Dissertations / Theses on the topic 'OpenID Connect'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 dissertations / theses for your research on the topic 'OpenID Connect.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Johansson, Tom. "Electronic Identification Based on OpenID Connect : A Design Proposal." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210575.
Full textE-legitimation används av en individ för visa vem han eller hon är på elektronisk väg och används vanligtvis för att logga in på olika tjänster. I Sverige finns ett antal olika lösningar som utvecklas och tillhandahålls av olika parter. För att främja och samordna elektronisk identifiering för offentliga tjänster grundades E-legitimationsnämnden 2011. Nämnden har tagit fram ett tekniskt ramverk för integrationen mellan Förlitande Part och Legitimeringstjänst baserad på Security Assertion Markup Language V2.0 (SAML) standarden. SAML är en relativt gammal standard med vissa begränsningar som komplicerar en e-legitimationslösning baserad på den. En nyare konkurrerande standard är OpenID Connect, vilket kan vara en möjlig kandidat som ett alternativ till SAML. Syftet med detta examensarbete är att undersöka i vilken utsträckning det är möjligt att säkerställa sekretess, integritet och ansvarsskyldighet för en e-legitimation baserad på OpenID Connect. För att uppnå detta, identifierades ett antal krav för e-legitimationer och ett designförslag baserat på OpenID Connect utvecklades tillsammans med en proof-of-concept implementation. Designförslaget utvärderades mot kraven, med det slutliga resultatet att en e-legitimation baserad på OpenID Connect kan uppfylla kraven.
Sjöholm, Markus. "Analysis of the Use of OpenID Connect for Electronic Signatures." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-452756.
Full textRasiwasia, Akshay. "A Framework To Implement OpenID Connect Protocol For Federated Identity Management In Enterprises." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64848.
Full textPezzulli, Francesco. "Analisi ed implementazione di un sistema Single Sign-On basato su Shibboleth e OpenID Connect." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textFedi, Alessandro. "Servizi Web Integrati con Applicazioni di Social Networking tramite Framework Spring Social." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textHedmark, Alice. "Undersökning av webbsidors säkerhet vid användning avFacebook Login : Vidareutveckling och analys av OAuthGuard." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36859.
Full textSingle Sign-On (SSO) is an authentication process that allows a developer to delegate the authentication responsibility to a dedicated service. OAuth 2.0 is an authorization framework that often serves as a base for authentication layers to be built upon that in turn allows for SSO. An identity provider is the service that is responsible for handling user credentials and the authentication, two common identity providers are Google and Facebook that implement SSO with the authentication layers OpenID Connect respectively Facebooks own authentication layer. It has been shown that many clients using OAuth 2.0 as base for SSO make faulty implementations leading to security issues, a number of studies has proposed solutions to these issues but faulty implementations are continually being made. To create various tools to promote security in these contexts is a method where OAuthGuard has been developed with the vision to also directly protect the common website user directly from the browser. OAuthGuard has been used in an earlier study to analyze the security of clients using Google SSO and discovered that 50% of the analyzed clients had flaws, no comparable study has been done for clients using Facebook SSO, which is the second largest third party log in variant. This study made a comparable investigation for Facebook SSO clients with a further developed version of OAuthGuard and found that these clients suffer from flaws with a similar trend as the previous study with Google-SSO clients, although fewer Facebook-SSO clients suffer from these flaws. When further developing OAuthGuard a dumber of difficulties was discovered and the future of these kind of tools needs to be investigated. Further analysis needs to be done to assess if Facebook-SSO should be recommended over Google-SSO from a security perspective and also further exploration of new methods to promote security needs to be done.
SHARIF, AMIR. "Analysis of Best Current Practices to Assist Native App Developers with Secure OAuth/OIDC Implementations." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1050122.
Full textJosefsson, Ågren Fredrik, and Oscar Järpehult. "Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178035.
Full textToresson, Gabriel. "Documenting and Improving the Design of a Large-scale System." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157733.
Full textWeber, Bruno. "Optimisation de code Galerkin discontinu sur ordinateur hybride : application à la simulation numérique en électromagnétisme." Thesis, Strasbourg, 2018. http://www.theses.fr/2018STRAD046/document.
Full textIn this thesis, we present the evolutions made to the Discontinuous Galerkin solver Teta-CLAC – resulting from the IRMA-AxesSim collaboration – during the HOROCH project (2015-2018). This solver allows to solve the Maxwell equations in 3D and in parallel on a large amount of OpenCL accelerators. The goal of the HOROCH project was to perform large-scale simulations on a complete digital human body model. This model is composed of 24 million hexahedral cells in order to perform calculations in the frequency band of connected objects going from 1 to 3 GHz (Bluetooth). The applications are numerous: telephony and accessories, sport (connected shirts), medicine (probes: capsules, patches), etc. The changes thus made include, among others: optimization of OpenCL kernels for CPUs in order to make the best use of hybrid architectures; StarPU runtime experimentation; the design of an integration scheme using local time steps; and many optimizations allowing the solver to process simulations of several millions of cells
Maurer, Andreas. "Methods for Multisensory Detection of Light Phenomena on the Moon as a Payload Concept for a Nanosatellite Mission." Thesis, Luleå tekniska universitet, Rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80785.
Full textChan, Ya-Chun, and 詹雅鈞. "Security and Improvement of the Single Sign-On Mechanism - OpenID Connect." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/24679040059271835072.
Full text明新科技大學
資訊管理系碩士班
104
With the rapid development of Internet and wireless networks, people can access a variety of cloud services anytime anywhere through Internet using various Internet-enabled devices. To simplify the user login process, many cloud services provide single sign-on mechanisms that allow users to login using their existing large sites accounts without creating new accounts. Public cloud network environment is vulnerable to various attacks such as eavesdropping, modification or misuse; authentication, capable of stopping illegal users from accessing cloud services, is an important foundation of cloud computing security; adequate security is needed to prevent those problems. The thesis analyzes security and privacy requirements of user authentication in cloud computing, examines the problems of single sign-on mechanisms – OpenID Connect, then proposes solutions. Finally, a website with single sign-on mechanism OpenID Connect is constructed and those security problems users might encounter during login are tested. Hope that the risks of user authentication in cloud computing should be understood in more detail, and the users’ confidence in adopting cloud services can thus be increased. The development of cloud computing can be fostered.
Farias, Élio Carvalho. "Gestão de identidade pessoal com opendid connect e cartão de cidadão." Master's thesis, 2018. http://hdl.handle.net/10437/9084.
Full textAtualmente é um fato admitido que os sistemas informáticos estão cada vez mais presentes no dia-a-dia dos cidadãos, tendo assumido um papel fundamental nas suas vidas. O seu constante e rápido crescimento tem-se generalizado através do desenvolvimento de múltiplas aplicações disponíveis na Web ou destinadas a dipositivos móveis, que facilitam as suas tarefas diárias e estabelecem inclusivamente novos meios de interação social. De forma a garantir a identidade e a privacidade dos seus utilizadores, a maioria destas aplicações requerem autenticação, sejam elas aplicações nativas dos sistemas operativos, aplicações móveis ou aplicações orientadas para a Web. Como tem sido amplamente divulgado [1], os métodos tradicionais de autenticação apresentam inúmeras fragilidades, quer nos requisitos de segurança com que são concebidos, quer pelo facto de obrigarem os utilizadores a memorizar inúmeras credenciais, distintas para cada aplicação. No sentido de mitigar este problema, atualmente existem várias soluções que permitem aos utilizadores usar um único conjunto de credenciais, armazenadas num único Provedor de Identidade, que podem ser utilizadas para aceder a múltiplas plataformas, sem necessidade de autenticação adicional. Embora constitua uma comodidade indiscutível, esta abordagem tornam os utilizadores extremamente dependentes dos grandes ‘players’ da Internet, que geralmente fornecem os seus serviços em troca da exploração dos dados dos utilizadores, para fins comerciais. Este trabalho tem por objetivo demonstrar, com base no conhecimento adquirido e numa prova de conceito original desenvolvida especificamente, que ainda existe evolução possível nesta área, integrando duas tecnologias atuais, o protocolo OPenID Connect e o Cartão de Cidadão Nacional que, conjugadas, permitem criar um método de autenticação pessoal forte e seguro, que pode ser completamente gerido pelo utilizador.
It is currently a well-known fact that computer systems are increasingly present in citizens' daily life and have played a key role in their lives. Its constant and rapid growth has been generalized through the development of multiple applications available on the Web or intended for mobile devices, which facilitate their daily tasks and even establish new means of social interaction. In order to ensure the identity and privacy of your users, most of these applications require authentication, whether they are native applications of operating systems, mobile applications or web applications. As has been widely publicized [1] traditional authentication methods present numerous weaknesses both in the security requirements with which they are designed and in requiring users to store countless different credentials for each application. In order to mitigate this problem, several solutions currently exist that allow users to use a single set of credentials, stored in a single Identity Provider, that can be used to access multiple platforms without the need for additional authentication. However, while it is an indisputable convenience, this approach makes users extremely dependent on the major Internet players, who generally provide their services in return for the exploitation of user data for commercial purposes. This paper aims to demonstrate, based on the knowledge acquired and a specifically developed original proof of concept, that there is still possible evolution in this area, integrating two current technologies, the OpenID Connect protocol and the ‘Cartão Cidadão’ that, together, allow to create a strong and secure personal authentication method that can be completely managed by the user.
Андрійчук, Ярослав Васильович. "Реалізація протоколів аутентифікації користувачів веб-орієнтованих комп’ютерних систем." Master's thesis, 2018. http://elartu.tntu.edu.ua/handle/lib/26778.
Full textTsai, Shu-Chen, and 蔡數真. "Design and Implementation of Opening-Book System of Computer Connect6." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/49970339321521822643.
Full text中原大學
應用數學研究所
99
With the human need in life, the civilizations were changed, and the development of technology and science. The invention of the computer was of great benefit to humanity. The computer appears to solved many kind of problems on computing. The “ Chess Game ” was evolved by computer science, and had their own system. The computer chess game usually have three phases, including opening database, endgame database, and midgame search. In this paper, we focus on the opening book system for computer Connect6. At the beginning of the system built that should be collection chess manual and do knowledge as possible, and then construct a useful opening book system. Therefore, on the base of the opening book system, the midgame can have more information to do search and do well on moves choose.
Goodburn, John M. "Effects of opening size and competition levels on the growth and canopy recruitment of saplings in northern hardwood forests." 2004. http://www.library.wisc.edu/databases/connect/dissertations.html.
Full textWenke, Henning. "Paralleles konturbasiertes Connected-Component-Labeling für 2D-Bilddaten mit OpenCL und Cuda." Doctoral thesis, 2015. https://repositorium.ub.uni-osnabrueck.de/handle/urn:nbn:de:gbv:700-2015100913619.
Full text