Essays about: "Authentication in distributed systems"
Showing result 1 - 5 of 13 essays containing the words Authentication in distributed systems.
-
1. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE
-
2. Distributed Relay/Replay Attacks on GNSS Signals
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE
-
3. Investigation and Implementation of Federation Mechanisms of SVP
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The development of AI application on the edge devices require integrated data, algorithms, and tools. Big companies like Google and Apple have integrated data, algorithms, and tools for building end to end systems with optimized and dedicated hardware for deep learning applications. READ MORE
-
4. Security of dynamic authorisation for IoT through Blockchain technology
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with asymmetric key encryption that is handled by the centralized certificate authority infrastructure. READ MORE
-
5. Security for Cloud Based Services
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE