Essays about: "dynamic access control"

Showing result 1 - 5 of 44 essays containing the words dynamic access control.

  1. 1. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  2. 2. Workflow-driven, dynamic authorization for Modular Automation systems

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Enna Basic; Ivan Radonjic; [2023]
    Keywords : industrial control systems; dynamic access control; authorization service; cyber security; modular automation;

    Abstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE

  3. 3. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  4. 4. Scalable Reinforcement Learning for Formation Control with Collision Avoidance : Localized policy gradient algorithm with continuous state and action space

    University essay from KTH/Skolan för teknikvetenskap (SCI); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreu Matoses Gimenez; [2023]
    Keywords : Control theory; Multi-agent systems; Distributed systems; Formation control; Collision avoidance; Reinforcement learning; Teoria de control; Sistemes multiagent; Sistemes distribuïts; Control de formació; Prevenció de col·lisions; Reinforcement Learning; Reglerteknik; Multi-agent system; Distribuerade system; formationskontroll; Kollisionsundvikande; Reinforcement learning; Teoría de control; Sistemas multiagente; Sistemas distribuidos; Control de formación; Prevención de colisiones; Reinforcement Learning;

    Abstract : In the last decades, significant theoretical advances have been made on the field of distributed mulit-agent control theory. One of the most common systems that can be modelled as multi-agent systems are the so called formation control problems, in which a network of mobile agents is controlled to move towards a desired final formation. READ MORE

  5. 5. Energy Sustainable Reinforcement Learning-based Adaptive Duty-Cycling in Wireless Sensor Networks-based Internet of Things Networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Nadia Charef; [2023]
    Keywords : Reinforcement Learning; Q-learning; Dynamic Energy Management; Energy Sustainabiltiy; IEEE802.15.4 MAC Protocol; Adaptive Duty Cycling; Wireless Sensors Networks; Internet of Things;

    Abstract : The Internet of Things (IoT) is widely adopted across various fields due to its flexibility and low cost. Energy-harvesting Wireless Sensor Networks (WSNs) are becoming a building block of many IoT applications and provide a perpetual source of energy to power energy-constrained IoT devices. READ MORE