Essays about: "authentication in cloud computing"
Showing result 1 - 5 of 15 essays containing the words authentication in cloud computing.
-
1. Identifying the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics, an experiment
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The ubiquity and speed of Internet access led over the past decade to an exponential increase in the use of thin clients and cloud computing, both taking advantage of the ability to remotely provide computing resources. The work investigates the role of remote display Protocol in behavioral biometric systems based on free-text keystroke dynamics. READ MORE
-
2. What Are the Security Challenges Concerning Maintenance Data in the Railway Industry
University essay from Luleå tekniska universitet/Digitala tjänster och systemAbstract : Recently, technology advancement has brought improvement in all the sectors, including the railway sector. The Internet of Things (IoT) based railway systems have immense potential to improve quality and systems that will enable more efficient, environmental friendly railway system. READ MORE
-
3. An Attack Model of Autonomous Systems of Systems
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : Context: In order to provide more functionalities and services, systems collaborate with each other creating more complex systems called Systems of Systems. Exploiting security vulnerabilities in such complex systems has an impact over system safety and it is not sufficient to analyze them separately in the development process. READ MORE
-
4. Security for Cloud Based Services
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE
-
5. Secure IDMS for Cloud Computing Environment
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Current practices includes the integration of IDMS system and OpenStack for easy, better, balanced provisioning, identity management and user management for different types of users in order to securely access the service on cloud platform. These solutions will provide the basic building block structure which provides the motivation to enterprises to come in, out, around the cloud services. READ MORE