Essays about: "authorization service"
Showing result 1 - 5 of 35 essays containing the words authorization service.
-
1. Web interface for a multi-purpose transmitter
University essay fromAbstract : The project described in this report aims to construct a web interface for a multi-purpose transmitter (MPT). The MPT is a submodule that is meant to be used in future chromatography systems. This bachelor thesis project is done at Cytiva in Uppsala. READ MORE
-
2. Insider Threat For Service Account in Google Cloud Platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE
-
3. Workflow-driven, dynamic authorization for Modular Automation systems
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE
-
4. Cloud native authorization
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : In the cloud native development approach, a single application can be developed with multiple self-contained services. Each service might be developed by different teams with different programming languages. Each service needs its authorization module. READ MORE
-
5. A case study of unauthorized login attempts against honeypots via remote desktop
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE