Essays about: "Credential"

Showing result 1 - 5 of 17 essays containing the word Credential.

  1. 1. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maryum Hamid; [2023]
    Keywords : HashiCorp Vault; Key Management System; Kubernetes; HashiCorp Vault; Key Management System; Kubernetes;

    Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE

  2. 2. Malicious Activity Detection in Encrypted Network Traffic using A Fully Homomorphic Encryption Method

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Resmi Adiyodi Madhavan; Ann Zenna Sajan; [2022]
    Keywords : Malicious Activity Detection; Cloud Computing; Network Traffic; Fully Homomorphic Encryption FHE ; Machine Learning; Random Forest RF ; Logistic Regession LR ;

    Abstract : Everyone is in need for their own privacy and data protection, since encryption transmission was becoming common. Fully Homomorphic Encryption (FHE) has received increased attention because of its capability to execute calculations over the encoded domain. Through using FHE approach, model training can be properly outsourced. READ MORE

  3. 3. Publicly Auditable Privacy Revocation in Practice

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Wilmer Nilsson; Patrik Kron; [2021]
    Keywords : crypto; cryptography; PAPR; conditional privacy; pseudonymous credentials; bitcoin; secret sharing schemes; secret sharing; VANETs; money laundering; trustless; publicly auditable privacy revocation; Technology and Engineering;

    Abstract : PAPR Credentials is the name of a not yet published credential scheme that provides conditional privacy for its users. This means that an administrator can choose to revoke a user's anonymity. READ MORE

  4. 4. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamid Noroozi; [2021]
    Keywords : Security; Privacy; Vehicular PKI; VPKI; Identity and Credential Management; Vehicular Communications; VANETs; Availability; Scalability; Resilient; Efficiency; Microservice; Container Orchestration; Cloud; Pseudonym Transition; Pseudonym Unlinkability.; Säkerhet; personlig integritet; identitet- och behörighetsuppgifter; tillgänglighet; skalbarhet; motståndskraftig; effektivitet; moln; pseudonymitet; anonymitet; ospårbarhet.;

    Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE

  5. 5. A framework to unify application security testing in DevOps environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Duc Quang Le; [2021]
    Keywords : Application security testing; software security; security in DevOps DevSec- Ops ; microservice framework; Testning; applikationssäkerhet; programvarusäkerhet; DevOps; mikrotjänst -arkitektur;

    Abstract : In recent years, companies and organizations have increasingly integrated software security testing into the software development life cycle using DevOps practices. The current integration approach introduces multiple challenges in an information technology environment that consists of a large number of software development projects and multiple software security testing tools. READ MORE