Essays about: "Authentication in distributed systems"

Showing result 1 - 5 of 13 essays containing the words Authentication in distributed systems.

  1. 1. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  2. 2. Distributed Relay/Replay Attacks on GNSS Signals

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Malte Lenhart; [2022]
    Keywords : Global Navigation Satellite System GNSS ; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Security; Satellitnavigeringssystem; Spoofing; Relay Replay Attack; Software Defined Radio SDR ; Säkerhet;

    Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE

  3. 3. Investigation and Implementation of Federation Mechanisms of SVP

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Babar Khan; [2020]
    Keywords : Bonseyes Marketplace; AI Engineering; Resource Federation; Federation mechanisms; Distributed Secure Virtual Premise;

    Abstract : The development of AI application on the edge devices require integrated data, algorithms, and tools. Big companies like Google and Apple have integrated data, algorithms, and tools for building end to end systems with optimized and dedicated hardware for deep learning applications. READ MORE

  4. 4. Security of dynamic authorisation for IoT through Blockchain technology

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Sandor; [2018]
    Keywords : Blockchain; IoT; Public Key Encryption; Public Key Infrastructure;

    Abstract : The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with asymmetric key encryption that is handled by the centralized certificate authority infrastructure. READ MORE

  5. 5. Security for Cloud Based Services

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Sabrina Ali Tandra; S.M. Sarwarul Islam Rizvi; [2014]
    Keywords : cloud computing; security; risk; vulnerability; performance; Molntjänster; säkerhet; risk; sårbarhet; utförande;

    Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE