Essays about: "autentisering"

Showing result 1 - 5 of 80 essays containing the word autentisering.

  1. 1. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  2. 2. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jose Luis Martin Navarro; [2023]
    Keywords : Anonymous authentication; privacy; ABS; participatory-sensing-systems; applied-cryptography; mobile-crowdsensing; Anonym autentisering; integritet; ABS; deltagande-avkänningssystem; tillämpad kryptografi; mobil-crowdsensing;

    Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE

  3. 3. Authentication challenges for people with neurodevelopmental disorders

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Patryk Chrzan; [2023]
    Keywords : Authentication; passwords; neurodevelopmental disorders; cybersecurity; disabilities; Autentisering; lösenord; neuropsykiatriska funktionsnedsättningar; datasäkerhet; funktionshinder;

    Abstract : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. READ MORE

  4. 4. Formally Verified Remote Attestation Protocols with Strong Authentication

    University essay from Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakulteten

    Author : Johannes Wilson; [2023]
    Keywords : ;

    Abstract : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. READ MORE

  5. 5. The trends in the offline password-guessing field : Offline guessing attack on Swedish real-life passwords

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Yasser Zarzour; Mohamad Alchtiwi; [2023]
    Keywords : Password security; password-guessing tool; password-guessing method; password-guessing technique; offline attack; Swedish password leak; Lösenordssäkerhet; lösenordsgissningsverktyg; lösenordsgissningsmetoder; lösenordsgissningstekniker; offline attack; svenska lösenordsläckor;

    Abstract : Password security is one of the most critical aspects of IT security, as password-based authentication is still the primary authentication method. Unfortunately, our passwords are subject to different types of weaknesses and various types of password-guessing attacks. READ MORE