Dissertations / Theses on the topic 'OAuth'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'OAuth.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lavesson, Alexander, and Christina Luostarinen. "OAuth 2.0 Authentication Plugin for SonarQube." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-67526.
Full textP, Svensson Gustav, and Filip Eriksson. "En säkerhetsanalys och jämförelse av SAML och OAuth." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166571.
Full textArshad, Elham. "Analysis of Oauth and CORS vulnerabilities in the wild." Doctoral thesis, Università degli studi di Trento, 2022. https://hdl.handle.net/11572/361123.
Full textAas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.
Full textEdin, Andreas. "Autentisering med OAuth 2.0 i SiteVision : Jämförelse mellan Java Portlets och WebApps." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-33878.
Full textDet övergripande syftet med detta projekt har varit att bidra till en effektiviserad digitalisering och individualisering. Målet för projektet har varit att undersöka alternativa tekniska lösningar för att göra egna tillägg i CMS:et SiteVision. Tillägg vars uppgift består i att hämta data från ett externt API (Office 365) som kräver autentisering med OAuth 2.0. Vidare har de alternativa tekniska lösningarna värderats och jämförts. Jämförelsen har gjorts utifrån kriterier som tagits fram genom intervjuer med utvecklare på ett IT-konsultbolag. Inom projektet har ett tillämpat exempel (POC) skapats för att visa exempel på hur tekniken kan användas. I detta exempel har Java Portlets använts för att implementera ovanstående funktionalitet. Även WebApps i SiteVision har studerats då den tekniken utgör ett alternativ till Java Portlets. Undersökningen visar att det är fullt möjligt att skapa ett eget tillägg i SiteVision som genomför autentisering med OAuth 2.0 och sedan använda denna för att hämta data från ett externt API. Resultaten från jämförelsen mellan de två olika teknikerna Java Portlets och WebApps visar att det finns för- och nackdelar med respektive teknik. Båda alternativen framstår som jämstarka i jämförelsen. De individuella omständigheterna kring ett framtida användande bör fälla avgörandet för vilken teknik som väljs.
Odyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.
Full textRibeiro, Alysson de Sousa. "Uma implementação do protocolo OAuth 2 em Erlang para uma arquitetura orientada a serviço." reponame:Repositório Institucional da UnB, 2017. http://repositorio.unb.br/handle/10482/24694.
Full textSubmitted by Albânia Cézar de Melo (albania@bce.unb.br) on 2017-09-11T15:42:55Z No. of bitstreams: 1 2017_AlyssondeSousaRibeiro.pdf: 1271389 bytes, checksum: 028f1e01f88580b2cbb9864a2c4e321e (MD5)
Approved for entry into archive by Raquel Viana (raquelviana@bce.unb.br) on 2017-10-03T16:16:19Z (GMT) No. of bitstreams: 1 2017_AlyssondeSousaRibeiro.pdf: 1271389 bytes, checksum: 028f1e01f88580b2cbb9864a2c4e321e (MD5)
Made available in DSpace on 2017-10-03T16:16:19Z (GMT). No. of bitstreams: 1 2017_AlyssondeSousaRibeiro.pdf: 1271389 bytes, checksum: 028f1e01f88580b2cbb9864a2c4e321e (MD5) Previous issue date: 2017-10-03
A utilização da Arquitetura Orientada a Serviço (SOA) oferece alguns benefícios, tais como: baixo acoplamento e interoperabilidade, sendo bastante utilizada para a integração de aplicações dentro de uma organização. Essa característica faz com que a arquitetura orientada a serviço seja utilizada na modernização de sistemas legados. No entanto, a sua implantação ainda merece alguns cuidados relacionados aos problemas de segurança. Este trabalho apresenta um mapeamento sistemático a cerca dos mecanismos de autenticação e autorização em SOA e levanta algumas questões de pesquisa, bem como alguns protocolos utilizados em SOA. Como resultado deste mapeamento foi identificado uma solução de autorização considerada adequada para a arquitetura utilizada pelo CPD para modernizar os seus sistemas legados. O protocolo OAuth 2.0 foi implementado no Enterprise Service Bus (ESB) que será utilizado para a modernização dos sistemas legados da UnB. Foram realizados testes de desempenho na solução permitindo verificar o aumento da latência introduzida pelo protocolo e a vazão média suportada. Foram realizadas ainda simulações de segurança com o objetivo de verificar o comportamento do protocolo implementado quando exposto a uma ataque de repetição.
The utilization of Service-Oriented Architecture (SOA) offers certain benefits, such as low coupling and interoperability. It widely used for the integration of applications within an organization. This characteristic makes it so service-oriented architecture is used in the modernization of legacy systems, being thoroughly discussed and used as an architecture solution for the modernization of the legacy systems of the IT Center (CPD) of University of Brasília (UnB). Nevertheless, its implementation still requires some care related to the security problems. This study presents a systematic mapping regarding the authentication and authorization mechanisms in SOA, and raises some research questions, as well as some of the protocols used in SOA. As a result of the mapping, an authorization solution considered adequate for the architecture used by the CPD to modernize its legacy systems was identified. The OAuth 2.0 protocol was implemented in the Enterprise Service Bus (ESB) that will be used for modernization of legacy systems of UnB. Performance tests were carried out in the solution allowing to check the increase in the latency introduced by the Protocol and the average flow supported. Simulations were carried out with the objective to verify the behavior of the Protocol implemented when exposed to a replay attack.
Maan, Narbir Singh, and Hamza Hanchi. "Secure Access for Public Clients to Web API:s with Minimum Performance Loss." Thesis, KTH, Data- och elektroteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-153731.
Full textMycket information finns numera tillgänglig via Web API:er på Internet och utan säkerhet och kryptering är det mycket lätt att illvilliga personer får tillgång till konfidentiellinformation. Målet är att ta reda på vilka olika säkerhetsmekanismer som finns tillgängliga för att tillhandahålla en säker kommunikation med ett Web API från webbklienter och mobila applikationer med så liten påverkan på prestanda. Kunskapsinhämtning, utveckling och underhållandet av lösningar är också viktiga aspeketer som tittats på vid utvärderingen av mekanismerna. Flera mekanismer finns att använda sig av för att säkra kommunkationen men de lämpliga mekanismerna för publika klienter är Digest Authentication och OAuth 2.0. De utvalda mekanismerna har utvecklats, testats, utvärderats med avseende på säkerhet, påverkan på prestanda och användbarhet utifrån ett företags perspektiv. Autentiserings- och behörighets-mekanismen som blev den utvalda var OAuth 2.0 då den har minst påverkan på prestandan och bättre säkerhets egenskaper än de andra mekanismerna.
Andersson, Fredrik, and Malmqvist Simon Cedergren. "Effective construction of data aggregation services in Java." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20735.
Full textLarge quantities of data are generated daily by the end users of various services. This data is often provided by different providers, which creates a fragmented market where the end users have to utilize multiple applications in order to access all of their data. This can be counteracted by the development of aggregation services that gather data from multiple services to a combined endpoint. The development of these kinds of services does however run the risk of becoming costly and time-consuming since new code is written for several projects even though large portions of the functionality is similar. To avoid this, established technologies and frameworks can be utilized, thereby reusing the more general components. Which of the technologies are the best suited, and thereby can be considered the most effective from a development perspective, can however be difficult to determine. This essay is therefore based on what can be considered an academic consensus through analysis of literature regarding earlier reasearch on the subject. Before the writing of the essay began a Java-based data aggregation service was developed, based on requirements from the company ÅF in Malmö. The purpose of this experimental implementation is to gather data from two separate services, and make them accessible on a unified endpoint.After the implementation was finished, work on the essay began. This consists of a literature review to investigate what technologies and frameworks that has been found best suited for this area of application by academic research. The results from this study are also used to analyze the extent of the correlation between the results and the requirements presented by ÅF regarding the experimental implementation. The literature review shows that the choices made by the company largely correlates with the technologies that the academic research has found best suited for this area of application. This includes OAuth 2.0 for authentication, JSON as a serialization format and REST for communications architecture. The literature review also indicates a possible gap within the available academic literature since searches regarding specific pieces of software related to the subject only results in a small amount of articles.
SHARIF, AMIR. "Analysis of Best Current Practices to Assist Native App Developers with Secure OAuth/OIDC Implementations." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1050122.
Full textRehnberg, Daniel. "SharePoints hemligheter : Ett integrationsprojekt i SiteVision." Thesis, Mittuniversitetet, Avdelningen för data- och systemvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-29940.
Full textIn this thesis project, SharePoint has been integrated in SiteVision. Several customers of SiteVision AB have requested an integration of SharePoint from SiteVision. Microsoft doesn’t provide any API for Java to SharePoint object model. SiteVision AB did not know in what form the customers wanted to access SharePoint from SiteVision but was keen to find out. The overall aim with this thesis has been to make an appealing integration of SharePoint from SiteVision possible. This has been accomplished by performing a study investigating what parts of SharePoint the customers wanted to access from SiteVision and in what form they wanted to access it. The study has been performed by qualitative interviews with some of the customers of SiteVision AB. The study has shown that the customers most of all wants to integrate the document management system of SharePoint. They want to be able to view SharePoint files inside SiteVision based on a provided folder, or file meta data. They also want to search for SharePoint files in SiteVision. An internal API for communication with SharePoint in Java has been constructed. Based on the customers’ requests, a SiteVision module that lists SharePoint files based on a folder has been created. Furthermore, a simple prototype for a search module has been constructed. The results from the study cannot be considered as representative of all customers but gave an indication of what should be developed first. The overall aim has been fulfilled but the modules need additional developing before they can be released.
Kaššák, Marián. "Návrh dílčí části informačního systému." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-400109.
Full textGrahn, Kristoffer. "Utredning och impementation av säkerhetslösningar för publika API:er." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-84184.
Full textThe thesis examines common security risks with public APIs and provides information about IIS, Apache, Nginx and OAuth 2.0 and some of the security modules they provide that can be implemented. IIS and Apache have builtin modules for handling Distributed-Denial-of-Service (DDoS) attacks that are compared against eachother through analyzing a existing report that tests two different DDoS attack types. The security solutions authentication modules are broken down into different types of verification processes, where it comes forth that the processes share a common security risk against Man-in-the-Middle (MitM) attacks. The report goes through how you can protect against MitM attacks with secure encryption protocols, Transport Layer Security (TLS), and analyzes the newest version TLS 1.3.
Emil, Söder. "Central autentisering för ett inbyggt system." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37482.
Full textCentral authentication is a method that has been around a long time to manage users tovarious network resources, such as computers, printers, and servers. At a time whenmany industries are upgrading and expanding to meet new requirements to be accessedfrom around the world, many systems need to be rebuilt. The work will be donetogether with HMS Industrial Networks AB and will investigate the possibility ofauthenticating users against a built-in controller centrally instead of locally, as it istoday. Theory will be commingled with experiments of possible implementations andfinally evaluated with all the facts and a conclusion will be presented.
Fedi, Alessandro. "Servizi Web Integrati con Applicazioni di Social Networking tramite Framework Spring Social." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textANDRADE, Marcos Tadeu de. "Mecanismos de autenticação e autorização em redes sociais virtuais: o caso futweet." Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2318.
Full textA crescente penetração da internet entre os mais diversos setores e camadas da sociedade favoreceu a popularização de novas formas de interação entre as pessoas que a utilizam. Dentre estas novas formas de interação, podemos destacar as redes sociais virtuais, que podem agregar usuários com interesses em comum. Várias redes sociais virtuais disponibilizam APIs de acesso às suas funcionalidades, o que gera a necessidade da existência de mecanismos de autenticação e autorização para os usuários ou aplicações que utilizam tais APIs. Alguns mecanismos são sustentados por protocolos já conhecidos e validados tanto no âmbito acadêmico quanto no profissional, como é o caso do Kerberos, que pode ser utilizado no processo de Single Sign-On, em que o usuário é autenticado uma única vez e acessa vários serviços a partir dessa autenticação. Um protocolo que tem sido adotado pelas principais redes sociais é o OAuth, que enfatiza a segurança das credenciais do usuário. Nesse contexto, um problema existente é o de como integrar as diversas formas de autenticação existentes nas mais variadas redes sociais virtuais em uma única aplicação web. Com o objetivo de prover uma solução para esse problema, foram adicionados mecanismos que tratam da autenticação de usuários provindos de redes sociais diversas ao jogo Futweet, que originalmente utilizava somente a rede social Twitter. Este trabalho descreve as formas de autenticação das principais redes sociais, indica uma possível solução para o problema citado anteriormente e descreve a implementação utilizada no Futweet
Hůla, Vladimír. "Herní webový portál - objektové programování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242147.
Full textCutler, Bryant Gordon. "Simple, Secure, Selective Delegation in Online Identify Systems." Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2515.pdf.
Full textMancuso, Antonio. "Sistema di fatturazione collegato a Google Drive." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6601/.
Full textAlaia, Vincenzo Maria. "Migrazione verso una architettura rest di un applicativo per l'inter library loan." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/6199/.
Full textGauffin, Christopher. "Addswift : En webbplattform för internetanvändare över hela världen." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34950.
Full textNya tekniker växer i rasande fart, men vilka är bäst för ens projekt? Hur lagrar man data på ett säkert sätt som följer den nya europeiska GDPR lagen? Hur planerar, utvecklar och genomför man ett projekt? Dessa är några få frågeställningar som undersökningen i denna rapport tar tittar närmare på. Rapporten grundar sig på en affärsidé och vision för ett företag som erbjuder avancerade produkter skapade med moderna webbteknologier. Det första steget för företagets utveckling är att skapa en prototyp av den första produkten, en webbplattform. Prototypen kommer att utvecklas efter en projektplan med handledningsmöten och användning av professionella verktyg som Gantt, WBS och Trello. Först och främst studeras teorin bakom om olika ramverk och tekniker men även en undersökning om GDPR och datasäkerhet. Designfasen kommer sedan vara det första momentet för projektets utformning där bland annat wireframes, sitemap och ERdiagram har skapats och dokumenterats. Valet av ramverk, främst Vue, Express och MongoDB samt datasäkerhetsstandarna JWT och Oauth kommer att förklaras och användas i prototypen som grund för projektets tekniska skapande. Slutligen presenteras resultatet av den färdiga prototypen tillsammans med en diskussion över problem som uppstod under projektets gång, förbättringar som behöver göras och vilka framtidsplaner som finns för den fullständiga webbplattformen.
Pezzulli, Francesco. "Analisi ed implementazione di un sistema Single Sign-On basato su Shibboleth e OpenID Connect." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textDASHTI, SALIMEH. "An Assisted Methodology to Conduct a Data Protection Impact Assessment." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1050120.
Full textToufanpanah, Monir. "Decision Support framework: Reliable Federated Single Sign-on." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-62594.
Full textBarcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.
Full textHoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.
Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
Yip, Shing-lam, and 葉成林. "Rendezvous under oath: weddingland." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1994. http://hub.hku.hk/bib/B31982219.
Full textYip, Shing-lam. "Rendezvous under oath : weddingland /." Hong Kong : University of Hong Kong, 1994. http://sunzi.lib.hku.hk/hkuto/record.jsp?B25944939.
Full textCallaway, Cathy L. "The oath in epic poetry /." Thesis, Connect to this title online; UW restricted, 1990. http://hdl.handle.net/1773/11449.
Full textBlythe, Jimmy G. Jr. "The oath of God in Hebrews." Thesis, Southeastern Baptist Theological Seminary, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10246169.
Full textThe author of Hebrews is concerned that the persecution of a spiritually immature and discouraged Christian community may cause them to relinquish their mission and lose certain rewards inherent to obedience. He argues that God swears an oath in Psalm 2 and Psalm 110 in order to assure his people of the certainty of his promises (Heb. 6:13–20). He demonstrates that specific elements of the divine oath have been fulfilled in Jesus Christ, guaranteeing the eventual consummation of the inaugurated promises of this oath and providing certain benefits that enable Christians to fulfill their divinely appointed mission. These embattled saints can endure attacks from their enemies because Jesus Christ is the anointed king who will utterly defeat his enemies, and he is the promised priest after the order of Melchizedek who grants direct access to his heavenly throne for the power to persevere faithfully in the last days. Therefore, the thesis is that the author of Hebrews views Psalm 2 and Psalm 110 as oaths of God, reassures his audience by proving that God is bringing to completion all the elements of his oaths, and encourages them to take advantage of the benefits provided by God’s oaths.
Hedmark, Alice. "Undersökning av webbsidors säkerhet vid användning avFacebook Login : Vidareutveckling och analys av OAuthGuard." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36859.
Full textSingle Sign-On (SSO) is an authentication process that allows a developer to delegate the authentication responsibility to a dedicated service. OAuth 2.0 is an authorization framework that often serves as a base for authentication layers to be built upon that in turn allows for SSO. An identity provider is the service that is responsible for handling user credentials and the authentication, two common identity providers are Google and Facebook that implement SSO with the authentication layers OpenID Connect respectively Facebooks own authentication layer. It has been shown that many clients using OAuth 2.0 as base for SSO make faulty implementations leading to security issues, a number of studies has proposed solutions to these issues but faulty implementations are continually being made. To create various tools to promote security in these contexts is a method where OAuthGuard has been developed with the vision to also directly protect the common website user directly from the browser. OAuthGuard has been used in an earlier study to analyze the security of clients using Google SSO and discovered that 50% of the analyzed clients had flaws, no comparable study has been done for clients using Facebook SSO, which is the second largest third party log in variant. This study made a comparable investigation for Facebook SSO clients with a further developed version of OAuthGuard and found that these clients suffer from flaws with a similar trend as the previous study with Google-SSO clients, although fewer Facebook-SSO clients suffer from these flaws. When further developing OAuthGuard a dumber of difficulties was discovered and the future of these kind of tools needs to be investigated. Further analysis needs to be done to assess if Facebook-SSO should be recommended over Google-SSO from a security perspective and also further exploration of new methods to promote security needs to be done.
Zapolskas, Vytautas. "Securing Cloud Storage Service." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18626.
Full textZiegler, Yael. "Promises to keep : the oath in biblical narrative /." Leiden : Brill, 2008. http://catalogue.bnf.fr/ark:/12148/cb41303576g.
Full textJosefsson, Ågren Fredrik, and Oscar Järpehult. "Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178035.
Full textSkaistys, Audrius. "Teisinis priesaikos institutas ir jo socialinis vaidmuo." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110613_152119-89712.
Full textThe subject matter of the research and its relevance The subject matter. In the present paper one of the inter-branch law institutes namely – the oath is being under discussion. The treatment of the problem embraces the development of law from time honored stages up to the present state. Within the period the law terms has changed considerately and the process is still in progress, especially in the sphere of the implementation of its functions. In the given paper the objects of research are the historical and native Lithuanian sources; i.e. the norms of national, international legal acts and the acts of other states in which the oath institution is called upon, as well as the Lithuanian law doctrine dealing with this problem. The general approach to the research of the juridical Oath Institution and its social significance has a long standing tradition in Lithuania. The cognition of the concept of the oath is an organic element of the law doctrine, as an integral formation, however has never yet received a deeper research either in legal norms or in theory. The given paper is an attempt to reveal the juridical and social essence of the oath, its evolution and transformation into a really meaningful juridical regulation of values and its fitting functions. It ought to be a concentration of the fundamental values stated in the Constitution and at the same time – an instrument of the assurance of their implementation. Rephrasing prof. A. Vaišvila „when explaining law (in this... [to full text]
Oluyitan, Emmanuel F. "Combating Corruption at the Grass-Roots Level: The Case of Individual Oath Takers." Antioch University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1429101146.
Full text真樹子, 小宮, and Makiko Komiya. "Bound by the Pentecostal oath : chivalric performance and the round table in Malory's Morte Darthur." Thesis, https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12864014/?lang=0, 2014. https://doors.doshisha.ac.jp/opac/opac_link/bibid/BB12864014/?lang=0.
Full textThis dissertation presents a more comprehensive study of Thomas Malory's Morte Darthur from the three aspects of the Round Table. I focus on the following elements especially: the evolution of the shape and significance of the Round Table; visual and verbal representations of the Round-Table ideal by means of tournaments and the Pentecostal Oath; the conflicts the table creates between fellowship and rivalry; the chasm between brothers bound by oath and those tied by blood; and its fall due to the violation of the Pentecostal Oath. Through these perspectives, I would like to reveal the functions of the Round Table and capture the essence of Le Morte Darthur.
博士(英文学)
Doctor of Philosophy in English Literature
同志社大学
Doshisha University
Boorer, Suzanne. "The promise of the land as oath : a key to the formation of the Pentateuch /." Berlin ; New York : W. de Gruyter, 1992. http://catalogue.bnf.fr/ark:/12148/cb35694138w.
Full textNovosad, Andrej. "Využití metod dolování dat pro analýzu sociálních sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236424.
Full textAndress, David Robert. "Order and democracy in Paris from the oath of the clergy to the tricolour terror, January-August 1791." Thesis, University of York, 1994. http://etheses.whiterose.ac.uk/14000/.
Full textWillet, Mary. "THE WORD OF A GENTLEMAN AND THE OATH OF A PATRIOT: Military Parole in the American Civil War." Thesis, Department of History, 2011. http://hdl.handle.net/2123/7995.
Full textROSSARO, SILVIA. "Archeologia e genealogia del giuramento nel mondo romano arcaico." Doctoral thesis, Università degli studi di Padova, 2014. http://hdl.handle.net/11577/3423746.
Full textOggetto della presente tesi è un complesso fenomeno, il giuramento, che da sempre suscita l’interesse di giuristi, storici, antropologi, etnologi, teologi, linguisti, filosofi, con riguardo ai suoi primi sviluppi nella più remota antichità romana. La complessità fenomenologica e concettuale del giuramento, collocato all’incrocio di territori e discipline diversi, è tale per cui nessuno di questi può interamente rivendicarlo, né può definirlo integralmente nella sua complessità e rilevanza globale. Di particolare pregio appare il tentativo di Paolo Prodi di individuare un nucleo «a-astorico e immobile» del giuramento-avvenimento, che consiste in un’invocazione della divinità come testimone e garanzia della verità/veracità di un’affermazione-dichiarazione o dell’impegno-promessa di compiere o aver compiuto una certa azione o di mantenere un certo comportamento in futuro, da parte di un individuo, che pone così in gioco la propria vita corporale e spirituale in base a comuni credenze che attingono alla sfera metapolitica. Appare, altresì, significativo ricondurre il giuramento ad una assunzione di responsabilità compiuta dall’individuo non di fronte al suo interlocutore, diretto interessato a quanto egli asserisce o promette, bensì di fronte ad un terzo estraneo a tale rapporto ovvero davanti alla divinità. Se si guarda all’epoca più antica, il giuramento si ritrova a fondamento dei più svariati rapporti, dai trattati internazionali al sacramentum militiae, dal iusiurandum tra privati alla legis actio sacramento. Taluni di questi, attratti ab antiquo nell’ambito della fides, originariamente trovano la propria fonte in un giuramento ovvero in un fondamento ad esso strettamente rapportabile. Si tratta di relazioni allora percepite in una conglobante dimensione religiosa, in cui l’aspetto giuridico risulta vincolato al valore di tipo sacrale connesso al giuramento. In epoca arcaica tale istituto sembra quasi creare una sorta di unità tra la vita quotidiana del soggetto, nonché della collettività, e la sfera religiosa che li sovrasta, ricollegando le vicende della vita sociale alle credenze religiose della comunità. Al fine di comprendere a fondo le origini di codesto istituto, si inizierà dall’analisi etimologica e dallo studio degli archetipi “Per Dius Fidius”, “Iovem lapidem” e “Ita me Hercules iuvet”, per poi passare a considerarne gli elementi costitutivi: i certa verba e il gesto, l’invocazione degli dèi e la maledizione dello spergiuro. Fissati i tratti generali del giuramento e la funzione ad esso propria, sensibile alle esigenze peculiari della realtà arcaica romana, si concluderà delineando i risvolti nell’ambito della sponsio, del foedus e dell’antica legis actio sacramento, con particolare attenzione all’evoluzione di tale istituto.
Nebiolo, Francesca. "« Nîš ilim zakârum ». Prêter serment à l’époque paléo-babylonienne : étude comparative des serments mésopotamiens du début du IIe millénaire av. J.-C., entre grammaire et société." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEP065.
Full textTaking oath is a human act presents in all historical societies. On this basis, this doctoral dissertation dedicated to the oath in the Old Babylonian period (2002-1595 BC) aims at analysing it from its grammatical, religious and social aspects. Thanks to a detailed study of a heterogeneous corpus that covers all the Mesopotamian cities of that time, we establish the grammatical components of the formulas of the oath, we follow their evolution over time and we observe the regional peculiarities detected. Establishing the grammatical structure of the oath thus makes it possible to better define it as a religious act which impacts society. The oath turns out to be the point of conjunction between religion, justice and royal power. In these three areas, it is used consistently to maintain a balance between human relationships, both inside the kingdoms and internationally. This philological and historical study of sources analyses the Old Babylonian oath as a mirror of a society relevant for its complexity
Arvidsson, Isac. "En undersökning och implementering för att hitta lämpligast teknik vid e-postläsning : En jämförelse mellan Outlook Mail REST API, Gmail API och IMAP4 baserat på prestanda och säkerhet." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39346.
Full textThe process to fetch email has for a long time been a difficult task because of the amount of different standards in email formats. Email can vary in different headers, format, max size and more based on which email supplier sends the mail. Older methods for fetching email as IMAP4 and POP3 still relies upon weak authentication processes. This project will therefore study the new technologies Gmail API and Outlook Mail REST API and compare these to IMAP4. The purpose of this study is to find a more effective and secure way of transferring emails from an email server to the system named Easit GO. Email transfers should be able to be scheduled in such a way that it is specified in a configuration file. To accomplish this three prototypes was implemented. Every prototype used on of the technologies to read email. To compare these prototypes there was a performance test through time measurements. To compare functionality there was a list setup of fixed functions showing which technologies that had support for that specific function. Security was based on the sensitive information that was stored in the configuration file. The result was that Outlook Mail REST API clearly beat the others on performance. This was because of outlooks ability of reading email in plain-text which leads to a substantially shorter parsing time. All of the technologies had similar functionality except for a few things. Outlook API had the possibility of reading email in plain-text which resulted in better performance. Gmail API did not have functionality to sort incoming email on oldest first. The study concluded that Outlook API and Gmail API were more secure than IMAP4 because of no passwords were saved or even used in the prototype. Both Outlook and Gmail used the authentication protocol Oauth2 which is more secure than IMAP4s Basic Authentication. The conclusion points to Outlook Mail REST API being the most suitable solution based on its performance and more modern authentication.
Zhang, Zhikun [Verfasser]. "From Guan Li to eighteen-year-old oath ceremony : a study of Chinese initiation rituals in the perspective of historical anthropology / Zhikun Zhang." Berlin : Freie Universität Berlin, 2008. http://d-nb.info/1023376156/34.
Full textStrine, C. A. "The Divine Oath and the Book of Ezekiel : an analysis of the meaning and function of the "As I Live" and "Lifted Hand" formulae." Thesis, University of Oxford, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.540123.
Full textGurney, Nicholas Scott. "As God as my witness: a contemporary analysis of theology's presence in the courtroom as it relates to the "oath or affirmation" requirement within the Florida rules of evidence." Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/390.
Full textB.A. and B.S.
Bachelors
Health and Public Affairs
Legal Studies
Mugno, Allison P. "Priming for Honesty: A Novel Technique for Encouraging Children's True Disclosures of Adult Wrongdoing." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3360.
Full textКравчук, Остап Леонідович. "Припинення державної служби за порушення присяги." Diss., Національний університет "Львівська політехніка", 2021. https://ena.lpnu.ua/handle/ntb/56729.
Full textMounier, Hélène. ""Tu rendras tes serments au Seigneur" : Une histoire politico-religieuse du serment. XVIe-XVIIIe siècle." Thesis, Montpellier 1, 2012. http://www.theses.fr/2012MON10039.
Full textThe oath represents a key instrument for calibrating the prominence of the religious sphere combined with the political situation that characterizes the early modern period (16th-18th century). Thus, it appears that particularly troubled times -religious wars, then the French revolution- present a regular use of the oath, primarily intended to reinforce the solidity of bonds and agreements. The use of the institution experiences an unprecedented evolution as early as the religious wars, thus highlighting the need to express ideological allegiance along with the traditional guarantee of loyalty. During that painful period and especially at its conclusion, the oath conveys a national unity now primarily revolving around the political bond; the religious dimension, although still fundamental receding into the background. The Revolution is a golden age for the oath of allegiance, which enables “the new man” to provide the indispensable sanctity for the regeneration of the society he wishes to be dechristianized. During the period, the oath plays the role of exclusion while laying a foundation for the revolutionary repression. Above all, the institution conceals destructive effects, even when it is supposed to be the building tool of the new City. Resorting to the oath during the periods currently presented emphasizes the building of the Modern State through a sacralization of politics. However, as the very essence of the institution lies in its religious roots, an oath, either secular or laying the foundation of a strictly secular society may not exist without risking becoming meaningless or turned into a mere promise
Buscemi, Francesco. ""Io giuro". Storia della fedeltà politica dai Lumi a Napoleone." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01H045.
Full textThis thesis aims to study the characteristics of political trust and loyalty during the eighteenth century and the French Revolution. These characteristics are essential to understand the revolutionary culture, as they involve one of the most divisive issues of that time : civic oath. My thesis is aimed to clarify how the experience of oaths shaped the relationship between citizens and power during the revolutionary decade (1789-1799) in France and in Italy, and how this relationship is empowered by narratives taken from religion, the culture of honor, and ideology. From a wider, transnational viewpoint, my primary goal was to provide a deeper look into this key topic of the historiography of French Revolution