Essays about: "user authentication"
Showing result 1 - 5 of 157 essays containing the words user authentication.
-
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE
-
4. An Integrated Room Booking and Access Control System for Public Spaces
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE
-
5. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE