Advanced search

Showing result 6 - 10 of 15 essays matching the above criteria.

  1. 6. Leveraging an Active Directory for the Generation of Honeywords

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johan Lundström; [2018]
    Keywords : honeywords; passwords; authentication; password-based authentication; password cracking; deception techniques;

    Abstract : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. READ MORE

  2. 7. Operator authentication and accountability for SCADA servers when requests are forwarded by a middle layer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Gomez Gonzalez; [2018]
    Keywords : ;

    Abstract : Due to their critical nature, the actions performed by operators on IndustrialControl Systems (ICS) are subject to source authentication andaccountability. When commands are not send directly by the user, butforwarded by middle servers, the compromise of those severs threatensthe security of the whole architecture. READ MORE

  3. 8. Software Distributed Shared Memory Using the VIPS Coherence Protocol

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Magnus Norgren; [2015]
    Keywords : ;

    Abstract : A coherent global address space in a distributed system enables shared memory programming in a much larger scale than in a single multicore processor. The solution is to implement a software distributed shared memory (SWDSM) system since hardware support at this scale is non-existent. READ MORE

  4. 9. Resilient and optimized LDAP database implementation for a large scale HLR/HSS

    University essay from Institutionen för informationsteknologi

    Author : Erik Grafström; [2012]
    Keywords : ;

    Abstract : Telecommunications databases have high requirements on availability and real-time performance. The database implementation must be able to handle millions of active subscribers and thousands of concurrent  database requests. READ MORE

  5. 10. Federated Identity Management : AD FS for single sign-on and federated identity management

    University essay from Institutionen för informationsteknologi och medier

    Author : Carl Wikblom; [2012]
    Keywords : Federated identity management; active directory federation services; windows identity foundation; WS-Federation;

    Abstract : Organizations are continuously expanding their use of computer ser-vices. As the number of applications in an organization grows, so does the load on the user management. READ MORE