Дисертації з теми "Authentication authorization and accounting"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Authentication authorization and accounting".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Sandberg, Joakim. "Network Authentication to the Physical World." Thesis, KTH, Kommunikationssystem, CoS, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221177.
Повний текст джерелаQuick-Response (QR) koder har använts både för icke autentiseringssyften men även för just autentisering av en användare. Den visuella representationen av en QR-kod behöver en läsare för att kunna omvandla koden till en läsbar resurs för en applikation. Detta leder till frågeställningarna: Vad för information och hur mycket kan man lagra i en QR-kod? Vilka sårbarheter finns det med användningen av denna teknologi inom autentisering? Det konkreta problemet i detta examensarbete är huruvida en mobil enhet som visar en QR-kod kan användas med en Axis Communications A8105-E Network Video Door Station. För att lösa detta problem så undersöker detta arbete användningen av QR-koder inom autentisering baserat på att visa QR koden på den mobila enheten, skanna denna kod med en kamera och validera denna kod med en valideringsserver. Två viktiga frågor var vilken information som skulle lagras i QR-koden samt vart avläsningen av en QR-kod tog plats. Detta arbete undersöker också olika typer av multifaktor autentisering. Systemet består vidare av flera komponenter som förlitar sig på säker kommunikation och väldesignade protokoll sam ger säkerhet (mot de mest populära nätverksattackerna) och stabilitet. Den tänkta autentiseringsprocessens prototyp evaluerades i en testmiljö bestående av tre Door Station, en Android applikation och en backend service för att analysera QR-koder samt hantera autentiserings och behörighetslogik. QR-koder bevisades vara lika säkert som befintliga lösningar som till exempel kort accesskort med magnetremsa och RFID chip. Användning av QR-koder med de mobila enheterna gör dessutom att hantering av registrering/avregistrering av enheterna kan ske på ett enkelt sätt samt även integreras med multifaktor autentisering. Slutsatsen är att med de befintliga Door Station enheterna och den slutgiltiga designen av mjukvaran ger det säkert och skalbart system som dessutom är kostnadseffektivt genom att behovet av en mänsklig verifiering samt de fysiska komponenterna av befintliga accesskortsystem, inte längre finns.
Crespo, Juan Carlos. "Requirements for a secure and efficientAuthentication System for a large organizationJuan Carlos." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-7575.
Повний текст джерелаIn this thesis, a full review on what are the minimum requirements needed to perform an Authentication System is explained. While building the system we have in consideration the users of it, the security needed for each of the resources that must be accessed by the users and what methods can be applied to access to these resources.
In basics, an Authentication System is built when we need to keep track to who is entering on an organization, the bigger the organization is and the more information must be keep safe the more complex the system will be.
Although there are other methods, I tried to keep it easy and understandable for all the possible readers. With this, the reader will understand the basics that he need to keep in mind when implementing such a system like this. The organization in mind for the system is a University that consist between twenty two thousand (22.000) and twenty five thousand (25.000) users.
af, Sandeberg Joakim. "Graphical system visualization and flow display : A visual representation of an authentication, authorization, and accounting backend." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190007.
Повний текст джерелаAtt visualisera arkitekturen av ett mjukvarusystem är inte lätt. Visas all tillgänglig information så blir vyn för komplicerad medan ifall för lite visas så blir vyn onödig. Att samtidigt visa dynamiken som uppstår när systemet arbetar är ytterligare en utmaning. Detta examensprojektet beskriver hur utvecklingen av ett grafiskt verktyg, som både kan visa konfigurationen av ett avancerat autentisering-, tillåtelse- och bokförings-system (AAA) och meddelanden som skickas mellan noder i systemet.<p> Lösningen använder en kraftriktad graflayout tillsammans med adaptiva filter och vektorbaserad rendering för att visa en vy av systemets status. De adaptiva filtren börjar med att visa den information som oftast är mest relevant men kan ställas in av användaren. Nyttjandet av vektorbaserad grafik tillhandahåller obegränsade möjligheter för användaren att zooma in på delar av grafen för att visa mer detaljerad information. UML sekvensdiagram används för att visa medelandeflödet inuti systemet (både mellan noder och inuti noder). För att utvärdera resultatet av examensprojektet blev varje iteration av designen utvärderad vid möten med personalen på Aptilo Networks. Dessa möten gav återkoppling på vilken rikting projektet tog samt input med t. ex. id´eer på nya egenskaper att lägga till. Resultatet av detta examensarbete visar ett sätt att visa statusen för ett AAA system med många av systemets egenskaper visade samtidigt. Det kombinerar detta med en vy av flödet av meddelanden och applikationpolicies i nätverket via ett dynamiskt genererat UML sekvensdiagram. Resultatet av detta är att mänskliga operatörer kan se både systemets arkitektur och dynamiken i hur det fungerar i samma gränssnitt. Detta gränssnitt bör möjliggöra mer effektiv hantering av AAA systemet och underlätta lösningar på både problem i systemet och attacker mot systemet.
Zaghloul, Said Ismail Said [Verfasser], and Admela [Akademischer Betreuer] Jukan. "Design and Performance Optimization of Authentication, Authorization, and Accounting (AAA) Systems in Mobile Telecommunications Networks / Said Ismail Said Zaghloul ; Betreuer: Admela Jukan." Braunschweig : Technische Universität Braunschweig, 2010. http://d-nb.info/1175828149/34.
Повний текст джерелаHakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.
Повний текст джерелаHamedtoolloei, Hamidreza. "A service-oriented architecture for authentication and authorization." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p1460003.
Повний текст джерелаTitle from first page of PDF file (viewed January 9, 2009). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 94-97).
Yao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.
Повний текст джерелаSubils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.
Повний текст джерелаTran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.
Повний текст джерелаMikrotjänster har framträtt som ett mer attraktivt alternativ än mer konventionella mjukvaruapplikationsarkitekturer såsom den monolitiska. Mikrotjänster erbjuder flera fördelar som underlättar med en helhetsförståelse för kodbasen, driftsättning, testbarhet, och skalbarhet. Då IT industrin har växt sig allt större, så är det rimligt att tech jättar inför mikrotjänstarkitekturen för att kunna utnyttja dessa fördelar. Nya mjukvarulösningar medför säkerhetsproblem, speciellt då tekniken är helt ny och inte har kartlagts ordentligt. Autentisering och auktorisering utgör grunden för applikationer som har ett flertal användare. Då mikrotjänster ej hunnit blivit utförligt täckt av undersökning, på grund av sin relativt unga ålder, så finns det ej några standardiserade designmönster för hur autentisering och auktorisering är implementerade till bästa effekt i en mikrotjänst. Detta examensarbete undersöker en existerande mikrotjänst för att säkra den genom att applicera vad som är känt som ett säkerhetsdesignmönster för autentisering och auktorisering. Olika sådana mönster testades och jämfördes baserat på prestanda i olika bakgrunder. De varierade nivåerna av säkerhet från de olika angreppssätten som säkerhetsmönstrena erbjöd användes för att identifiera en acceptabel kompromiss mellan säkerhet mot prestanda. Målet är att i slutändan så kommer detta att ge mönstren en högre giltighet när det kommer till att bli accepterade som säkerhetsdesignmönster inom området av mikrotjänstsäkerhet. Ett annat mål var att hitta den bästa kandidaten bland dessa säkerhetsmönster för den givna mikrotjänsten som användes i projektet. Resultaten visade på en korrelation mellan ökad säkerhet och längre responstider. För generella fall rekommenderas det säkerhetsmönster som implementerade intern autentisering och auktorisering men med en viss del tillit mellan tjänster. Om horisontell skalning användes visade resultaten att de normala tjänsterna var de bästa valet att lägga dessa resurser på. Fortsättningsvis visade resultaten även att för ett lägre antal användare så var den negativa effekten på prestandan nästan likvärdig mellan de olika mönstren. Detta innebar att det specifika fallet då mikrotjänster ser en lägre mängd trafik så är det rekommenderade säkerhetsmönstret det som implementerad flest åtkomstkontroller. I fallet för den miljö där undersökningen tog plats förekom det en lägre mängd trafik och därför rekommenderades det säkerhetsmönster som säkrade alla tjänster närvarande i mikrotjänsten.
Aas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.
Повний текст джерелаDasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.
Повний текст джерелаAlenius, Fabian. "Authentication and Authorization : Achieving Single Sign-on in an Erlang Environment." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129523.
Повний текст джерелаForcing users to enter their credentials every time they want to use a service is associated with several problems. Common problems include lowered user productivity, increased administration costs and security issues. As companies and organizations are adding more services to their networks, it is becoming an increasingly important problem. By allowing users to sign on once and centralizing access control decisions, it is possible to reduce or completely mitigate this problem. This paper describes how a service written in Erlang was modified to allow for single sign-on and centralized access control.
Mensah, Francis. "Framework to Implement Authentication, Authorization and Secure Communications in a Multiuser Collaborative CAx Environment." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4314.
Повний текст джерелаGerdzhikov, Petko. "Behaviour of Port-knocking authentication mechanism." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60929.
Повний текст джерелаDas, Devaraj. "Design and Implementation of an Authentication and Authorization Framework for a Nomadic Service Delivery System." Thesis, Indian Institute of Science, 2002. http://hdl.handle.net/2005/70.
Повний текст джерелаOdyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.
Повний текст джерелаGuitérrez, Barquín Jesús Miguel. "Network Independent Quality of Service : The role of Authentication, Authorization, and Accouting in a roaming environment." Thesis, KTH, Kommunikationssystem, CoS, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92253.
Повний текст джерелаDe huvudsakliga målen med EuQoS projektet är att integrera, testa, utvärdera och demonstrera QoS från en ende av kommunikationen till en annan för att stödja avancerade QoS tillämpningar inom multipla nätverksdomäner industrioch forskningsverksamhet. Denna nya teknik är av stort värde och kan komma att bli nästa stora steg i utvecklingen av telekommunikation. Användandet av IPnätverk ökar och i samma takt ökar även efterfrågan av nya och bättre kommunikationstjänster. Därför finns det ett stort behov av QoS hos Internetleverantörerna som ständigt måste tillgodose kundernas önskemål. Det är viktigt att QoS modellen inte komplicerar den redan existerande tekniken. Därför måste den vara kompatibel med befintliga tekniker och utrustning. För att uppfylla dessa krav kommer Proxy signalbehandlare att användas. Den här rapporten behandlar möjliga roaming scenarier och hur AAA bör hanteras. Jag har som mål att presentera rimliga lösningar som tar hänsyn till miljön. För detta används i största möjliga mån redan existerande infrastruktur.
Con la continua evolución de las aplicaciones basadas en el protocolo IP en todas las redes, y el deseo de los proveedores de servicios de telecomunicaciones de ofrecer un valor añadido a sus clientes, cohabita la necesidad de coordinar la entrega de calidad de servicio (QoS) extremo a extremo. De esta forma los proveedores pueden aumentar la oferta de servicios mediante nuevas aplicaciones. El principal objetivo del proyecto EuQoS es investigar, desarrollar, integrar y probar una tecnología independiente de la red de acceso que garantice QoS extremo a extremo. El sistema esta pensado inicialmente para dar soporte a las aplicaciones: VoIP, VoD, video conferencia, y a una aplicación médica llamada MEDIGRAF, sobre múltiples y heterogéneas redes de acceso. Los parámetros que EuQoS tiene en cuenta para la reserva de la calidad de servicio son el ancho de banda, el retardo, la variación del retardo (jitter), y las pérdidas permitidas. Un requisito fundamental para el modelo de QoS es que debe añadir la mínima complejidad posible al existe funcionamiento del sistema y debe ser compatible con el legado de aplicaciones y equipo. Esto se solucionará mediante el uso de señalización a nivel de Proxy. Este proyecto analiza los posibles escenarios de roaming y cómo se debería afrontar la Autenticación, Autorización, y Accounting (AAA) en estas condiciones de itinerancia. En los capítulos iniciales hacen una descripción general del sistema EuQoS, para tener una visión global del proceso de reserva de recursos. Es necesario conocer la estructura completa para lograr una integración mayor y con el menor coste posible. El proyecto EuQoS propone y desarrolla un nuevo mecanismo de QoS que se construye sobre un estado del arte que incorpora los siguientes mecanismos: Monitorización y Medición, Control de Admisión, Gestión de Fallos, Señalización y Negociación de Servicio, Seguridad y AAA, Charging, Ingeniería de Tráfico y Optimización de Recursos. Con el fin de conocer lo que anteriormente otros habían hecho en este campo, antes de escribir una sola línea de este proyecto, llevé a cabo una extensa búsqueda de documentación. Parte de la información utilizada en este documento ha sido extraída de las entregas públicas del proyecto EuQoS hechas a la Comisión Europea. Además de la bibliografía mostrada en las referencias, Ericsson tiene sus propios informes técnicos e implementaciones de protocolos como el protocolo de iniciación de sesión (SIP) y DIAMETER, que se han consultado en varias ocasiones y han contribuido a lo largo de la investigación. Existe una enorme similitud entre la arquitectura del sistema y la de IMS. De esta manera, algunos de los conceptos aplicados a la hora de desarrollar una solución para el caso de roaming para EuQoS se basan en los flujos de señalización utilizados en IMS y en los anteproyectos de nuevos RFCs.
Shen, Ziyi. "Red Door: Firewall Based Access Control in ROS." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.
Повний текст джерелаLavesson, Alexander, and Christina Luostarinen. "OAuth 2.0 Authentication Plugin for SonarQube." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-67526.
Повний текст джерелаHortai, František. "DYNAMICKÝ BIOMETRICKÝ PODPIS JAKO EFEKTIVNÍ NÁSTROJ PRO VNITROPODNIKOVOU KOMUNIKACI." Doctoral thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402115.
Повний текст джерелаChan, Fuk-Wing Thomas. "Preserving Trust Across Multiple Sessions in Open Systems." BYU ScholarsArchive, 2004. https://scholarsarchive.byu.edu/etd/137.
Повний текст джерелаSharma, Gaurav Medhi Deepankar. "Hash chain based authentication and accounting for fast handoffs in wireless LANs." Diss., UMK access, 2004.
Знайти повний текст джерела"A thesis in computer science." Typescript. Advisor: Deepankar Medhi. Vita. Title from "catalog record" of the print edition Description based on contents viewed Feb. 28, 2006. Includes bibliographical references (leaves 54-60). Online version of the print edition.
Alzomai, Mohammed Hamad. "Identity management : strengthening one-time password authentication through usability." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/46213/1/Mohammed_Alzomai_Thesis.pdf.
Повний текст джерелаBourass, Achraf. "Échanges entre véhicules intelligents électriques et la grille pour la planification de la charge et le routage." Mémoire, Université de Sherbrooke, 2017. http://hdl.handle.net/11143/11546.
Повний текст джерелаAbstract : The number of electric vehicles (EVs) has increased significantly in recent years. Owing to the limited number of charging stations (CSs), the waiting time in charging stations has swelled. In addition, the limited capacity of EV batteries can evoke the drivers’ range-anxiety, defined as the fear of having insufficient range to reach a destination. Make a charging planning and directing the drivers to the available charging stations during their journey could help to solve these problems. To do this, a bidirectional communication between the EVs and the smart grid would be useful. It is within this framework that this project is proposed. In this project, we propose a secure architecture where EVs and the smart grid can exchange data information for making slots reservation at the charging stations and route planning. Authentication and authorization of EVs or users is essential to guarantee EVs confidentiality and the exchange of information. This implies a request to provide the sensitive information in encrypted mode through security protocols. These procedures are executed after the EV notification process. Besides, we propose a new scheme for planning EVs itineraries. This scheme considers the state of charge of EVs, their starting positions, their destinations and the charging stations available on the road. The system establishes the reservation of the charging slots via optimizing the waiting time at charging stations as well as the energy consumption during EVs journey, from their starting positions to their designated destinations.
Zuccato, Diego. "Progettazione e realizzazione di un portale multi-Ente." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17920/.
Повний текст джерелаHines, Larry, and Jeff Kalibjian. "Securing Print Services for Telemetry Post-Processing Applications." International Foundation for Telemetering, 2006. http://hdl.handle.net/10150/604260.
Повний текст джерелаOne of the primary goals of telemetry post processing is to format received data for review and analysis. This occurs by both displaying processed data on video monitors and by printing out the results to hardcopy media. Controlling access (i.e. viewing) of telemetry data in soft form (i.e. video monitor) is achieved by utilizing the existing framework of authentication and authorization on the client/server machines hosting the telemetry data (and post processing applications). Controlling access to hardcopy output has historically been much more problematic. This paper discusses how to implement secure printing services for telemetry post processing applications.
Gonzalez, Nelson Mimura. "Proposta de arquitetura e solução de gerenciamento de credenciais para autenticação e autorização em ambientes de computação em nuvem." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-12122014-154305/.
Повний текст джерелаCloud computing is a computing model based on characteristics such as elasticity, resource sharing, on-demand resource acquisition, and scalability. This model increases resource usage efficiency, drastically reducing maintenance costs of hardware and software infrastructures. However, problems related to security aspects represent obstacles for a wider adoption of the technology. The main problems identified are related to data confidentiality and communication channels protection. These problems can be addressed by authentication and authorization mechanisms which are able to effectively control the access to resources and services. This suggests the use of credentials which define the permissions and obligations of entities from a cloud computing ecosystem. This work presents a Credential Management System (CMS) for cloud computing, which implements a solution for identification and access control in the cloud environment. The research included a survey of references related to cloud computing, security in cloud computing, and credential management. Taking the results of this research, it was specified a conceptual model which describes the proposed solution, identifying the main requirements of the solution and its architecture. Finally it was developed a prototype in order to perform tests to validate the solution and verify if the requirements were addressed. The results reveal the possibility of developing a credential management solution able to provide the adequate security mechanisms without the need to modify the original applications and services, leading to a transparent solution for users, developers, and cloud administrators. The solution was also able to establish secure communication channels between cloud entities, allowing to selectively protect information that is exchanged in the network. The conclusion is that it is possible to make cloud applications and services more secure (and reliable) by using transparent and comprehensive mechanisms for authentication and authorization of entities and operations.
Jaroš, David. "Mikroelektronické časově-prostorové autentizační techniky." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234525.
Повний текст джерелаPhiri, Jackson. "A digital identity management system." Thesis, UWC, 2007. http://hdl.handle.net/11394/2871.
Повний текст джерелаThe recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system is proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user’s credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.
Marek, Martin. "Bezpečnost lokálních počítačových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229175.
Повний текст джерелаBülling, Emelie, and Annchristine Lind. "Vem granskar vem?" Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20758.
Повний текст джерелаProgram: Civilekonomprogrammet
Andersson, Fredrik, та Malmqvist Simon Cedergren. "Effective construction of data aggregation services in Java". Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20735.
Повний текст джерелаLarge quantities of data are generated daily by the end users of various services. This data is often provided by different providers, which creates a fragmented market where the end users have to utilize multiple applications in order to access all of their data. This can be counteracted by the development of aggregation services that gather data from multiple services to a combined endpoint. The development of these kinds of services does however run the risk of becoming costly and time-consuming since new code is written for several projects even though large portions of the functionality is similar. To avoid this, established technologies and frameworks can be utilized, thereby reusing the more general components. Which of the technologies are the best suited, and thereby can be considered the most effective from a development perspective, can however be difficult to determine. This essay is therefore based on what can be considered an academic consensus through analysis of literature regarding earlier reasearch on the subject. Before the writing of the essay began a Java-based data aggregation service was developed, based on requirements from the company ÅF in Malmö. The purpose of this experimental implementation is to gather data from two separate services, and make them accessible on a unified endpoint.After the implementation was finished, work on the essay began. This consists of a literature review to investigate what technologies and frameworks that has been found best suited for this area of application by academic research. The results from this study are also used to analyze the extent of the correlation between the results and the requirements presented by ÅF regarding the experimental implementation. The literature review shows that the choices made by the company largely correlates with the technologies that the academic research has found best suited for this area of application. This includes OAuth 2.0 for authentication, JSON as a serialization format and REST for communications architecture. The literature review also indicates a possible gap within the available academic literature since searches regarding specific pieces of software related to the subject only results in a small amount of articles.
Khan, Hiba. "What Are the Security Challenges Concerning Maintenance Data in the Railway Industry." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75741.
Повний текст джерелаVillar, Melissa Vieira Fernandes. "Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas." Universidade Federal do CearÃ, 2007. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=2047.
Повний текст джерелаDue to increasing threats inherent to the information systems, the use of authentication and authorization mechanisms based in login and password does not enough to assure the information security. This work proposes a new model of authentication and authorization for distributed applications, based in hash and attributes certificates. Hash is used in the application authentication process, while certificates of attributes specify privileges and other authorization information. Its use is managed by the privilege management infrastructure (PMI). In this work, we describe the architecture and the functioning of the model, as well the processes of the attributes certificates generation, authentication and authorization of the application. The proposed model was specified in Coloured Petri Nets and validated by simulation.
Foltýn, Petr. "Návrh a realizace jednotek modulárního přístupového systému." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229208.
Повний текст джерелаMazák, Matej. "Výber autentizačnej metódy pri prihlasovaní do elektronického bankovníctva v nadväznosti na zrušenie autentizácie GRID kartou." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358806.
Повний текст джерелаMORAES, Falkner de Área Leão. "SEGURANÇA E CONFIABILIDADE EM IDS BASEADOS EM AGENTES." Universidade Federal do Maranhão, 2009. http://tedebc.ufma.br:8080/jspui/handle/tede/1843.
Повний текст джерелаMade available in DSpace on 2017-08-21T12:14:23Z (GMT). No. of bitstreams: 1 Falkner de Arêa Leão Moraes.pdf: 2601896 bytes, checksum: 0fa8b49e3f279d911a70b4f78d9cbe08 (MD5) Previous issue date: 2009-02-16
Lack of security is a constant concern in open distributed systems. Threats are present within environments insecure, uncertain and constantly changing. Due to this problem, many tools for evaluating vulnerabilities of the network as well as for their protection are being developed as techniques for encryption and software systems such as antivirus, firewall and IDS (Intrusion Detection System). Among these, there are IDS systems that are being conceived, designed and implemented, using techniques executed by agents. However, it is necessary to assure security and reliability of exchanged messages inside IDS. For this purpose, this paper proposes a security solution for IDS based on agents. The proposed solution provides a methodology and a secure mechanism for communication among agents, through information protection configuration mechanisms, authentication and authorization, key control and messages persistence using XML. The proposed solution is implemented as an extension to the IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), whose architecture has an intelligent agent society that communicate in a cooperative way in a distributed environment. The implementation of the prototype and tests proposed in this work show the applicability of the proposed solution.
A falta de segurança é uma preocupação constante em sistemas distribuídos abertos. Ameaças estão presentes dentro de ambientes inseguros, incertos e que mudam constantemente. Devido a esses problemas, diversas ferramentas para avaliação de vulnerabilidades da rede, bem como para sua proteção, estão sendo desenvolvidas como técnicas de criptografia e softwares como antivírus, firewall e IDS (Intrusion Detection System). Dentre estas, destaca-se Sistemas IDS que estão crescentemente sendo concebidos, projetados e implementados, usando técnicas de segurança executadas por agentes. Entretanto, é necessário que a segurança e a confiabilidade das mensagens trocadas dentro de um sistema IDS sejam asseguradas. Para este fim, este trabalho propõe uma solução segura e confiável para IDS baseada em agentes. A solução propõe estabelecer um esquema de execução e comunicação segura dos agentes através de mecanismos de proteção de informações de configuração, autenticação e autorização, controle de chaves e persistência de mensagens do IDS, utilizando XML. A solução proposta é implementada como uma extensão do IDS-NIDIA (Network Intrusion Detection System based on Intelligent Agents), cuja arquitetura consiste em uma sociedade de agentes inteligentes que se comunicam de forma cooperativa em um ambiente distribuído. A implementação do protótipo e os testes apresentados neste trabalho demonstram a aplicabilidade da solução proposta.
Klaška, Patrik. "Návrh autentizace uživatelů ve společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378339.
Повний текст джерелаElis, Martin. "Datově úsporné zabezpečení cloudových úložišť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242018.
Повний текст джерелаGrešša, Pavol. "Vícedimenzionální přístup k WWW aplikacím." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236997.
Повний текст джерелаHåkansson, Daniel Clarke, and Markus Lundström. "Autentisering och Riskmedvetande : En studie om Lösenordshantering och Risktagande." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-36255.
Повний текст джерелаAfter regular discussions about whether authentication with static passwords is a good approach, an idea emerged to investigate how people handle their authentication credentials. This report tackles the task of mapping weaknesses associated with authentication regarding the method, as well as human security awareness and risk taking. During the study, a survey was conducted in which 100 people completely responded, all with varying age and employment. We asked how they value, create, and manage their passwords. The respondents were also tasked to take a position on a number of allegations, regarding their security awareness and risk-taking in connection with authentication.The result of the study shows that the majority reuse passwords to a very high extent. It also appears that a large majority uses memorization as the maintechnique for password management. The result also shows that respondents to a great extent think the complexity of the password is more important than its length. In addition, only 22% of respondents felt unsafe with a password that is 8 characters long, which is a low percentage since 8 characters are too weak today.Though the subject is complex, a combination of length and complexity is desirable to create a strong password. In addition to that the passwords must be unique to each service. Using memorization as its main method is unfortunately not applicable in these cases. A better strategy is to use, for example, a password manager or to generate a memorandum chant. For example, take the first letter of each word in one sentence, My cat is called Glenn he has 3 legs White nose & Redlink which can result in McicGhh3lWn&Rl. A good start to improve one’s password management is to firstly evaluate authentication credentials as valuable, read upon the subject, and then develop a strategy that is appropriate to one’s needs.
Hrdina, Jan. "Rámec pro tvorbu aplikací s podporou peer-to-peer spolupráce." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403189.
Повний текст джерелаParsa, Parnia, and Björn Hedlund. "Room management system : Integrating Raspberry Pi with Graph API." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70808.
Повний текст джерелаKukuruzovic, Naida. "Security Management : Fulfillment of the Government Requirements for a component assurance process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.
Повний текст джерелаFör varje organisation är det nödvändigt att skydda information från olika säkerhetshot. Att ha en effektiv säkerhetshantering är avgörande för att kunna skydda informationen. Denna process är komplex och många krav måste tillfredsställas. Problemet som detta examensarbete avser att lösa handlar om hur införandet av en assuransprocess kommer påverka Försvarsmakten. Denna process måste följas för att en lösning eller produkt ska godkännas till en specifik komponents säkerhetsnivå. Frågeställningen besvaras i första hand av en marknadsundersökning om säkerhetshantering. Olika säkerhetshanteringsstrategier undersöktes och de bästa säkerhetslösningar valdes. Lösningarna jämfördes därefter med de assuranskrav som anges i Försvarsmaktens KSF V3.1 (Krav på IT säkerhetsförmågor hos IT – system) som är den dokumentation som anger kraven för IT säkerhetsfunktioner i ett IT system. Lösningen som uppfyllde de flesta kraven valdes och modifierades för att uppfylla samtliga kraven. Slutligen rekommenderades en komponent assuransprocess, vilken skulle kunna användas för att avgöra vilken lösning eller produkt som skulle kunna användas samt på vilket sätt det skulle kunna användas. Möjligheten att införa sådana krav i förvärvet av vilken produkt eller tjänst det än gäller förser Försvarsmakten med garantier för att alla produkter eller tjänster är godkända enligt särskilda säkringsnivåer på samma sätt och därmed försäkras det svenska samhället att förfaranden inom svenska väpnade krafter dokumenteras samt skyddar landet och dess medborgare.
Säkerhetshantering, informationssäkerhet, autentisering, auktorisering, styrning, riskhantering, följsamhet, användaradministration
Oliveira, Pedro Ricardo. "Fayol: um sistema multi-agente de gerência e controle de acesso à plataforma Milos." Universidade do Vale do Rio dos Sinos, 2014. http://www.repositorio.jesuita.org.br/handle/UNISINOS/3219.
Повний текст джерелаMade available in DSpace on 2015-04-01T14:03:45Z (GMT). No. of bitstreams: 1 Pedro Ricardo Oliveira.pdf: 3516247 bytes, checksum: fe607fb7b2a6385ce7dccf6748ccdfe9 (MD5) Previous issue date: 2014-01-31
Nenhuma
A utilização crescente de objetos de aprendizagem e, em consequência, de plataformas de conteúdos que realizam as funções de armazenagem, criação, modificação e consulta de forma gerenciada e controlada, cria a necessidade de um mecanismo de autorização e controle de acesso a estas plataformas. Inserido em uma plataforma de conteúdos específicos que suporta o ciclo de vida completo de objetos de aprendizagem, o presente trabalho tem por objetivo desenvolver uma ferramenta que irá prover os serviços de autenticação e autorização (controle de acesso) de forma integrada e compatível com as tecnologias relacionadas a ontologias, web semântica e agentes inteligentes de software, que compõem o ambiente operacional da plataforma. O trabalho procura explorar o potencial destas tecnologias e ferramentas, e sua efetividade na especificação e detalhamento de um modelo e mecanismo de autorização e controle de acesso. A análise do estado da arte mostra que a aplicação das tecnologias de sistemas multiagente e ontologias nas questões de autorização e controle de acesso é uma tendência de pesquisa importante, mas muito recente. Assim o trabalho pretende contribuir com o avanço dessas pesquisas. Ao propor um modelo ontológico completo para autenticação e controle de acesso, além de um mecanismo baseado em agentes, federado e com comunicação segura que implementa este modelo, a presente dissertação explora possibilidades ainda não consideradas nessa nova abordagem, mas presentes em mecanismos mais tradicionais de autenticação e autorização. A avaliação do modelo proposto e do mecanismo implementado foi realizada através de experimentos funcionais e de desempenho realizados em laboratório, seguindo a prática de avaliação dos mecanismos atuais de autenticação e autorização.
The increase use of learning objects and content platforms that perform the functions of storage, creation, modification and query of these objects on a managed and controlled manner, creates the need for mechanisms to control the access to these platforms. Inserted into a specific content platform that supports the complete life-cycle of learning objects, the present work aims to develop a tool that will provide authentication and authorization (access control) services, integrated and compatible with the technologies already in use on platform. The work makes use of ontologies, semantic web and intelligent software agents technologies that comprise the operating environment of the platform, looking to exploit the potential of these technologies and tools, and its effectiveness in the specification and detailing models and mechanisms for authentication and access control. The analysis of the state of the art shows that the application of multi-agent systems and ontologies technologies on authorization and access control questions is an important, but very recent, research trend. Thus, this work aims to contribute to the advancement of such research. This dissertation proposes an complete ontological model for authentication and access control plus an agent-based, federated and secure communication mechanism that implements this model. As a result, this dissertation explores possibilities not yet considered in this new approach, but present in more traditional mechanismos of authentication and authorization. The evaluation of the proposed model and the implemented mechanism was conducted through functional and performance laboratory experiments, following the practice of evaluation of existing mechanisms for authentication and authorization.
Rennét, Jiří. "Bezpečnost elektronického bankovnictví pro firmu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222646.
Повний текст джерелаCunha, Hugo Assis. "An architecture to resilient and highly available identity providers based on OpenID standard." Universidade Federal do Amazonas, 2014. http://tede.ufam.edu.br/handle/handle/4431.
Повний текст джерелаApproved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-07-20T14:08:11Z (GMT) No. of bitstreams: 1 Dissertação - Hugo Assis Cunha.pdf: 4753834 bytes, checksum: 4304c038b5fb3c322af4b88ba5d58195 (MD5)
Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-07-20T14:12:26Z (GMT) No. of bitstreams: 1 Dissertação - Hugo Assis Cunha.pdf: 4753834 bytes, checksum: 4304c038b5fb3c322af4b88ba5d58195 (MD5)
Made available in DSpace on 2015-07-20T14:12:26Z (GMT). No. of bitstreams: 1 Dissertação - Hugo Assis Cunha.pdf: 4753834 bytes, checksum: 4304c038b5fb3c322af4b88ba5d58195 (MD5) Previous issue date: 2014-09-26
Não Informada
Quando se trata de sistemas e serviços de autenticação seguros, há duas abordagens principais: a primeira procura estabelecer defesas para todo e qualquer tipo de ataque. Na verdade, a maioria dos serviços atuais utilizam esta abordagem, a qualsabe-sequeéinfactívelefalha. Nossapropostautilizaasegundaabordagem, a qual procura se defender de alguns ataques, porém assume que eventualmente o sistema pode sofrer uma intrusão ou falha e ao invés de tentar evitar, o sistema simplesmente as tolera através de mecanismos inteligentes que permitem manter o sistema atuando de maneira confiável e correta. Este trabalho apresenta uma arquiteturaresilienteparaserviçosdeautenticaçãobaseadosemOpenIDcomuso deprotocolosdetolerânciaafaltaseintrusões, bemcomoumprotótipofuncional da arquitetura. Por meio dos diversos testes realizados foi possível verificar que o sistema apresenta um desempenho melhor que um serviço de autenticação do OpenID padrão, ainda com muito mais resiliência, alta disponibilidade, proteção a dados sensíveis e tolerância a faltas e intrusões. Tudo isso sem perder a compatibilidade com os clientes OpenID atuais.
Secure authentication services and systems typically are based on two main approaches: the first one seeks to defend itself of all kind of attack. Actually, the major current services use this approach, which is known for present failures as well as being completely infeasible. Our proposal uses the second approach, which seeks to defend itself of some specific attacks, and assumes that eventually the system may suffer an intrusion or fault. Hence, the system does not try avoiding the problems, but tolerate them by using intelligent mechanisms which allow the system keep executing in a trustworthy and safe state. This research presents a resilient architecture to authentication services based on OpenID by the use of fault and intrusion tolerance protocols, as well as a functional prototype. Through the several performed tests, it was possible to note that our system presents a better performance than a standard OpenID service, but with additional resilience, high availability, protection of the sensitive data, beyond fault and intrusion tolerance, always keeping the compatibility with the current OpenID clients.
Касянчук, Н. В., та Л. М. Ткачук. "Захист інформації в базах даних". Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24448.
Повний текст джерелаThis article deals with the protection of information in databases and methods of protection. The basic methods of protecting information in databases revealed their positive and negative sides. Also in this paper, the basic security model to provide access to the database and procedures identification, authentication and authorization in the DBMS
Čepelák, Tomáš. "Portál univerzálního protokolu řízení přístupu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220668.
Повний текст джерелаHuang, Po-Wei, and 黃博威. "Wireless LAN Authentication, Authorization, and Accounting by Association Service Monitoring." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/74045833884353599029.
Повний текст джерела國立暨南國際大學
資訊管理學系
92
Due to the advance of IEEE 802.11 wireless LANs (WLANs) and the wireless characteristics of WLANs, there are increasing demands for the authentication, authorization, and accounting (AAA) of WLANs. Currently, 802.1X with RADIUS is the only available and standard solution for WLAN AAA. The port-based network access control defined in IEEE 802.1X focuses on the development of authentication protocols. Mobile clients in a WLAN with 802.1X must support EAP and the same authentication scheme as the one of the 802.1X authentication server. To further support the other AAA functions, the WLAN should also support RADIUS services. That is, access points should act as a RADIUS client and authentication server is replaced by a RADIUS server. These increase the hardware/software requirements for WLAN AAA. In this thesis, we will propose a novel and simple WLAN AAA architecture based on association service monitoring. Via a real-time monitoring of association services happening in the WLAN, we can realize where and when the associations, disassociations, and reassociations of mobile clients happen. The association related services could be monitored efficiently by receiving the SNMP traps sent from access points. When receiving association related traps, the AAA server performs required AAA functions. If any authentication or authorization fails, the AAA server will send SNMP commands to the access point sending traps previously to disallow the access of a mobile client. For legal users, accounting can be performed according to the time and traffic between an association and the corresponding disassociation. It can be seen that no additional hardware and software are required in both mobile clients and access points. In addition, only the standard SNMP protocol is used for AAA. Therefore, our WLAN AAA architecture is simpler than previous approaches.