Essays about: "thesis for authentication"
Showing result 6 - 10 of 221 essays containing the words thesis for authentication.
-
6. Tenant Separation on a multi-tenant microservice platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE
-
7. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE
-
8. The effect of human memory on password behavior : An investigation
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Passwords are widely used as a primary method of authentication and access control, making them a critical component in safeguarding digital assets. However, individuals’ password-related behaviors, such as password selection, memorization, and management, significantly impact the security of their accounts. READ MORE
-
9. Authentication challenges for people with neurodevelopmental disorders
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : We live in a world where we increasingly depend on information technology, as much of our work and education occurs online, often from home. An average user has an increasing amount of accounts for all kinds of online services, making authentication more and more important. READ MORE
-
10. Insider Threat For Service Account in Google Cloud Platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. READ MORE