Essays about: "thesis for authentication"
Showing result 11 - 15 of 221 essays containing the words thesis for authentication.
-
11. Formally Verified Remote Attestation Protocols with Strong Authentication
University essay from Linköpings universitet/Programvara och system; Linköpings universitet/Tekniska fakultetenAbstract : Most commodity processors available today provide hardware-supported security extensions. Remote attestation has been declared an important step towards providing security to users through such solutions, yet remote attestation has seen limited deployment in practice. READ MORE
-
12. Cybersecurity in home-office environments : An examination of security best practices post Covid
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The rapid growth of remote work has brought new challenges in ensuring cybersecurity in home-office environments. Based on a structured literature review and semi-structured interviews with industry professionals, this study investigates and identifies cybersecurity best practices for home-office environments post Covid and aims to fill existing research gaps by providing valuable new insights. READ MORE
-
13. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE
-
14. Privacy Preserving Biometric Multi-factor Authentication
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : This thesis investigates the viability of using Fully Homomorphic Encryption and Machine Learning to construct a privacy-preserving biometric multi-factor authentication system. The system is based on the architecture described as ”Model K - Store distributed, compare distributed” in ISO/IEC 24745:2022 and uses the Torus Fully Homomorphic Encryption scheme proposed by Chillotti et al. READ MORE
-
15. Secure log-management for an Apache Kafka-based data-streaming service
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE