Essays about: "Identity server"
Showing result 1 - 5 of 17 essays containing the words Identity server.
-
1. "Life is better when you girlboss together" : Building a Safe Space Within the Digital Sphere, a Case Study
University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Abstract : The study is located in feminist studies through the lens of cultural theory, more specifically in the area of "Girlhood studies", developed in the 1990s. The development of the field correlates with the rise of cultural goods targeted at girls: movies, music, and magazines as well as the development of teenagehood as an identity of its own right. READ MORE
-
2. eID in the e-learning Environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : At present, there are different Electronic Identity (eID) systems utilized in EU, resulting in difficulties to carry eID information and transfer eID data of e-learning systems from one EU country to another. A project entitled Secure idenTity acrOss boRders linKed (STORK) was launched to address this problem, by installing a Pan European Proxy Service (PEPS) server. READ MORE
-
3. Comparison of Machine Learning Models Used for Swedish Text Classification in Chat Messaging
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of social media and the use of mobile applications has led to increasing concerns regarding the content that is shared through these apps and whether they are being regulated or not. One of the problems that can arise due to a lack of regulation is that chat messages that are inappropriate or of profane nature can be allowed to be shared through these apps. READ MORE
-
4. A roadmap for ensuring SAML authentication using Identity server for on- premises and cloud
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Cloud-based applications especially SaaS applications have become essential for startups and various sized businesses. Adapting to these web applications helps to reduce operational costs and further provide flexibility in accessing individual data of the users. READ MORE
-
5. Near Real-time Detection of Masquerade attacks in Web applications : catching imposters using their browsing behavor
University essay from KTH/KommunikationsnätAbstract : This Thesis details the research on Machine Learning techniques that are central in performing Anomaly and Masquerade attack detection. The main focus is put on Web Applications because of their immense popularity and ubiquity. This popularity has led to an increase in attacks, making them the most targeted entry point to violate a system. READ MORE