem por objetivo principal testar a ferramenta OSS (Observação Social Sistemática) e suas possíveis contribuições para a arquitetura e urbanismo, de forma a aprofundar nos estudos análiticos da realidade urbana e arquitetônica brasileira, visando uma leitura adequada do espaço urbano, tanto físico, quanto formal, que permita compreender o espaço enquanto lugar e as relações que são desenvolvidas nesse contexto. Para tanto, o estudo foi aplicado em duas Regiões Urbanas (RU) de Juiz de Fora- MG, dividido em quatro etapas de estudos: na etapa quali-quantitativa (1), foi realizada uma busca sistemática no Periódicos Capes através de palavras-chave relacionados com o estudo em questão, buscando desta forma, conhecer o estado da arte, métodos mais utilizados e o contexto de aplicação das ferramentas analisadas, que possibilitassem as realizações das análises qualitativa do espaço urbano; na etapa prática (2), aplicou-se a ferramenta nas áreas selecionadas e após a compilações dos dados, expôs-se os resultados encontrados; na etapa de discussão dos resultado (3), buscou-se identificar a aplicabilidade e as limitações do uso da ferramenta; e na etapa final, realizou-se as conclusões e considerações finais (4). Entre os resultados encontrados, conclui-se que a flexibilidade destaca-se entre as vantagens da OSS, já que é possível adaptá-la há vários objetos de estudos e as várias áreas do conhecimento, uma vez que utiliza o levantamento quantitativo dos elementos da paisagem permitindo concomitantemente analises qualitativa da mesma, oportunizando o direcionamento da pesquisa de acordo com enfoco da área estudada. Entretanto, a ferramenta possibilita a análise apenas da camada mais próxima da paisagem, sem explorá-la mais profundamente e em detalhes já que atua na escala do pedestre. Além disso, a OSS se mostra interessante ao propor um processo rápido e barato da captação das camadas da paisagem mais próxima do observador. Desta forma, quando buscamos respostas, na arquitetura e urbanismo, para as questões que envolvem métricas do espaço urbano a partir de estudos sistemáticos, qualitativos e quantitativos, percebemos que existem poucos estudos desenvolvidos nesse sentido. Talvez, uma alternativa a essa questão seja o de buscar, em outras áreas do conhecimento (que é multidisciplinar), a contribuição e apoio pautados nos princípios heurísticos permitindo novos rumos para a pesquisa.
This work has as main objective to test the OSS tool (Social Systematic Observation) and their contributions to the study of architecture and urbanism, in order to deepen the analytical studies of urban reality and Brazilian architectural, seeking a proper reading of urban space, both physical, as formal, in order to understand the space as a place and the relationships that are developed in this context. Therefore, the study was applied in two Urban Regions (RU) in Juiz de Fora - MG, the study was divided into four stages: Qualitative and quantitative stage (1), was a systematic search in Portal Periodicos Capes through keywords related to the study in question, looking this way, knowing the state of the art, methods more used and the application context of the analyzed tools that would enable the achievements of qualitative analysis of urban space; Practice stage (2) in which the tool was applied in selected areas and after compilation of data and was explained the results; Discussion of the result (3), we sought to identify the applicability and limitations of the tool; and in the last stage the final conclusions (4). Among the results, we can conclude that flexibility stands out like advantages of OSS, because it is possible to adapt it for several objects of study and the various areas of knowledge, since it uses the quantitative survey of landscape elements concurrently allowing qualitative analysis thereof. However the tool allows the analysis only in the layer closest to the landscape without exploring it more deeply and in detail. This tool shows interesting on to propose a quick and inexpensive process of capturing the landscape layers in the pedestrian scale, even if it is the closest to the observer. Thus, when we seek answers, in architecture and urbanism, to the issues surrounding metrics of urban space from systematic, qualitative and quantitative studies, we realize that there are few studies in this direction. Perhaps an alternative to this question is to seek, in other areas of knowledge that is multidisciplinary, the contribution of knowledge, support and insights for new directions of research.
APA, Harvard, Vancouver, ISO, and other styles
34

Al-Fawaz, Khaled. "Investigating enterprise resource planning adoption and implementation in service sector organisations." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/10078.

Full text
Abstract:
This thesis investigates Enterprise Resource Planning (ERP) adoption and implementation in Service Sector Organisations (SSOs). ERP is a business management system that has emerged to support organisations to use a system of integrated applications to enhance their Information Technology (IT) infrastructures, enhance business processes and deliver high quality of services. Regardless of the fact that several other sector organisations have adopted and implemented ERP systems, its application in SSOs is rather inadequate. Among other reasons, two core rationales can be attributed to the latter fact – firstly, SSOs lack the sufficient knowledge, expertise and training to implement such sophisticated integrated systems and secondly, the top management lacks the ability to take appropriate decisions for ERP adoption and implementation. However, merely focusing on a number of factors influencing ERP adoption and implementation may not be suffice, as there is a need for a systematic decision-making process for adopting and implementing ERP systems in SSOs. The limited number of ERP systems’ applications in SSOs has resulted in inadequate research in this area with many issues, like its adoption and implementation requiring further exploration. Despite, the implications of ERP systems have yet to be assessed in SSOs, leaving ample scope for relevance and producing a unique piece of research work. Thus, the author demonstrates that it is of high importance to investigate this area within SSOs and contribute towards successful ERP adoption and implementation. This thesis makes a step forward and contributes to the body of knowledge as it: investigates factors influencing the decision-making process for ERP adoption and implementation in SSOs, prioritises the importance of factors influencing ERP adoption and implementation, evaluates ERP lifecycle phases and stages, maps the ERP factors on different phases and stages of the ERP lifecycle, and in doing so, to propose a model for ERP adoption and implementation in SSOs. The author claims that such an ERP adoption and implementation process in SSOs is significant and novel as: it extends established norms for ERP adoption and implementation, by including Analytical Hierarchy Process (AHP) technique for prioritising the importance of factors, thus, facilitating SSOs to produce more robust proposals for ERP adoption and implementation. The author further assess the proposed ERP adoption and implementation model by using a qualitative, interpretive, multiple case study research strategy. Findings from two case studies demonstrate that such a systematic approach contributes towards more robust decisions for ERP adoption and implementation and indicates that it is acceptable by the case study organisations. The thesis proposes, assesses and presents a novel model for ERP adoption and implementation in SSOs and contributes to the body of knowledge by extending the literature.
APA, Harvard, Vancouver, ISO, and other styles
35

Oliveira, Phelipe Sena. "Desenvolvimento de uma nova t?cnica para otimiza??o de circuitos planares inspirada no comportamento social das aranhas." PROGRAMA DE P?S-GRADUA??O EM ENGENHARIA EL?TRICA E DE COMPUTA??O, 2017. https://repositorio.ufrn.br/jspui/handle/123456789/24644.

Full text
Abstract:
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2018-01-23T14:13:10Z No. of bitstreams: 1 PhelipeSenaOliveira_TESE.pdf: 2369727 bytes, checksum: 2bb1dad07260b4efd645c7028636e62f (MD5)
Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2018-01-24T15:05:44Z (GMT) No. of bitstreams: 1 PhelipeSenaOliveira_TESE.pdf: 2369727 bytes, checksum: 2bb1dad07260b4efd645c7028636e62f (MD5)
Made available in DSpace on 2018-01-24T15:05:44Z (GMT). No. of bitstreams: 1 PhelipeSenaOliveira_TESE.pdf: 2369727 bytes, checksum: 2bb1dad07260b4efd645c7028636e62f (MD5) Previous issue date: 2017-02-06
Conselho Nacional de Desenvolvimento Cient?fico e Tecnol?gico (CNPq)
As novas configura??es de dispositivos e circuitos de micro-ondas resulta em aumento de complexidade nos processos de desenvolvimento, particularmente nos casos de s?ntese. Antenas e superf?cies seletivas de frequ?ncia (Frequency Selective Surface - FSS) s?o estruturas muito importantes nos sistemas de comunica??es, que podem ser otimizadas pela atua??o dos algoritmos bioinspirados. Geralmente, para que os algoritmos bioinspirados auxiliem na otimiza??o dessas estruturas ? necess?ria a implementa??o de t?cnicas de an?lise num?rica como o M?todo dos Momentos ou Elementos Finitos. Diante da dificuldade de modelagem das t?cnicas descritas, ? comum a utiliza??o de uma fun??o de estima??o, como as Redes Neurais Artificiais, para substituir a an?lise num?rica. Embora encontre solu??es desejadas, as estima??es s?o realizadas ap?s um processo de treinamento efetuado atrav?s de uma base de dados. Cada estrutura de antena ou FSS exige uma base de dados espec?fica. Este trabalho prop?e uma t?cnica de otimiza??o baseado na utiliza??o de um algoritmo bioinspirado e um framework que realiza a integra??o do algoritmo ao software comercial ANSYS HFSS. O prop?sito ? realizar as simula??es das poss?veis solu??es durante a execu??o do algoritmo bioinspirado, e com isso, evitar o uso de uma base de dados, e assim, tornar a t?cnica eficiente e flex?vel com rela??o ?s altera??es nas estruturas de antenas ou FSS. Outro objetivo original deste trabalho ? a utiliza??o do algoritmo Social Spider Optimization ? SSO para a solu??o de problemas na ?rea de eletromagnetismo aplicado. Para comprovar a efic?cia da t?cnica proposta alguns projetos de antena e FSS s?o otimizados atrav?s de varia??es em seus par?metros estruturais. Os resultados obtidos na otimiza??o dos projetos dos circuitos s?o comparados com outras t?cnicas, tendo sido observado uma boa concord?ncia.
The new settings for devices and microwaves circuits result in an increase of complexity in the processes of development, specially in regards to the process of synthesis. Antennas and Frequency Selective Surfaces (FSS) are primordial in communication systems. Alternatively, these structures may be optimized through the usage of bio-inspired algorithms. Generally, in order for the bio-inspired algorithms to assist in the optimization of FSS structures, it is necessary to implement several numerical analysis techniques, such as the method of moments or finite elements. Because of the difficulty to model such methods, it has been turned common the usage of a point estimation function, such as artificial neural networks, to substitute the numerical analysis. Although these procedures end up encountering desirable solutions, the estimations are done after a training process conducted through a database. Additionally, every FSS antenna demands a specific database. This work proposes an optimization technique that relies on the usage of a bio-inspired algorithm and a framework (that provides the integration between the algorithm and the commercial software ANSS HFSS). The purpose of the work is to do simulations of possible solutions during the execution of the bio-inspired algorithm; therefore, avoiding the usage of the database; and so, make the technique flexible and efficient in relation to altering the antennas? structures or FSS. Furthermore, another objective of this work is the usage of the algorithm, namely Social Spider Optimization - SSO in the search for solutions in the field of applied electromagnetism. In order to prove the efficiency of the proposed techniques, some FSS? and antennas? projects are optimized through the variation of their structural parameters. In conclusion, the results that were obtained through the procedures previously shown, are compared to other techniques, resulting in a satisfying agreement rate.
APA, Harvard, Vancouver, ISO, and other styles
36

Trofymchuk, Dmytro. "Marketing na internetu." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-113216.

Full text
Abstract:
The study of the internet marketing tools for a small business. The paper show optimal strategy and options such as SEO, SMO, viral marketing and others, that can be used to improve the sales and visibility of the company.
APA, Harvard, Vancouver, ISO, and other styles
37

Ferek, Matúš. "Bezpečená komunikace mezi data loggerem a databazovým serverem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219262.

Full text
Abstract:
This work is aimed to analyze security risks of data transfer in Internet network and to design couple of possible solutions for securing communication between data logger and server for data processing. As a result, solution of securing this data communication by SSL layer was designed.
APA, Harvard, Vancouver, ISO, and other styles
38

Evers, Patrick D. M. D. "Prenatal Heart Block Screening in Mothers With SSA/SSB Auto-antibodies: Targeted Screening Protocol is a Cost-Effective Strategy." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1552379621451565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

石川, 久美. "SSHオープンクラス." 名古屋大学教育学部附属中・高等学校, 2013. http://hdl.handle.net/2237/19153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Coronel, Castro Marianella, Gutiérrez Claudia Alexandra Echevarría, Montero Manuel Daniel López, Arévalo Alejandro Alonso Rodríguez, and Cotrina Alexander Sifuentes. "PSI-SOS." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/655499.

Full text
Abstract:
El objetivo del presente plan de negocios es la creación de la empresa PSI-SOS, la cual brinda un servicio de atención online a personas con problemas de salud mental a través de su plataforma web, para lo cual cuenta con un directorio de psicólogos, a quienes se contacta y contrata para brindar un servicio especializado a nuestros usuarios registrados. La empresa está enfocada en la atención a los casos referidos a problemas de salud mental que se vienen dando en la población, sobre todo ahora, en una etapa crucial para la humanidad, como lo es la pandemia del Covid-19, la cual marca un precedente en el  comportamientos de los seres humanos. En PSI-SOS afirmamos que la terapia online es la forma más accesible para una sesión con el psicólogo, por lo cual estructuramos una plataforma interactiva para informar fácilmente a nuestros usuarios potenciales, así como atender a nuestros clientes. Por eso nuestros servicios están distribuidos en paquetes de sesiones para los diversos tipos de necesidades y tratamiento que pueden elegir las personas, asimismo está focalizado en realizar promociones y seguimiento de nuestros clientes para lograr su fidelización a nuestros servicios, lo que también puede ser uno de los factores que aporten un incremento de nuestras ventas. Finalmente, después de un exhaustivo análisis financiero, hemos reconocido un costo de oportunidad del capital (COK) del 9.99% y un costo promedio ponderado (WACC) de 10.96%, cifras claves que validan nuestro plan de negocios confirmando la viabilidad económica de la empresa.
The aim of this business plan is the development of the company PSI-SOS, which provides an online care service to people with mental health problems through its web platform, for which it has a directory of psychologists, at who is contacted and contracted to provide a specialized service to our registered users. The company is focused on attending to cases referring to mental health problems that are occurring in the population, especially now, at a crucial stage for humanity, such as the Covid-19 pandemic, which marks a precedent in the behavior of human beings. At PSI-SOS we affirm that online therapy is the most accessible way for a session with the psychologist, which is why we have structured an interactive platform to easily inform our potential users, as well as serve our clients. That is why our services are distributed in session packages for the various types of needs and treatment that people can choose, it is also focused on promoting and monitoring our clients to achieve their loyalty to our services, which can also be one of the factors that contribute to an increase in our sales. Finally, after an exhaustive financial analysis, we have recognized an opportunity cost of capital (COK) of 9.99% and a weighted average cost (WACC) of 10.96%, key figures that validate our business plan confirming the economic viability of the company.
Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
41

Ярошенко, Я. В. "SSD-накопичувачі." Thesis, Cумський державний університет, 2016. http://essuir.sumdu.edu.ua/handle/123456789/49061.

Full text
Abstract:
В 21 столітті інформація стала цінним ресурсом як в бізнесі, так і в національній безпеці, тому її збереження та оперативне відтворення відіграє ключове значення. Твердотільний накопичувач (SSD) це накопичувач, який не має рухомих частин, як в HDD, а запис інформації здійснюється на Flash-пам`ять.
APA, Harvard, Vancouver, ISO, and other styles
42

Rubensson, Monica, and Maria Degaardt. "Leg SSk." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26185.

Full text
Abstract:
Syftet med denna studie var att göra en bedömning av den postoperativa förloppet i hemmet hos dagkirurgiska ljumskbråcksopererade patienter. Data insamlade med hjälp av högstrukturerade telefonintervjuer. En enkät med standardiserade frågor och ikryssbara svarsalternativ som kommer har använts vid telefonintervjuerna.Resultaten från de 52 intervjuerna visade att de flesta patienter inte överskred Numerical Rating Scale (NRS) 3 i vila eller rörelse dag ett. På dag tre hade de flesta mer smärta vid rörelse än dag ett. De flesta patienterna följde ordinationen de fick av läkaren avseende smärtstillande tabletter. Generellt sett visade studien på få postoperativa komplikationer och hög tillfredsställelse ur operationssynpunkt hos patienterna.
The purpose of this study was to evaluate the post-operative progress for one-day surgical inguinal hernia patients. Data was collected using structured telephone interviews three days after surgery. A questionnaire with standardized questions and multiple-choice response options was used.The results from the 52 interviews showed that most patients did not exceed Numerical Rating Scale (NRS) 3 day one when at rest or moving around. On day three most patients had more pain while moving than day 1. Most patients complied with the doctor’s prescription of painkillers. Generally the follow-up study showed the patients had few complications and felt high satisfaction post surgery.
APA, Harvard, Vancouver, ISO, and other styles
43

Hoxha, Ariela. "New insight into the pathogenesis and treatment of autoimmune congenital heart block." Doctoral thesis, Università degli studi di Padova, 2013. http://hdl.handle.net/11577/3422991.

Full text
Abstract:
Background. Congenital atrioventricular block (CHB) is the most frequent manifestation of neonatal lupus which is attributed to anti-Ro/SSA and/or anti-La/SSB-mediated inflammation and subsequent fibrosis of the atrioventricular node. Despite the observation of a direct role for maternal antibodies in inducing CHB both in vitro and in vivo studies, the mechanisms involved remain unclear. Currently no therapy is found to be effective in the treatment of 2nd and 3rd degree CHB induced by maternal antibodies; also because the rarity of the disease does not allow for controlled clinical trials. Objectives. To explore the role of anti-Ro52 antibodies in the pathogenesis of CHB by identifying of the epitope specificity of anti-p200 antibodies. To study in an animal model the effect on heart conduction system of the different doses of injected human IgG antibodies from a CHB patient. To evaluate the clinical efficacy and safety of a combined therapy protocol utilizing plasmapheresis, intravenous immunoglobulin (IVIG) and betamethasone and the effect of this treatment on anti-Ro52, anti-p200 and anti-La antibody levels. Materials and Methods. Laboratory methods: ELISA assay, circular dichroism spectroscopy and antibody purification. Procedure: antibody transfer by intra-peritoneally injection of purified IgG. Instrumental methods: fetal ecocardiography and electrocardiogram recordings. Treatment strategy: Six consecutive women diagnosed CHB underwent a combination therapy protocol composed of weekly plasmapheresis, fortnightly 1 g/Kg IVIG and daily Betamethasone (4 mg/day) throughout pregnancy. IVIG (1 g/Kg) treatment in the neonates was begun at birth and administered every fifteen days until passive maternal antibodies became undetectable. Statistical analysis: Wilcoxon, Mann-Whitney U, two way ANOVA and Spearman’s tests; p<0.05 was considered as significant. Results and Conclusion. Part I: The epitope specificity of anti-p200 antibodies was the position 233. We suggest that this antibody specificity might be a tool to identify high risk pregnancies for CHB. The results might contribute to identify antibody specificity closely associated with development of CHB and to provide the possibility to explore the role of this antibody in the pathogenesis of CHB. Part II: We developed an animal model for CHB by a simple technique of passive transfer of human IgG from a patient with a child with CHB. High levels (4 mg) of anti-SSA/Ro and anti-SSB/La antibodies induce bradycardia, atrioventricular time prolongation and a decreased cardiac performance. Whereas, low levels (2 mg) of these antibodies determine a decrease in cardiac performance. Part III: The obtained results from these case series are: a) the efficacy in treating 2nd degree CHB, and b) the safety of plasmapheresis and IVIG therapies. The low number of treated cases, the relatively short follow-up (mean 22.7 months ± 10.4 SD, range 12-42 months) and the high cost of the procedure can all be considered limits. Part IV: Plasmapheresis reduces the levels of anti-Ro52, anti-p200 and anti-La antibodies. However, a decrease of antibody amounts in patients with the highest anti-Ro52 antibody levels has not been demonstrated
Premesse. Il blocco atrioventricolare congenito (CHB) è la manifestazione più frequente del lupus neonatale. Esso è causato dal passaggio transplacentare degli anticorpi anti-Ro/SSA e/o anti-La/SSB con successiva infiammazione e fibrosi del nodo atrioventricolare. Nonostante la dimostrazione di un ruolo diretto degli anticorpi materni nell'indurre CHB sia in vitro che in vivo, i meccanismi coinvolti rimangono poco chiari. Inoltre finora nessuna terapia è risultata efficace nel trattamento del CHB sia di secondo che terzo grado, anche perché la rarità della malattia non consente studi clinici controllati. Obiettivi. Studiare il ruolo degli anticorpi anti-Ro52 nella patogenesi del CHB attraverso la definizione della specificità epitopica degli anticorpi anti-p200. Sviluppare un modello animale per studiare l'effetto sul sistema di conduzione cardiaco degli anticorpi IgG purificati da una paziente con CHB fetale. Infine valutare l'efficacia clinica e la sicurezza di un protocollo di terapia combinato comprendente l’impiego di plasmaferesi, immunoglobuline per via endovenosa (IVIG) e betametasone, nonchè l'effetto di questo trattamento su i livelli degli anticorpi anti-Ro52, anti-p200 e anti-La. Materiali e Metodi. Metodi di laboratorio: ELISA, spettroscopia con dicroismo circolare e purificazione di IgG umane. Procedura sperimentale: trasferimento per via intra-peritoneale degli anticorpi mediante l’iniezione di IgG purificate da una madre con CHB. Metodi strumentali: ecocardiografia fetale ed elettrocardiografia dopo la nascita. Strategia di trattamento: Sei donne diagnosticate con CHB sono state trattate durante la gravidanza con un protocollo di terapia di associazione composta da plasmaferesi settimanale, IVIG 1g/kg a cadenza quindicinale e Betametasone giornaliero (4 mg). Inoltre, IVIG (1 g/kg) sono state somministrate ai neonati ogni quindici giorni subito dopo la nascita fino alla negativizzazione degli anticorpi materni passivi. Analisi statistica: Wilcoxon, Mann-Whitney U, ANOVA e Spearman tests. Il valore di p<0,05 è stato considerato significativo. Risultati e Conclusioni. Parte I: La specificità epitopica dell’anticorpo anti-p200 è stata localizzata nella posizione 233. Tale epitopo potrebbe essere utile per identificare la specificità anticorpale strettamente associata allo sviluppo del CHB e costituire quindi uno strumento per individuare le gravidanze ad alto rischio per CHB. Inoltre potrebbe contribuire a chiarire il ruolo di questo anticorpo nella patogenesi del CHB. Parte II: Abbiamo sviluppato un modello animale del CHB con una semplice tecnica di trasferimento passivo di IgG umane purificate da un paziente con CHB fetale. Gli alti livelli (4 mg) degli anticorpi anti-Ro/SSA ed anti-La/SSB hanno indotto bradicardia, prolungamento dell’intervallo PR e una depressione delle funzione cardiaca nel animale. Invece, i bassi livelli (2 mg) hanno determinato solo una diminuzione della funzione cardiaca. In questo modo è stato dimostrato la patogenicità degli anticorpi anti-Ro/SSA ed anti-La/SSB sul sistema di conduzione cardiaco. Parte III: I risultati ottenuti da queste serie di casi sono i seguenti: a) l’efficacia nel trattamento del CHB di 2° grado, e b) la sicurezza della plasmaferesi e delle IVIG. Tuttavia il basso numero di casi trattati, e il follow-up relativamente breve (media 22,7 mesi ± 10,4 DS, range 12-42 mesi), come anche l'alto costo della procedura possono essere considerati limiti. Parte IV: La plasmaferesi riduce i livelli degli anticorpi anti-Ro52, anti-p200 e anti-La. Tuttavia, un decremento significativo anticorpale non è stato dimostrato nelle pazienti con livelli molto alti di anticorpi anti-Ro52
APA, Harvard, Vancouver, ISO, and other styles
44

Veikutis, Donatas. "SEO taikymo analizė." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20120702_123614-02385.

Full text
Abstract:
Visuomenė, internetas ir jame esanti informacija dabar turi vieną didžiausių įtakų mūsų asmeniniame gyvenime. Be interneto daugelis dabar, net nebeįsivaizduotų savo kasdienybės, nes jis mums ir padeda atlikti daugelį darbų. Tačiau vis augant duomenų kiekiams internete, informacijos paieška tampa vienu svarbiausių internete naudojamų funkcijų.Paieškos sistemos – tai sistemos, ieškančios dokumentų žiniatinklyje, naujienų grupių archyvuose, FTP saugyklose, kuriuos rado paieškos serveris ir įtraukė į savo duomenų bazes. Ieškant informacijos, vartotojai naudojasi šiomis sistemomis, todėl internetinių svetainių kūrėjai yra suinteresuoti, kad jų internetiniai puslapiai būti kuo dažniau randami paieškos sistemų. Todėl besiplečiant paieškos sistemoms išsiplėtojo SEO (Search Engine Optimization, lietuviškai „Optimizavimas paieškos sistemoms“).
Expansion of the Internet and the information contained therein formed such an organization which aims to help the internet users to quickly and efficiently find what he needs. One of them is the Google search engine. It is one of the largest search engine companies in the world. In this paper we will analyse the Google search engine, and its proposed content optimization methods, which it claims to helps achieve better search results positions. The paper will discuss techniques such as HTML meta tags, content headers, site maps, robots.txt file, canonical and Paging functions. These methods will be compared with each other, and we will decide which method is most useful for site optimization.
APA, Harvard, Vancouver, ISO, and other styles
45

Collett, Torstein Calvin. "Simple SSH Management." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9130.

Full text
Abstract:
SSH certificates are used by administrators so connections to the server can be verified. This ensures that only authorized administrators can access the server and that the server being accessed is the intended machine. Current solutions for managing SSH certificates are focused on commercial use, which makes them cumbersome for small groups and individuals to use. These solutions require running multiple services that companies already use but add significant overhead for smaller groups. We developed a new standalone system that makes it easy to manage SSH certificates for small amounts of servers and users, without requiring additional servers to be deployed. We evaluated our system with a user study to demonstrate its ease of use. We hope that this implementation can help guide future research toward a more simplified certificate authentication system for SSH.
APA, Harvard, Vancouver, ISO, and other styles
46

Koutný, Jiří. "Data driven SEO." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-150119.

Full text
Abstract:
The Search Engine Optimization (SEO) industry has recently undergone major changes. Many new analytics tools have been put on the market enabling marketing consultants to be finally able to measure and evaluate the results of their work in SEO effectively. The theoretical part of this diploma thesis therefore aims to describe and compare selected SEO tools including practical examples of their use. The paper is focused on backlink databases (MajesticSEO, SEOmoz OpenSiteExplorer and Ahrefs) and keyword suggestion tools from Google (AdWords), Seznam (Sklik), Wordtracker and SEMRush. The final chapter provides an overview of search engine positions tracking tools and techniques. The practical part describes the method of selection, preparation and processing of data obtained from tools mentioned above. The data are used to compute correlation analysis of Seznam.cz search engine results in relation with the best known SEO factors. The results of the analysis will help marketing consultants to clarify which factors are the most important to focus on to obtain more traffic from search engines.
APA, Harvard, Vancouver, ISO, and other styles
47

Sörensen, Arnd [Verfasser], Kai [Akademischer Betreuer] [Gutachter] Zuber, and Soo-Bong [Gutachter] Kim. "Temperature quenching in LAB based liquid scintillator and muon-induced backgrounds in the SNO+ experiment / Arnd Sörensen ; Gutachter: Kai Zuber, Soo-Bong Kim ; Betreuer: Kai Zuber." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://d-nb.info/1119363136/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Sörensen, Arnd [Verfasser], Kai [Akademischer Betreuer] Zuber, and Soo-Bong [Gutachter] Kim. "Temperature quenching in LAB based liquid scintillator and muon-induced backgrounds in the SNO+ experiment / Arnd Sörensen ; Gutachter: Kai Zuber, Soo-Bong Kim ; Betreuer: Kai Zuber." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-212092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Périé, Sophie. "Les muscles du larynx et du pharynx : aspects normaux et pathologiques : modèle d'étude in vitro de la dystrophie musculaire oculopharyngée à partir de cultures de cellules satellites." Paris 7, 2002. http://www.theses.fr/2002PA077146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sinner-Hettenbach, Martin. "SnO 2 (110) and Nano-SnO 2 characterization by surface analytical techniques /." [S.l. : s.n.], 2000. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB8884756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography