Essays about: "CREDENTIAL"

Showing result 11 - 15 of 17 essays containing the word CREDENTIAL.

  1. 11. Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device

    University essay from Karlstads universitet/Handelshögskolan

    Author : Daniel Lindegren; [2017]
    Keywords : User awareness; data transaction; usability; usable privacy; privacy enhancing technology; identity management system; CREDENTIAL; mobile;

    Abstract : Personal data is often disclosed with every registration, sharing, or request of an online service. With the increased usage of things connected to the Internet, users' information being collected and stored, the risks related to unknowingly sharing personal data increases. READ MORE

  2. 12. A Framework To Implement OpenID Connect Protocol For Federated Identity Management In Enterprises

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Akshay Rasiwasia; [2017]
    Keywords : FIM; SSO; OpenID Connect; OIDC; Single Sign On; Federated Identity Management;

    Abstract : Federated Identity Management (FIM) and Single-Sign-On (SSO) concepts improve both productivity andsecurity for organizations by assigning the responsibility of user data management and authentication toone single central entity called identity provider, and consequently, the users have to maintain only oneset of credential to access resources at multiple service provider. The implementation of any FIM and SSOprotocol is complex due to the involvement of multiple organizations, sensitive user data, and myriadsecurity issues. READ MORE

  3. 13. Detecting Impersonation Attacks in a Static WSN

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Viktor Selleby; Anton Lin; [2017]
    Keywords : Device Fingerprinting; IoT; Machine Learning; Machine to Machine Authentication; Impersonation Attacks; Spoofing Attacks; Wireless Sensor Network; Technology and Engineering;

    Abstract : The current state of security found in the IoT domain is highly flawed, a major problem being that the cryptographic keys used for authentication can be easily extracted and thus enable a myriad of impersonation attacks. In this MSc thesis a study is done of an authentication mechanism called device fingerprinting. READ MORE

  4. 14. Method for gesture based authentication in physical access control

    University essay from KTH/Maskinkonstruktion (Inst.)

    Author : JOAKIM OLSSON; [2016]
    Keywords : ;

    Abstract : ASSA Abloy är den största globala leverantören av intelligenta lås och säkerhetslösningar. Företaget strävar ständigt efter att utveckla nya och innovativa lösningar för fysisk passerkontroll. READ MORE

  5. 15. Challenges Faced by Immigrants with Higher Education in the Swedish Labour Market : A Qualitative Research of the Factors Influencing the Underutilization   of Immigrants’ Foreign Educational Credentials in the Swedish labour market

    University essay from Stockholms universitet/Institutionen för pedagogik och didaktik

    Author : Ahmed Faris Ahmed; [2016]
    Keywords : underutilization; Devaluation of foreign credentials; highly educated-immigrant; Inequality in labour market; challenges and barriers;

    Abstract : Generally, immigrants face different challenges adapting to their new environment while starting a new life in the new environment. One of these problems is related to employment as they find it difficult finding jobs in their host countries. READ MORE