Essays about: "SSO"

Showing result 6 - 10 of 29 essays containing the word SSO.

  1. 6. Development of Operations Complement to the Space System Ontology

    University essay from Luleå tekniska universitet/Rymdteknik

    Author : Kiira Tiensuu; [2022]
    Keywords : space systems engineering; model-based systems engineering;

    Abstract : Space system development is a complex process that typically involves multiple stakeholders. Traditionally, information is captured and exchanged in the form of documents. Efficient exchange of information is crucial, but often challenging with the traditional document-based approach and multitude of stakeholders. READ MORE

  2. 7. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  3. 8. Implementation of a component to manage authorization for a web application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Victor Kai Oscar Paulsen; [2021]
    Keywords : SSO; Auth; Spring Boot; Okta; Web Application; Security; OAuth2.0; OIDC; Authorization code flow; API.; Technology and Engineering;

    Abstract : Examensarbetet utfördes i samarbete med Klarna i Giessen med syftet att utveckla en komponent i en del av en webbapplikation som hanterar autentisering. Komponenten skulle interagera med auktoriseringstjänsten försedd från Okta tillsammans med korrekt auktoriseringsflöde som en lösning för tillåten användning av webbapplikationen. READ MORE

  4. 9. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  5. 10. Patent Pools: An ‘Industry Solution’ to SEP disputesin 5G and Internet of Things : A quest for a successful Digital Single Market

    University essay from Uppsala universitet/Juridiska institutionen

    Author : Satyoki Koundinya; [2020]
    Keywords : ;

    Abstract : Patent pools are a source of collaborative efficiencies when they comprise of patents essential to astandard thereby facilitating access to useful technologies. Despite that, in the context oftelecommunication standards, attempts to create patent pools have seemingly not been successful,for example in 2G, 3G and 4G standards, owing to a lack of participation by SEP holders, whohave mostly engaged in bilateral negotiations. READ MORE