Advanced search
Showing result 6 - 10 of 15 essays matching the above criteria.
-
6. Leveraging an Active Directory for the Generation of Honeywords
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Honeywords, fake passwords that when used by an adversary are set to trigger an alarm, is one way of detecting security breaches. For them to be effective, however, they must resemble real passwords as closely as possible and thus, the construction of the honeywords is crucial. READ MORE
-
7. Operator authentication and accountability for SCADA servers when requests are forwarded by a middle layer
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Due to their critical nature, the actions performed by operators on IndustrialControl Systems (ICS) are subject to source authentication andaccountability. When commands are not send directly by the user, butforwarded by middle servers, the compromise of those severs threatensthe security of the whole architecture. READ MORE
-
8. Software Distributed Shared Memory Using the VIPS Coherence Protocol
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : A coherent global address space in a distributed system enables shared memory programming in a much larger scale than in a single multicore processor. The solution is to implement a software distributed shared memory (SWDSM) system since hardware support at this scale is non-existent. READ MORE
-
9. Resilient and optimized LDAP database implementation for a large scale HLR/HSS
University essay from Institutionen för informationsteknologiAbstract : Telecommunications databases have high requirements on availability and real-time performance. The database implementation must be able to handle millions of active subscribers and thousands of concurrent database requests. READ MORE
-
10. Federated Identity Management : AD FS for single sign-on and federated identity management
University essay from Institutionen för informationsteknologi och medierAbstract : Organizations are continuously expanding their use of computer ser-vices. As the number of applications in an organization grows, so does the load on the user management. READ MORE