Essays about: "Web Application Security"

Showing result 1 - 5 of 90 essays containing the words Web Application Security.

  1. 1. REST API & Mobile Application

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi; Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Marcus Grimberg; Ludwig Nord; [2019]
    Keywords : REST API; REST; Mobile application; AWS; MongoDB; Python; Swagger; Api;

    Abstract : DH Anticounterfeit, a company working against counterfeit products, has a mobile application that lacks a proper back-end system to handle and store DH Anticounterfeits data. There are plenty of ways to go about to x this problem, but this thesis is focused on the development of a REST API that will be replacing the non-existent system. READ MORE

  2. 2. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem; Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : David Hilm; David Rahim; [2019]
    Keywords : Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Abstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE

  3. 3. Implementation and Security Evaluation of User-Customized Content in a Mobile Application

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Viktor Wällstedt; [2019]
    Keywords : ;

    Abstract : Companies offering a service application targeting a broad audience often have difficulties meeting all user requirements since many users have unique needs. Allowing users to define and create content for service applications themselves, which addresses their specific needs, would be a welcomed solution. READ MORE

  4. 4. A roadmap for ensuring SAML authentication using Identity server for on- premises and cloud

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Triveni Kodam; [2019]
    Keywords : SAML; IDP; IAM; Identity server; SP;

    Abstract : Cloud-based applications especially SaaS applications have become essential for startups and various sized businesses. Adapting to these web applications helps to reduce operational costs and further provide flexibility in accessing individual data of the users. READ MORE

  5. 5. A tool for visual analysis of permission-based data access on Android phones

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Ulf Magnusson; [2019]
    Keywords : Privacy; Database; Stored procedure; MySQL; Visualization; Java; ORM; Hibernate; JFreeChart;

    Abstract : Privacy is a topic of ever-increasing interest in the modern, connected world. With the advent of smart phones, the boundary between internet and the personal sphere has become less distinct. Most users of smart phones have very vague ideas of how various apps intrude on their privacy. READ MORE