Essays about: "authentication in cloud computing"

Showing result 1 - 5 of 15 essays containing the words authentication in cloud computing.

  1. 1. Identifying the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics, an experiment

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alexandr Silonosov; [2020]
    Keywords : Behavioral biometric systems; free-text keystroke dynamics; virtual desktop infrastructure; remote display protocol; network latency;

    Abstract : The ubiquity and speed of Internet access led over the past decade to an exponential increase in the use of thin clients and cloud computing, both taking advantage of the ability to remotely provide computing resources. The work investigates the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics. READ MORE

  2. 2. What Are the Security Challenges Concerning Maintenance Data in the Railway Industry

    University essay from Luleå tekniska universitet/Digitala tjänster och system

    Author : Hiba Khan; [2019]
    Keywords : Cloud Computing; Railway; Identification; Internet Of Things; Authorization; Authentication.;

    Abstract : Recently, technology advancement has brought improvement in all the sectors, including the railway sector. The Internet of Things (IoT) based railway systems have immense potential to improve quality and systems that will enable more efficient, environmental friendly railway system. READ MORE

  3. 3. An Attack Model of Autonomous Systems of Systems

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Dzana Hanic; Amer Surkovic; [2018]
    Keywords : ;

    Abstract : Context: In order to provide more functionalities and services, systems collaborate with each other creating more complex systems called Systems of Systems. Exploiting security vulnerabilities in such complex systems has an impact over system safety and it is not sufficient to analyze them separately in the development process. READ MORE

  4. 4. Security for Cloud Based Services

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Sabrina Ali Tandra; S.M. Sarwarul Islam Rizvi; [2014]
    Keywords : cloud computing; security; risk; vulnerability; performance; Molntjänster; säkerhet; risk; sårbarhet; utförande;

    Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE

  5. 5. Secure IDMS for Cloud Computing Environment

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : ARUNENDRA NATH PANDEY; [2013]
    Keywords : ;

    Abstract : Current practices includes the integration of IDMS system and OpenStack for easy, better, balanced provisioning, identity management and user management for different types of users in order to securely access the service on cloud platform. These solutions will provide the basic building block structure which provides the motivation to enterprises to come in, out, around the cloud services. READ MORE