Essays about: "thesis for PKI SECURITY"

Showing result 1 - 5 of 14 essays containing the words thesis for PKI SECURITY.

  1. 1. Secure microservices communication between heterogeneous service meshes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zara Wajid Butt; [2022]
    Keywords : Service Mesh; Istio; Consul; Federation; Kubernetes; PKI; mTLS; Service Mesh; Istio; Consul; Federation; Kubernetes; PKI; mTLS;

    Abstract : Microservice architecture is an emerging paradigm that has been unceasingly adopted by large organizations to develop flexible, agile, and distributed applications. This architecture involves breaking a large monolithic application into multiple services that can be deployed and scaled autonomously. READ MORE

  2. 2. Longitudinal analysis of the certificate chains of big tech company domains

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Sebastian Klasson; Nina Lindström; [2021]
    Keywords : certificate authorities; CA; certificate chains; certificates; certificate validation; HTTPS; network security; internet security; PKI; Project Sonar; SSL; TLS; X.509;

    Abstract : The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. READ MORE

  3. 3. Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Carl Magnus Bruhner; Oscar Linnarsson; [2020]
    Keywords : certificate authorities; certificate lifetime; certificate overlap; certificate replacement; certificate validity; certificates; HTTPS; network security; PKI; Project Sonar; SSL; TLS; X.509;

    Abstract : Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. READ MORE

  4. 4. Two-factor Authentication in Smartphones: Implementations and Attacks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Christofer Ericson; [2015]
    Keywords : Technology and Engineering;

    Abstract : Two-factor authentication is the method of combining two so called authentication factors in order to enhance the security of user authentication. An authentication factor is defined as ”Something the user knows, has or is”. READ MORE

  5. 5. Internet of Things : Exploring and Securing a Future Concept

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Cristian Bude; Andreas Kervefors Bergstrand; [2015]
    Keywords : Internet of Things; IoT; information security; identification; authentication; secure communication; Internet of Things; IoT; informationssäkerhet; identifiering; autentisering; säker kommunikation;

    Abstract : Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. READ MORE