To see the other types of publications on this topic, follow the link: LDAP directory.

Journal articles on the topic 'LDAP directory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'LDAP directory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rajesh, Shah &. Maya Rathore. "PREVENTING LDAP INJECTION FROM MALICIOUS ATTACKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [FRTSSDS-18] (June 13, 2018): 52–55. https://doi.org/10.5281/zenodo.1288417.

Full text
Abstract:
It is common in web application to provide interactions between end-users and databases. These applications may be at risk to code injection attacks which come first of weak validation in the parameters that the users use. If one of these applications accept input from a client and execute it without first validating it, attackers have the potential to execute their own queries and thus extract sensitive information from the lightweight directory access protocol (LDAP) directory. LDAP services are the key components in companies. It is an Internet standard for accessing directory services. &nb
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Lei, Vijay Vaishnavi, and Art Vandenberg. "SOM Clustering to Promote Interoperability of Directory Metadata: A Grid-Enabled Genetic Algorithm Approach." JUCS - Journal of Universal Computer Science 16, no. (5) (2010): 800–820. https://doi.org/10.3217/jucs-016-05-0800.

Full text
Abstract:
Directories provide a general mechanism for describing resources and enabling information sharing within and across organizations. Directories must resolve differing structures and vocabularies in order to communicate effectively, and interoperability of the directories is becoming increasingly important. This study proposes an approach that integrates a genetic algorithm with a neural network based clustering algorithm - Self-Organizing Maps (SOM) - to systematically cluster directory metadata, highlight similar structures, recognize developing patterns of practice, and potentially promote ho
APA, Harvard, Vancouver, ISO, and other styles
3

Rajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.

Full text
Abstract:
Nowadays, companies are mandating LDAP authentication between internal applications due to security attacks. LDAP, or Lightweight Directory Access Protocol, offers a secure way to verify user identities. This protocol helps protect sensitive data and prevents unauthorized access. Cybersecurity risks have increased, making robust authentication essential. LDAP provides a standardized method to manage user access and enhance security. It also helps companies comply with regulatory requirements. With the help of LDAP, companies can reduce vulnerabilities and improve their overall security posture
APA, Harvard, Vancouver, ISO, and other styles
4

Rajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.

Full text
Abstract:
Nowadays, companies are mandating LDAP authentication between internal applications due to security attacks. LDAP, or Lightweight Directory Access Protocol, offers a secure way to verify user identities. This protocol helps protect sensitive data and prevents unauthorized access. Cybersecurity risks have increased, making robust authentication essential. LDAP provides a standardized method to manage user access and enhance security. It also helps companies comply with regulatory requirements. With the help of LDAP, companies can reduce vulnerabilities and improve their overall security posture
APA, Harvard, Vancouver, ISO, and other styles
5

Rajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.

Full text
Abstract:
Nowadays, companies are mandating LDAP authentication between internal applications due to security attacks. LDAP, or Lightweight Directory Access Protocol, offers a secure way to verify user identities. This protocol helps protect sensitive data and prevents unauthorized access. Cybersecurity risks have increased, making robust authentication essential. LDAP provides a standardized method to manage user access and enhance security. It also helps companies comply with regulatory requirements. With the help of LDAP, companies can reduce vulnerabilities and improve their overall security posture
APA, Harvard, Vancouver, ISO, and other styles
6

Rajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.

Full text
Abstract:
Nowadays, companies are mandating LDAP authentication between internal applications due to security attacks. LDAP, or Lightweight Directory Access Protocol, offers a secure way to verify user identities. This protocol helps protect sensitive data and prevents unauthorized access. Cybersecurity risks have increased, making robust authentication essential. LDAP provides a standardized method to manage user access and enhance security. It also helps companies comply with regulatory requirements. With the help of LDAP, companies can reduce vulnerabilities and improve their overall security posture
APA, Harvard, Vancouver, ISO, and other styles
7

Rajendraprasad, Chittimalla. "Mandating LDAP Authentication for Internal Applications: A Robust Solution to Cybersecurity Risks." Journal of Scientific and Engineering Research 5, no. 8 (2018): 165–70. https://doi.org/10.5281/zenodo.13472861.

Full text
Abstract:
Nowadays, companies are mandating LDAP authentication between internal applications due to security attacks. LDAP, or Lightweight Directory Access Protocol, offers a secure way to verify user identities. This protocol helps protect sensitive data and prevents unauthorized access. Cybersecurity risks have increased, making robust authentication essential. LDAP provides a standardized method to manage user access and enhance security. It also helps companies comply with regulatory requirements. With the help of LDAP, companies can reduce vulnerabilities and improve their overall security posture
APA, Harvard, Vancouver, ISO, and other styles
8

Shahriar, Hossain, Hisham Haddad, and Pranahita Bulusu. "LDAP Vulnerability Detection in Web Applications." International Journal of Secure Software Engineering 8, no. 4 (2017): 31–50. http://dx.doi.org/10.4018/ijsse.2017100102.

Full text
Abstract:
Lightweight Directory Access Protocol (LDAP) is commonly used in web applications to provide lookup information and enforcing authentication. Web applications may suffer from LDAP injection vulnerabilities that can lead to security breaches such as login bypass and privilege escalation. This paper1 proposes OCL fault injection-based detection of LDAP injection attacks. The authors extract design-level information and constraints expressed in OCL and then randomly alter them to generate test cases that have the capability to uncover LDAP injection vulnerabilities. The authors proposed approache
APA, Harvard, Vancouver, ISO, and other styles
9

Kurnianto, Agung, Danang Haryo Sulaksono, and Andy Rachman. "PENERAPAN SINGLE SIGN ON (SSO) PADA KEAMANAN JARINGAN DENGAN METODE LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) DI PT UNICHEM." KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika 3, no. 1 (2022): 20–26. http://dx.doi.org/10.31284/j.kernel.2022.v3i1.2045.

Full text
Abstract:
PT. Unichem merupakan salah satu perusahaan nasional yang bergerak di bidang manufaktur makanan seperti garam konsumsi, lada, beras, minyak dan lain sebagainya. Sebagai perusahaan maju, PT. Unichem telah mengadopsi penggunaan komputer dan jaringan lokal sebagai jalur komunikasi antar komputer client. Penggunaan jaringan LAN juga menjadi akses aplikasi yang terinstal pada komputer server. Selain untuk mengakses aplikasi, pada server juga terdapat local directory yang terbagi menjadi beberapa folder berdasarkan divisi kerja di perusahaan. Penggunaan local directory untuk menyimpan data-data doku
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Zhi Yuan, Wei Ping Huang, and Lei Yu. "Design and Implementation of Unified Identity Authentication System Based on LDAP in Digital Campus." Advanced Materials Research 912-914 (April 2014): 1213–17. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1213.

Full text
Abstract:
With the development of digital campus in university, more and more application systems have been used. In these systems, authentication function has been repeatedly design, which can be easy to cause multiple accounts and passwords, and brought inconvenience to users and administrators. Unified identity authentication system based on LDAP is a good solution to this problem. In this paper, based on the analysis of LDAP protocol and CAS, the unified identity authentication system built for digital campus is designed and implemented, and LDAP management system is also developed to achieve unifie
APA, Harvard, Vancouver, ISO, and other styles
11

Dokshin, A. D., M. M. Kovtsur, S. V. Prudnikov, and A. I. Targonskaya. "RESEARCH OF APPROACHES FOR AUTHENTICATION OF WIRELESS NETWORK USERS USING VARIOUS LDAP SOLUTIONS." H&ES Research 13, no. 3 (2021): 28–35. http://dx.doi.org/10.36724/2409-5419-2021-13-3-28-35.

Full text
Abstract:
Intoduction: every year, the technology of the IEEE802.11 family of networks is becoming more widespread and popular. Based on the possible risks, IT administrators take measures to protect their organizations. One of the ways to improve information security is to use IEEE802.1 x for user authorization. Purpose: the purpose of the study is to study various LDAP solutions for user authorization in a wireless network. Results: three variants of the centralized solution for authorization of users of a wireless network on the basis of operating systems are developed: Windows Server, Ubuntu Linux,
APA, Harvard, Vancouver, ISO, and other styles
12

Udayana, I. Putu Agus Eka Darma. "Integrasi Sistem Single Sign On Pada Sistem Informasi Akademik, Web Information System Dan Learning Management System Berbasis Central Authentication Service." Jurnal RESISTOR (Rekayasa Sistem Komputer) 1, no. 1 (2018): 48–54. http://dx.doi.org/10.31598/jurnalresistor.v1i1.265.

Full text
Abstract:
Elearning and web based information systems is a means to communicate and exchange information for academic purposes. Nowadays lightweight directory access protocol (LDAP) is a state of the art method of choice. With LDAP technologies user only need one username and password to access to multiple web based application, The problem is if the user wanted to do autentification said user had to input their credentials over and over again for each application. To solve that problem single sign on mechanism (SSO) is invented. With SSO user only need login once and they got all the same credentials w
APA, Harvard, Vancouver, ISO, and other styles
13

Ming, Jing Wei. "Research of Unified Authentication System Based on LDAP." Advanced Materials Research 756-759 (September 2013): 2163–67. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2163.

Full text
Abstract:
With the development of Internet technology, the increasing of the application service makes the enterprise network management and security more and more complex. Based on it, the enterprise portal needs a system with high performance for identity authentication management. In this, implements the research of unified identify authentication system through LDAP, designs a rational structure of the directory tree. Thus, All the application servers use the user information in the same directory. By the manner, the problem of disagreement and larger maintenance burden can be solved and the system
APA, Harvard, Vancouver, ISO, and other styles
14

Yerusalem, Muhammad Rozi, Adian Fatchur Rochim, and Kurniawan Teguh Martono. "Desain dan Implementasi Sistem Pembelajaran Jarak Jauh Di Program Studi Sistem Komputer." Jurnal Teknologi dan Sistem Komputer 3, no. 4 (2015): 481. http://dx.doi.org/10.14710/jtsiskom.3.4.2015.481-492.

Full text
Abstract:
Teknologi informasi saat ini digunakan pada berbagai bidang seperti pembelajaran. Pembelajaran yang dilakukan biasanya disebut dengan e-learning atau pembelajaran jarak jauh. Pembelajaran ini dilakukan dengan menggunakan media yang memungkinkan peserta didik/mahasiswa dan pengajar/dosen dapat melakukan aktivitas pembelajaran tanpa harus bertatap muka. Universitas Diponegoro memiliki sistem otentikasi terpusat berbasis Lightweight Directory Access Protocol. Sistem otentikasi ini menggunakan username dan password yang terdapat dalam server LDAP. Universitas Diponegoro memiliki sistem informasi a
APA, Harvard, Vancouver, ISO, and other styles
15

Maričić, Aleksandar. "INTEROPERABILNI ADAPTER ZA RAD SA LDAP SISTEMIMA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 35, no. 06 (2020): 1146–49. http://dx.doi.org/10.24867/08be35maricic.

Full text
Abstract:
U ovom radu istražen je način koriš­ćenja dva različita sistema informacione-bezbednosti – Microsoft Active Directory zasnovan na Windows plat­formi i OpenLDAP zasnovanog na Linux platformi, uo­čene su njihove sličnosti i razlike, razvijen je, implemen­tiran i verifikovan interoperabilni adapter za rad sa ova dva sistema informacione-bezbednosti koji omogućuje korišćenje administratorske i korisničke funkcionalnosti.
APA, Harvard, Vancouver, ISO, and other styles
16

Muchtar, Farkhana, Ajibade Lukuman Saheed, Mohd Helmy Abd Wahab, and Syed Zulkarnain Syed Idrus. "Query Operation in Trader Service: LDAP Directory versus Database." IOP Conference Series: Materials Science and Engineering 917 (September 22, 2020): 012052. http://dx.doi.org/10.1088/1757-899x/917/1/012052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shukla, Shridhar, and Anand Deshpande. "LDAP directory services- just another database application? (tutorial session)." ACM SIGMOD Record 29, no. 2 (2000): 580. http://dx.doi.org/10.1145/335191.335482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Наталья, С. К., А. Ш. Вячеслав, А. Г. Александр, Н. М. Виталий та Е. Л. Артем. "Централизованная система аутентификации в распределенной среде медицинских систем". Scientific works of KubSTU, № 1 (28 квітня 2025): 174–88. https://doi.org/10.26297/2312-9409.2025.1.1.

Full text
Abstract:
Статья посвящена исследованию возможностей централизованной си- стемы аутентификации в распределенных медицинских системах. Рассматриваются преиму- щества использования единой системы управления учетными данными, включая снижение риска утечек информации, упрощение процесса аутентификации для медицинских работни- ков и улучшение контроля доступа к конфиденциальной информации пациентов. Особое внимание уделено вопросам безопасности и удобства использования, а также возможным технологиям для реализации централизованной аутентификации, таким как LDAP, OpenID Connect, Active Directory, JWT и биомет
APA, Harvard, Vancouver, ISO, and other styles
19

Muttaqin, Ahmad Herdinal, Adian Fatchur Rochim, and Eko Didik Widianto. "Sistem Autentikasi Hotspot Menggunakan LDAP dan Radius pada Jaringan Internet Wireless Prodi Teknik Sistem Komputer." Jurnal Teknologi dan Sistem Komputer 4, no. 2 (2016): 282. http://dx.doi.org/10.14710/jtsiskom.4.2.2016.282-288.

Full text
Abstract:
Wireless network is a network utilizing radio waves that propagate openly. This network requires security to simplify the process by using user Authentication. One of technology that could be used in order to make it safer is a Lightweight Directory Access Protocol (LDAP) and Remote Authentication Dila In User Service (RADIUS). Computer Systems Engineering Department is one of the study program in the Faculty of Engineering, University of Diponegoro that reserve the internet service everyday for students need. However, internet wireless network in this department is not yet safe enough,for the
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Huan. "Study on Coordination of Heterogeneous Databases." Applied Mechanics and Materials 608-609 (October 2014): 336–42. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.336.

Full text
Abstract:
How to coordinate heterogeneous database to realize sharing and consistency of information not only is an important research subject in the database filed, but also is an emerging research hot spot in the field of database system. As a new development direction of computer software, it applies some new techniques to integrate the existing systems to develop new applications. The paper analyzes CSCW, XML, JDBC and heterogeneous database, and proposes a solution of heterogeneous database. The solution absorbs the thoughts of database meta data, middle ware and LDAP directory service.
APA, Harvard, Vancouver, ISO, and other styles
21

Jianghua Liang, V. K. Vaishnavi, and A. Vandenberg. "Clustering of LDAP directory schemas to facilitate information resources interoperability across organizations." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 36, no. 4 (2006): 631–42. http://dx.doi.org/10.1109/tsmca.2005.851277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sonpipare, Rohan. "Online Examination System." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1599–605. http://dx.doi.org/10.22214/ijraset.2022.42596.

Full text
Abstract:
Abstract: The online Examination portal is a web-based application for technical evaluation. The online examination portal not only replaces paperwork but also releases the workload of faculty. Most of the e-examination (Online Examinations) have fixed number of questions without randomizations, they have pool scalability. Online examination system is increasing rapidly with the change in scenario due to the pandemic, also it seems to be an easy, flexible, and secure methodology to carry the examinations effectively. Keywords: RDBMS- Relational Database Management System, LDAP- Lightweight Dir
APA, Harvard, Vancouver, ISO, and other styles
23

Goel, Aviral, and Yogachandran Rahulamathavan. "A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility." Future Internet 17, no. 1 (2024): 1. https://doi.org/10.3390/fi17010001.

Full text
Abstract:
Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. This risks a single point of failure and other vulnerabilities. In response, decentralised techniques like blockchain and decentralised identities (DIDs) are being explored. This review paper performs a comparison of popular decentralised identity management (DIM) protocols, such as self-sovereign identity (SSI), against traditional centralised approaches such
APA, Harvard, Vancouver, ISO, and other styles
24

Yin, Zhen, and Scott Uk-Jin Lee. "Security Analysis of Web Open-Source Projects Based on Java and PHP." Electronics 12, no. 12 (2023): 2618. http://dx.doi.org/10.3390/electronics12122618.

Full text
Abstract:
During website development, the selection of suitable computer language and reasonable use of relevant open-source projects is imperative. Although the two languages, PHP and Java, have been extensively investigated in this context, there are not many security test reports based on their open-source projects. In this article, we conducted separate security analyses on web-related open-source projects based on PHP and Java. To this end, different open-source frameworks and services are used to design websites used to test experimental attacks on 12 popular open-source filters available on GitHu
APA, Harvard, Vancouver, ISO, and other styles
25

Divyabharathi D. N. and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." International Journal of Security and Privacy in Pervasive Computing 12, no. 3 (2020): 46–53. http://dx.doi.org/10.4018/ijsppc.2020070104.

Full text
Abstract:
KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, suc
APA, Harvard, Vancouver, ISO, and other styles
26

Rahmad, Gunawan, Ab Ghani Hadhrami, Khamis Nurulaqilla, Al Amien Januar, and Ismanto Edi. "Deep learning approach to DDoS attack with imbalanced data at the application layer." TELKOMNIKA 21, no. 05 (2023): 1060–67. https://doi.org/10.12928/telkomnika.v21i5.24857.

Full text
Abstract:
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access d
APA, Harvard, Vancouver, ISO, and other styles
27

Staebler, Reinhard M., Bryan J. Miller, Paul J. Rakow, and Thomas Koch. "Connector Architecture for Computer-Assisted Design and Manufacturing Systems." Journal of Ship Production 20, no. 04 (2004): 262–68. http://dx.doi.org/10.5957/jsp.2004.20.4.262.

Full text
Abstract:
Flexible integration concepts for computer-assisted design (CAD) and manufacturing (CAM) systems have been identified as a key to let shipyards select and implement best-in-class software components for their CAD and CAM operations. Current implementations are dominated by bilateral links based on proprietary data exchange formats and are too complex to upgrade parts of a CAD/CAM infrastructure without negative impacts on the other parts. This paper describes the ongoing development of a connector architecture for CAD and CAM systems in shipbuilding. The architecture decouples CAD and CAM syst
APA, Harvard, Vancouver, ISO, and other styles
28

Kerta, Johan Muliadi, Panji Adiprabowo, Eva Kusmiyati, and Sylvia Astri Wulandari Rahardjo. "Penggunaan Single Sign On (SSO) pada Jaringan Internet Badan Pengkajian dan Penerapan Teknologi (BPPT)." ComTech: Computer, Mathematics and Engineering Applications 2, no. 2 (2011): 880. http://dx.doi.org/10.21512/comtech.v2i2.2838.

Full text
Abstract:
Using various applications needs more than one authentication or user and password to login. Users in BPPT found this problem on their network application. Implementation of Single Sign On can help users to use only one authentication for many applications. Therefore a research is conducted to design and implement Single Sign On system that simplify and facilitate the user's email account to access application. Data are collected from literature study, system observation, and interviews while the design uses Network Development Life Cycle (NDLC) method. The research results in a Single Sign On
APA, Harvard, Vancouver, ISO, and other styles
29

Zaman, Shanza, Imran Ahmad, Nazish Waqar, Ayesha Javed, Fakhra Bashir, and Sehrish Munir. "Bridging Bridging Gaps in Active Directory Security: Threat Landscape, Limitations, and Future-Proof Solutions." International Journal for Electronic Crime Investigation 9, no. 1 (2025): 1–21. https://doi.org/10.54692/ijeci.2025.0901/245.

Full text
Abstract:
Although Windows Active Directory (AD) is the foundation of organizational identity and access management, cyberattacks frequently target it because of its widespread use. Four main categories are used in this paper to analyze important AD vulnerabilities from 2021–2024: (3) protocol flaws (NTLM relay, LDAP injection), (2) permissions and group policy errors, (3) credential-based attacks (e.g., pass-the-hash, Kerberoasting), and (4) sophisticated persistence strategies like DCShadow assaults. Over 90% of organizational breaches take advantage of AD vulnerabilities, according to findings, frequ
APA, Harvard, Vancouver, ISO, and other styles
30

MUPPA, Kaushik Reddy. "Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview." International Journal of Information Security and Cybercrime 13, no. 2 (2024): 9–17. https://doi.org/10.19107/ijisc.2024.02.01.

Full text
Abstract:
The article aims to impart an overview of integrating artificial intelligence (AI) with identity and access management (IAM) systems and their strategic view regarding evolution, benefits, and challenges. Solid IAM systems are bulwarks of defense that shield sensitive information from sophisticated digital threats. The evolution of IAM during these last three decades - from modules such as Lightweight Directory Access Protocol (LDAP) to developed systems - has made inroads into handling the contemporary complexities of modern security protocols. It is AI that boosts IAM to real-time threat det
APA, Harvard, Vancouver, ISO, and other styles
31

Rasooli, Abdul Qadeer, Khan Mohammad Habibi, and Sahnosh Rahguzar. "INTEGRATION OF APPLICATION LAYER SERVICES WITH CENTRAL AUTHENTICATION SERVER IN EXAMPLE OF HTTP AND FTP RESTRICTION." ZONAsi: Jurnal Sistem Informasi 4, no. 1 (2022): 1–17. http://dx.doi.org/10.31849/zn.v4i1.8668.

Full text
Abstract:
Nowadays it is very important to have an authenticated and secure network. hackers are always one step further and try to steal credentials or doing malicious actions. Many organizations implement strong authentication systems for taking drastic security measures to prevent threats and vulnerabilities. This paper describes integration of application layer services with central authentication server called Lightweight Directory Access Protocol(LDAP), it covers detailed mechanism to control and restrict any software application or network services which may implement and require central authenti
APA, Harvard, Vancouver, ISO, and other styles
32

Fragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (2022): 6375. http://dx.doi.org/10.3390/en15176375.

Full text
Abstract:
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces and proprietary communications capabilities. Interoperable DER provides new monitoring and control capabilities. The existence of multiple entities with different roles and responsibilities within the DER ecosystem makes the Access Control (AC) mechanism necessary. In this paper, we introduce and compare two novel architectures, which provide
APA, Harvard, Vancouver, ISO, and other styles
33

Mejía Viteri, José Teodoro, María Isabel Gonzáles Valero, and Angel Rafael España León. "Gestión de Usuarios Con LDAP (Lightweight Directory Access Protocol) para el Acceso a los Servicios Tecnológicos y a la Información en las Empresas." Journal of Science and Research: Revista Ciencia e Investigación 1, CITT2016 (2016): 10–15. http://dx.doi.org/10.26910/issn.2528-8083vol1isscitt2016.2016pp10-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Jean, Kamanga Kamono,, Kankolongo Mulumba, Godelive, Ilunga Meji, Erick, and Kalala Kayembe, Barthelemy. "Enhanced Algorithm for Modular Isomorphism Problem Resolution in Small Group Orders." international journal of mathematics and computer research 12, no. 03 (2024): 4073–90. http://dx.doi.org/10.47191/ijmcr/v12i3.01.

Full text
Abstract:
Radius centralizes logins and passwords. This is a server protocol. It should be noted that the server, Radius, manages authentication for clients, routers and switches. Radius is simply a remote authentication protocol used to centralize authentication data and manage user connections to remote services. This protocol relies primarily on a server (DARIUS server), linked to an identification base (database, LDAP directory, etc.). A Radius client, called NAS (Network Access Server), acting as intermediary between the end-user and the server. All transactions between the Radius client and the se
APA, Harvard, Vancouver, ISO, and other styles
35

Kamanga, Kamono Jean, Mulumba Godelive Kankolongo, Meji Erick Ilunga, and Kayembe Barthelemy Kalala. "Study of Securing A Wireless Network with A Radius Server." International Journal Of Mathematics And Computer Research 12, no. 03 (2024): 4073–90. https://doi.org/10.5281/zenodo.10821639.

Full text
Abstract:
Radius centralizes logins and passwords. This is a server protocol. It should be noted that the server, Radius, manages authentication for clients, routers and switches. Radius is simply a remote authentication protocol used to centralize authentication data and manage user connections to remote services.  This protocol relies primarily on a server (DARIUS server), linked to an identification base (database, LDAP directory, etc.). A Radius client, called NAS (Network Access Server), acting as intermediary between the end-user and the server. All transactions between the Radius client and
APA, Harvard, Vancouver, ISO, and other styles
36

Chua, Chong Chyn, John Reynolds, Anoop Kumar Enjeti, et al. "An Australasian Leukemia Lymphoma Group (ALLG) Phase 2 Study to Investigate Novel Triplets to Extend Remission with Venetoclax in Elderly (INTERVENE) Acute Myeloid Leukemia." Blood 138, Supplement 1 (2021): 368. http://dx.doi.org/10.1182/blood-2021-149488.

Full text
Abstract:
Abstract Background: Adaptive resistance mechanisms leading to treatment failure have been identified in older patients receiving venetoclax (VEN) in combination with either azacitidine or low dose cytarabine (LDAC) as frontline therapy for acute myeloid leukemia (AML). These include the expansion or secondary emergence of kinase activating mutations, including FLT3-ITD in patients with non-adverse karyotype (NON-ADV), as well as TP53 mutations among patients with adverse karyotype (ADV)(DiNardo & Tiong et al, Blood 2020). INTERVENE is a phase 2 study evaluating the safety and efficacy of
APA, Harvard, Vancouver, ISO, and other styles
37

Mussai, Francis J., Ian Thomas, Cono Ariti, et al. "A Randomised Evaluation of Low-Dose Ara-C Plus BCT-100 Versus Low Dose Ara-C in Older Patients with Acute Myeloid Leukaemia: Results from the LI-1 Trial." Blood 138, Supplement 1 (2021): 2355. http://dx.doi.org/10.1182/blood-2021-148323.

Full text
Abstract:
Abstract Background: Among patients with Acute Myeloid Leukaemia (AML) over the age of 60, a considerable number are not considered suitable for intensive remission-induction chemotherapy. Survival in these patients is poor, whether they are treated using hypomethylating agents or low-dose ara-C (LDAC). The possibility of combination therapy with additional agents represents an attractive option. Arginine metabolism plays a key role in AML pathogenesis (Mussai et al. Blood 2013); BCT-100 is a pegylated recombinant human arginase that leads to a rapid depletion in extracellular and intracellula
APA, Harvard, Vancouver, ISO, and other styles
38

Tiong, Ing S., Sun Loo, Emad Uddin Abro, et al. "A Prospective Phase 2 Study of Venetoclax and Low Dose Ara-C (VALDAC) to Target Rising Molecular Measurable Residual Disease and Early Relapse in Acute Myeloid Leukemia." Blood 138, Supplement 1 (2021): 1261. http://dx.doi.org/10.1182/blood-2021-152583.

Full text
Abstract:
Abstract Introduction Rising molecular measurable residual disease (MRD) is an arbiter of clinical relapse in acute myeloid leukemia (AML). Venetoclax (VEN) is active against IDH and NPM1 mutant (mt) AML as monotherapy (Konopleva et al, 2016 and Chua et al, 2020) and can yield MRD negative remission when combined with low dose ara-C (LDAC) in patients unfit for intensive chemotherapy (DiNardo and Tiong et al, 2020). In a retrospective study, we showed that VEN in combination with hypomethylating agents or LDAC could erase rising NPM1mt MRD in 6/7 cases (Tiong et al, 2020). We now present a pro
APA, Harvard, Vancouver, ISO, and other styles
39

Pratz, Keith W., Andrew H. Wei, Daniel A. Pollyea, et al. "Management of Neutropenia during Venetoclax-Based Combination Treatment in Patients with Newly Diagnosed Acute Myeloid Leukemia." Blood 134, Supplement_1 (2019): 3897. http://dx.doi.org/10.1182/blood-2019-127423.

Full text
Abstract:
BACKGROUND: Venetoclax is a potent, oral BCL-2 inhibitor that results in rapid clearance of acute myeloid leukemia (AML) blasts leading to cytoreductions after initiation of treatment. Venetoclax in combination with hypomethylating agents (HMAs) or low dose cytarabine (LDAC) results in a high rate of response in patients with AML. For this reason, management of neutropenia after achievement of marrow response during venetoclax-based treatment, including dose delays, dose reductions, and supportive care are collectively important for optimizing patient outcomes. Here, management of neutropenia
APA, Harvard, Vancouver, ISO, and other styles
40

Cortes, Jorge E., Akil Merchant, Catriona Jamieson, et al. "Biomarkers of Overall Survival and Response to Glasdegib and Intensive or Non-Intensive Chemotherapy in Patients with Acute Myeloid Leukemia." Blood 132, Supplement 1 (2018): 2733. http://dx.doi.org/10.1182/blood-2018-99-111239.

Full text
Abstract:
Abstract Background: In a previously reported Phase 2 randomized study of patients with acute myeloid leukemia (AML), addition of the investigational agent glasdegib (PF-04449913) to low-dose cytarabine (LDAC) improved overall survival (OS) when compared with LDAC alone. In a non-randomized study arm, glasdegib together with 7+3 chemotherapy was well tolerated and associated with clinical activity. We used a comprehensive biomarker analysis, evaluating gene expression, circulating cytokine levels, and gene mutations, to identify molecular drivers that predict overall response (OR) and OS. Meth
APA, Harvard, Vancouver, ISO, and other styles
41

Maertens, Johan, Michael Lübbert, Walter Fiedler, et al. "Phase I/II Study of Volasertib (BI 6727), an Intravenous Polo-Like Kinase (Plk) Inhibitor, in Patients with Acute Myeloid Leukemia (AML): Results From the Randomized Phase II Part for Volasertib in Combination with Low-Dose Cytarabine (LDAC) Versus LDAC Monotherapy in Patients with Previously Untreated AML Ineligible for Intensive Treatment." Blood 120, no. 21 (2012): 411. http://dx.doi.org/10.1182/blood.v120.21.411.411.

Full text
Abstract:
Abstract Abstract 411 Background: LDAC is an established treatment option for patients (pts) with AML considered ineligible for intensive remission induction treatment. However, the outlook for pts who receive LDAC remains unsatisfactory, and novel therapeutic strategies are needed to improve clinical outcome in these pts. Plk1 plays a key role in mitosis and cell cycle progression and is an attractive target for novel therapeutic approaches in cancer. Volasertib (V) is a first-in-class, selective and potent cell cycle kinase inhibitor that induces mitotic arrest and apoptosis by targeting Plk
APA, Harvard, Vancouver, ISO, and other styles
42

Zeidan, Amer M., Michael W. Schuster, Jürgen Krauter, et al. "Clinical Benefit of Glasdegib in Combination with Azacitidine or Low-Dose Cytarabine in Patients with Acute Myeloid Leukemia." Blood 134, Supplement_1 (2019): 3916. http://dx.doi.org/10.1182/blood-2019-124034.

Full text
Abstract:
Introduction: Attempts to improve on the 20% complete remission (CR) rate and 10.4 month median overall survival (OS) in the frontline treatment (1L) of older unfit patients (pts) with acute myeloid leukemia (AML) using azacitidine (AZA) combination therapy have been met with cytopenic complications that may result in cycle (Cyc) 2 dose delays as frequently as 33% of the time. Glasdegib in combination with low-dose cytarabine (LDAC) showed superior overall survival vs LDAC alone in the BRIGHT AML 1003 trial that included pts with newly diagnosed AML who were ineligible for intensive chemothera
APA, Harvard, Vancouver, ISO, and other styles
43

Loges, Sonja, Michael Heuser, Jörg Chromik, et al. "The Combination of AXL Inhibitor Bemcentinib and Low Dose Cytarabine Is Well Tolerated and Efficacious in Elderly Relapsed AML Patients: Update from the Ongoing BGBC003 Phase II Trial (NCT02488408)." Blood 136, Supplement 1 (2020): 14. http://dx.doi.org/10.1182/blood-2020-136566.

Full text
Abstract:
Background Standard low dose cytarabine (LDAC) monotherapy in elderly previously-treated relapsed and primary resistant/refractory (R/R) AML patients unfit for intensive chemotherapy shows limited response (CR rate of up to 17%) and survival benefit (mOS 4-6 mos, Sarkozy, 2013). Hence this vulnerable patient population has significant unmet need for well tolerated and efficacious new treatments. Bemcentinib (BEM) is a selective small molecule inhibitor of AXL, a surface membrane protein kinase receptor mediating resistance to chemotherapeutic agents and decreased antitumor immune response. AXL
APA, Harvard, Vancouver, ISO, and other styles
44

Tiong, Ing S., Richard Dillon, Adam Ivey, et al. "Rapid Elimination of NPM1 Mutant Measurable Residual Disease (MRD) Using Low Intensity Venetoclax-Based Combinations in Acute Myeloid Leukemia (AML)." Blood 134, Supplement_1 (2019): 2648. http://dx.doi.org/10.1182/blood-2019-123899.

Full text
Abstract:
Introduction: Molecular MRD monitoring in NPM1 mutant (mut) AML is now standard of care in many countries as prospective clinical trials have demonstrated that suboptimal reduction and/or rising levels of NPM1mut transcript are associated with disease relapse (Ivey, NEJM 2016; Balsat, JCO 2017). Higher levels of NPM1mut MRD positivity are associated with poorer outcomes after allogeneic hematopoietic stem transplantation (allo-HSCT) (Dillon, EHA 2019). Data regarding the effectiveness of pre-emptive MRD intervention is scant. A reduction in NPM1mut MRD was reported in 17/33 (52%) receiving aza
APA, Harvard, Vancouver, ISO, and other styles
45

Swaminathan, Mahesh, Hagop M. Kantarjian, Naval Daver, et al. "The Combination of Quizartinib with Azacitidine or Low Dose Cytarabine Is Highly Active in Patients (Pts) with FLT3-ITD Mutated Myeloid Leukemias: Interim Report of a Phase I/II Trial." Blood 130, Suppl_1 (2017): 723. http://dx.doi.org/10.1182/blood.v130.suppl_1.723.723.

Full text
Abstract:
Abstract Background: FLT3-ITD mutation in acute myeloid leukemia (AML) is associated with early relapse and poor survival. Quizartinib inhibits FLT3 kinase activity potently and selectively. In phase I and II studies, the composite response rate was approximately 50% among pts with FLT3-ITD. There is in-vitro synergy between quizartinib and 5-azacitidine (AZA) or low dose cytarabine (LDAC). Adding quizartinib to AZA or LDAC may improve the overall response rate (ORR) and duration expected from the use of either agent alone. The primary objective of phase I is to determine dose limiting toxicit
APA, Harvard, Vancouver, ISO, and other styles
46

Copland, Mhairi, Cono Ariti, Ian Thomas, et al. "A Randomised Evaluation of Low-Dose Cytarabine Arabinoside Plus Lenalidomide Versus Single-Agent Low-Dose Cytarabine Arabinoside in Older Patients with Acute Myeloid Leukaemia: Results from the LI-1 Trial." Blood 138, Supplement 1 (2021): 1266. http://dx.doi.org/10.1182/blood-2021-147802.

Full text
Abstract:
Abstract Background: Many patients with Acute Myeloid Leukemia (AML) diagnosed after 60 years of age are not considered suitable for intensive remission induction chemotherapy, either due to co-morbidities or frailty associated with advanced age. Despite treatment with either a hypomethylating agent or low-dose cytarabine arabinoside (LDAC), survival is usually poor, with 1-year survival after LDAC of 24-37% in NCRI AML16 and historical arms of LI-1. Combination therapy with additional agents represents an attractive option, and has the potential to improve patient outcomes without substantial
APA, Harvard, Vancouver, ISO, and other styles
47

Seymour, John F., Hartmut Döhner, Aleksandra Butrym, et al. "Azacitidine (AZA) Versus Conventional Care Regimens (CCR) in Older Patients with Newly Diagnosed Acute Myeloid Leukemia (>30% Bone Marrow Blasts) with Morphologic Dysplastic Changes: A Subgroup Analysis of the AZA-AML-001 Trial." Blood 124, no. 21 (2014): 10. http://dx.doi.org/10.1182/blood.v124.21.10.10.

Full text
Abstract:
Abstract Background: AML is characterized by molecular heterogeneity; morphology and genetic alterations are important prognostic factors (Weinberg, 2009). In the large, phase 3, multicenter, randomized AZA-AML-001 study, AZA treatment (Tx) prolonged median overall survival (OS) vs CCR by ~4 months (10.4 vs 6.5 mo; p=0.1009) in older pts with newly diagnosed AML (>30% BM blasts). About 33% of patients (pts) in AZA-AML-001 had AML with morphologic dysplastic changes (AML-MDC). Aim: Determine effects of AZA vs CCR on OS, response, and safety in the subset of pts with AML-MDC in the AZA-AML-00
APA, Harvard, Vancouver, ISO, and other styles
48

Pratz, Keith W., Courtney D. DiNardo, Martha L. Arellano, et al. "Outcomes after Stem Cell Transplant in Older Patients with Acute Myeloid Leukemia Treated with Venetoclax-Based Therapies." Blood 134, Supplement_1 (2019): 264. http://dx.doi.org/10.1182/blood-2019-127251.

Full text
Abstract:
BACKGROUND: Allogenic hematopoietic stem cell transplant (SCT) is a potentially curative option for patients with acute myeloid leukemia (AML). However, patients who are older, are ineligible for intensive chemotherapy due to significant comorbidities, or have biologically aggressive and refractory disease are not often considered as viable SCT candidates. Venetoclax, a highly selective, potent BCL-2 inhibitor that induces apoptosis in AML cells, has resulted in high rates of durable remission when combined with hypomethylating agents (HMAs) or low dose cytarabine (LDAC), in older patients tra
APA, Harvard, Vancouver, ISO, and other styles
49

Pratz, Keith W., Panayiotis Panayiotidis, Christian Recher, et al. "Delays in Time to Deterioration of Health-Related Quality of Life Were Observed in Patients with Acute Myeloid Leukemia Receiving Venetoclax in Combination with Azacitidine or in Combination with Low-Dose Cytarabine." Blood 136, Supplement 1 (2020): 33–35. http://dx.doi.org/10.1182/blood-2020-133912.

Full text
Abstract:
Background : For patients (pts) with acute myeloid leukemia (AML), preserving and measuring perceptions of health-related quality of life (HRQoL) is important, particularly for those ineligible for intensive chemotherapy and with a poor prognosis, especially when evaluating new treatment regimens. This analysis from 2 Phase 3 trials, Viale-A (NCT02993523) and Viale-C (NCT03069352), evaluated HRQoL, including key symptoms and aspects of functioning, in pts with AML receiving venetoclax (VEN) co-administered with azacitidine (AZA) (Viale-A) or low-dose cytarabine (LDAC) (Viale-C). Methods: Viale
APA, Harvard, Vancouver, ISO, and other styles
50

Kantarjian, Hagop M., Mikkael A. Sekeres, Vincent Ribrag, et al. "Phase I Study to Assess the Safety and Tolerability of AZD1152 In Combination with Low Dose Cytosine Arabinoside In Patients with Acute Myeloid Leukemia (AML)." Blood 116, no. 21 (2010): 656. http://dx.doi.org/10.1182/blood.v116.21.656.656.

Full text
Abstract:
Abstract Abstract 656 Background: Aurora B kinase is a key mitosis regulator that is overexpressed in a range of malignancies, including AML. AZD1152 is a potent selective inhibitor of Aurora B kinase. This ascending dose cohort study was designed to assess the safety and tolerability of AZD1152 in combination with low dose cytosine arabinoside (LDAC), the only agent that has currently demonstrated a survival advantage over palliative care in older patients with AML. Methods: Patients aged ≥60 years with newly diagnosed AML unfit for intensive induction chemotherapy were included. Cohorts of 6
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!