Essays about: "Credential"
Showing result 1 - 5 of 17 essays containing the word Credential.
-
1. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE
-
2. Malicious Activity Detection in Encrypted Network Traffic using A Fully Homomorphic Encryption Method
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Everyone is in need for their own privacy and data protection, since encryption transmission was becoming common. Fully Homomorphic Encryption (FHE) has received increased attention because of its capability to execute calculations over the encoded domain. Through using FHE approach, model training can be properly outsourced. READ MORE
-
3. Publicly Auditable Privacy Revocation in Practice
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : PAPR Credentials is the name of a not yet published credential scheme that provides conditional privacy for its users. This means that an administrator can choose to revoke a user's anonymity. READ MORE
-
4. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE
-
5. A framework to unify application security testing in DevOps environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In recent years, companies and organizations have increasingly integrated software security testing into the software development life cycle using DevOps practices. The current integration approach introduces multiple challenges in an information technology environment that consists of a large number of software development projects and multiple software security testing tools. READ MORE