Advanced search

Showing result 1 - 5 of 221 essays matching the above criteria.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  3. 3. An Integrated Room Booking and Access Control System for Public Spaces

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jaffar Kamil; Mohamed Amer; [2023]
    Keywords : Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Abstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE

  4. 4. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  5. 5. Choosing authentication protocol for digital signatures : A comparison between SAML and OIDC

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Pontus Kågström; [2023]
    Keywords : OpenID Connect SAML OIDC Security Assertion markup language;

    Abstract : More and more companies are working toward digitizing their workflow and this has increased the necessity of digital signatures.An important part of digital signatures is the authentication process which is heavily regulated for Swedish government agencies by DIGG, DIGG only allows the use of Security Assertion Mark-up Language(SAML) for authentication but are looking into also allowing OpenID Connect(OIDC) and together with Swedish OIDC working group produce a specification. READ MORE