Essays about: "Single Sign-on"
Showing result 1 - 5 of 23 essays containing the words Single Sign-on.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective
University essay from Linköpings universitet/Programvara och systemAbstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE
-
3. Automated Functional Tests for a Web Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : When developing a large application, many companies use techniques such as Test Driven Development in order to get a range of tests on which they later can validate their code with. This has become the standard in many work environments. READ MORE
-
4. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup
University essay from Linköpings universitet/InformationskodningAbstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE
-
5. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup
University essay from Linköpings universitet/InformationskodningAbstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE