Sökning: "User Authentication"
Visar resultat 1 - 5 av 203 uppsatser innehållade orden User Authentication.
1. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
Master-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. LÄS MER
2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. LÄS MER
3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. LÄS MER
4. An Integrated Room Booking and Access Control System for Public Spaces
Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. LÄS MER
5. Profile Based Access Control Model Using JSON Web Tokens
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. LÄS MER