Essays about: "Authentication Server"

Showing result 1 - 5 of 54 essays containing the words Authentication Server.

  1. 1. Tenant Separation on a multi-tenant microservice platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Axel Sandqvist; [2023]
    Keywords : multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Abstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE

  2. 2. PERFORMANCE ANALYSIS OF RADIUS AND DIAMETER AUTHENTICATION SYSTEMS IN 802.1X BASED SECURED NETWORKS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nadim Rahimi; [2022]
    Keywords : IEEE802.1X; Port-Based Authentication; RADIUS; Diameter; EAP; NAS; AAA;

    Abstract : There is increasing attention to the security challenges of IT-OT networks. Mitigating these challenges needs sophisticated methods to secure such networks, especially by securing access to the network. One valuable strategy that provides security to the network access level is Port-Based Authentication. READ MORE

  3. 3. Vulnerability assessment of IoT-based Smart Lighting Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Saram Zafar; [2022]
    Keywords : ;

    Abstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE

  4. 4. Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jiahao Wang; [2022]
    Keywords : Wi-Fi Aware; Secure Service Discovery; Bloom Filter; TESLA; Client Puzzle; Wi-Fi Aware; Säker Serviceupptäckt; Bloom Filter; TESLA; Klient Pussel;

    Abstract : In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. READ MORE

  5. 5. How mail components on the server side detects and process undesired emails : a systematic literature review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Anton Ahlborg; [2021]
    Keywords : ;

    Abstract : As the use of emails increases constantly every year, so do the reports of various victims in society, on companies and individuals who have been affected by these undesirable emails in the form of spam, spoofing and phishing in their inbox. The effect of undesirable emails are many, but in summary, they cost the society and organization immense amount of money. READ MORE