Essays about: "authorization model"

Showing result 1 - 5 of 28 essays containing the words authorization model.

  1. 1. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  2. 2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 3. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  4. 4. Interfacing Digital and Physical Twins with a Microservice Architecture

    University essay from Luleå tekniska universitet/Institutionen för teknikvetenskap och matematik

    Author : Oskar Wintercorn; [2022]
    Keywords : Arrowhead framework; Arrowhead; framework; IoT; IIoT; CPS; Digital Twins; Digital twin; golang; SOA; SoS; Service oriented architecture; system of systems;

    Abstract : Throughout history, humans have proven to develop and improve their quality of life constantly. Incorporating mechanical principles into otherwise manual labor was one such aspect. Today, introducing mechanization to the industry and steam power is regarded as the first industrial revolution. READ MORE

  5. 5. Evaluation of method for function control of test assay’s complementing and signaling enzymes

    University essay from Uppsala universitet/Institutionen för medicinsk cellbiologi

    Author : Alva Strand; [2022]
    Keywords : Nucleoside 5´-Diphosphate Kinase NdPK ; Adenosine 5´-Triphosphate ATP ; Rate-limiting enzyme; ß-Nicotinamide Adenine Dinucleotide ß-NADH ; Enzymatic specific activity.;

    Abstract : Nucleoside 5'-Diphosphate Kinase (NdPK EC 2.7.4.6) is an enzyme (phosphotransferase) with extraordinary characteristics due to its unique ability to transfer phosphor groups to interconvert all nucleoside di- and triphosphates as a part of the DNA synthesis. READ MORE