Dissertations / Theses on the topic 'Security tokens'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 dissertations / theses for your research on the topic 'Security tokens.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Liu, Hailong, Wenhua Qi, Qishan Zhang, and Jinpei Wu. "PKI/PMI AND SMART TOKENS IN HEALTHCARE INFORMATION SYSTEMS." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606668.
Full textWhile healthcare industry is striving to achieve e-health systems for improvements in healthcare quality, cost, and access, privacy and security about medical records should be considered carefully. This paper makes a deep study of Public Key Infrastructures (PKIs) and Privilege Management Infrastructures (PMIs) and how they can secure e-health systems. To access resources, e.g. patient records, both authentication and authorization are needed, so public key certificates and attribute certificates are both required to protect healthcare information. From a typical medical scenario, we see not only static but also dynamic permissions are required. Dynamic authorization maybe the most complex problem in e-health systems.
Tran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.
Full textMikrotjänster har framträtt som ett mer attraktivt alternativ än mer konventionella mjukvaruapplikationsarkitekturer såsom den monolitiska. Mikrotjänster erbjuder flera fördelar som underlättar med en helhetsförståelse för kodbasen, driftsättning, testbarhet, och skalbarhet. Då IT industrin har växt sig allt större, så är det rimligt att tech jättar inför mikrotjänstarkitekturen för att kunna utnyttja dessa fördelar. Nya mjukvarulösningar medför säkerhetsproblem, speciellt då tekniken är helt ny och inte har kartlagts ordentligt. Autentisering och auktorisering utgör grunden för applikationer som har ett flertal användare. Då mikrotjänster ej hunnit blivit utförligt täckt av undersökning, på grund av sin relativt unga ålder, så finns det ej några standardiserade designmönster för hur autentisering och auktorisering är implementerade till bästa effekt i en mikrotjänst. Detta examensarbete undersöker en existerande mikrotjänst för att säkra den genom att applicera vad som är känt som ett säkerhetsdesignmönster för autentisering och auktorisering. Olika sådana mönster testades och jämfördes baserat på prestanda i olika bakgrunder. De varierade nivåerna av säkerhet från de olika angreppssätten som säkerhetsmönstrena erbjöd användes för att identifiera en acceptabel kompromiss mellan säkerhet mot prestanda. Målet är att i slutändan så kommer detta att ge mönstren en högre giltighet när det kommer till att bli accepterade som säkerhetsdesignmönster inom området av mikrotjänstsäkerhet. Ett annat mål var att hitta den bästa kandidaten bland dessa säkerhetsmönster för den givna mikrotjänsten som användes i projektet. Resultaten visade på en korrelation mellan ökad säkerhet och längre responstider. För generella fall rekommenderas det säkerhetsmönster som implementerade intern autentisering och auktorisering men med en viss del tillit mellan tjänster. Om horisontell skalning användes visade resultaten att de normala tjänsterna var de bästa valet att lägga dessa resurser på. Fortsättningsvis visade resultaten även att för ett lägre antal användare så var den negativa effekten på prestandan nästan likvärdig mellan de olika mönstren. Detta innebar att det specifika fallet då mikrotjänster ser en lägre mängd trafik så är det rekommenderade säkerhetsmönstret det som implementerad flest åtkomstkontroller. I fallet för den miljö där undersökningen tog plats förekom det en lägre mängd trafik och därför rekommenderades det säkerhetsmönster som säkrade alla tjänster närvarande i mikrotjänsten.
Hedberg, David. "Autentisiering av användare i datoriserade miljöer hos SMF - biometri kontra tokens : En jämförelse av två sätt att implementera autentisering av användare." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18816.
Full textAs technology evolves, corporations and enterprises are forced to evolve alongside it. Storing company information and data on servers and computers have become common practice.Initially, the goal with the work presented was to compare biometric authentication and token authentication in relation so SMEs. In the current landscape there is no comprehensive study in these two methods of authentication in relation to SMEs. A framework was developed for system administrators to use when choosing one of these methods of authentication. The framework is a summarization of the works analytical part.A literature study was conducted to reach the goal. Three databases were used as sources of information. These three were namely IEEEXplore, ACM Digital Library, and ScienceDirect. From these sources, literature was identified on which the study was then based. Thematic coding was used to analyze the collected data.After the process of collecting and including/excluding was complete, a total of 28 articles remained. From these articles a total of 10 themes were identified from the thematic coding. These themes were cost, integrity, usability, security pros, security cons, two-factor authentication, scalability, biometric types, token types, and future biometric technology. Four of these were more prevalent, namely cost, integrity, usability, and security.After the analysis was finished the themes that emerged as important were integrity and usability. Because of this, the framework is heavily influenced by these themes and they are particularly important for system administrators to consider.
Minello, Giacomo. "Metodologie per la realizzazione di una Security Token Offering." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19133/.
Full textMao, Tingting. "Scheduling services and security ticket token services in iLab interactive services." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42223.
Full textIncludes bibliographical references (leaves 65-66).
The iLab architecture allows students to execute laboratory experiments remotely through internet. It supports three different kinds of experiments: batched, interactive and sensor-based. The iLab Interactive Experiments architecture includes the following servers and services: the Interactive Service Broker (ISB), the Experiment Storage Service (ESS) and the Lab Server (LS). In addition, students execute interactive experiments by running a Lab Client (LC). In order to support interactive experiments which require scheduled access, the iLab interactive architecture envisions scheduling servers and services which enable students from different campuses to reserve time periods to execute experiments. Since the user side and lab side require different scheduling functionalities, a user-side scheduling server (USS) and a lab-side scheduling server (LSS) are introduced in the iLab Interactive Services to manage reservations. In the first part of this thesis, the philosophy of the scheduling services design and the implementation will be illustrated in detail. In dealing the security issues in the iLab interactive architecture, the complexity of the higher level authentication between iLab processes increases when one considers collaboration between domains. In second part of this thesis, I present a Security Token Service (STS) scheme for using WS-Security to optimize the cross-domain authentication in the iLab interactive architecture. The scheme uses the brokered authentication with a security token issued by the STS. The STS is trusted by the web applications and web services in the iLab interactive architecture to provide interoperable security tokens. A security token is used to convey the credential information and the proof of a relationship with the broker, which can be used by the service to verify the token. A comparison between the STS scheme and the current General Ticket scheme is summarized.
by Tingting Mao.
S.M.
Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Full textSecurity hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
Cheong, Chi Po. "Participant Domain Name Token Profile for security enhancements supporting service oriented architecture." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/49364/.
Full textVieira, Gustavo Yamasaki Martins. "Projeto de um dispositivo de autenticação e assinatura." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-14012008-162619/.
Full textCurrently, password-based authentication is the most widespread identity verification method for web pages access. However it presents security issues due to the growth of attacks based on spywares and phishing. The main purpose of both techniques is the digital identity theft, that is, stealing users\' passwords in an unnoticed way. In order to counter this type of attack, many financial institutions have adopted strong authentication, a technique that employs a simultaneous use of different authentication factors. By synergistically combining the advantages of distinct factors, such arrangement results in the mutual mitigation of the vulnerabilities of each one, yielding an architecturally safer identity verification method. This work presents the design and implementation of an authentication device, which combines passwordbased and object-based authenticators. Its main distinguishing features are the reduced cost and the use of open sourced cryptographic algorithms. Open source algorithms have their security widely and independently verified, a characteristic that helps increase the system\'s reliability, since third parties may check the source code running on the device.
Venne, Jacob. "Tradeoffs in Protocol Designs for Collaborative Authentication." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6633.
Full textAu, Wai Ki Richard. "Agent-based one-shot authorisation scheme in a commercial extranet environment." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16708/.
Full textSlavík, Petr. "Laboratorní úloha infrastruktury veřejných klíčů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217981.
Full textBasílio, Tiago Azevedo. "O financiamento através de cryptoassets : token sales : aspetos societários." Master's thesis, 2019. http://hdl.handle.net/10400.14/29135.
Full textHsieh, Yi-Wen, and 謝依紋. "A Study on Regulatory Framework of Security Token Offering." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/rsexnw.
Full text國立政治大學
法學院碩士在職專班
107
In recent years, the rise of the blockchain has created a wave of financial technology. With the blockchain technology, new financial products have continuously introduced to the financial market. As the price of virtual currency increase, initial Coin Offering (ICO) has become the new fundraising method. The reason why ICO is favored by new ventures is that the supervisory had no guidelines ICO when it came to the market. New entrepreneurs are rushing to raise funds through the ICO to the public. As the market is full of frauds and speculation, the authorities started to aware that they need to do more. The authorities alerted investors the risks of ICO. However, the warning seemed to be insufficient to stop investors' willingness to invest. The ICO market is still very hot. ICO is similar to Initial Public Offerings (IPOs) in raising funds from public. The different is that investors get tokens instead of stocks in ICO. However, ICO is not regulated that cause supervision loopholes. Some supervision announced that ICO has securities nature should be regulated under the country's securities regulations. Such token issued under the securities laws is called Securities Token Offering (STO). However, the characteristics of ICO are different from IPO, and ICO is complexity and difficult to understand. Traditional securities regulations may not be suitable for STO. Therefore, how to regulate this type of financial instrument is testing the wisdom of the authority. ICO lack transparency, evaluation difficulty, high price volatility and easily manipulation. Its supervision intensity should be higher than traditional IPO. The infrastructure of ICO is blockchain, which is unmodifiable, transactional synchronization and distributed trust. Blockchain used as a financial field, can reduce costs and provide innovative products. It should not be excessively banned to use it. Therefore, suggesting differentiated management allows the issuing company to use the blockchain. Technology issues securities-type tokens, while new entrepreneurs, because of their company's value-added stage, have higher risk attributes, raise funds on the current crowdfunding platform, and impose appropriate restrictions on investor attributes to protect investor rights and maintain finance. In terms of information disclosure, additional requirements, including smart contract, basic technology, token price, acceptable token type, risks, accounting treatments and evaluations are necessary. If the listed company issuing the STO, it should disclose the possible impact on the token issue and influence on the company's shareholders. As for the reporting requirements on STO, are similar to the current IPO, annual reports, quarterly reports and interim reports in the event of special circumstances are needed. Moreover, audit reports on smart contracts and applications related to STO are suggested. Finally, using of blockchain technology can simplize the transaction and settlement process of securities. The authorities should actively consider how to use the technology of blockchain to reshape the role of market participants and achieve smart supervision. The blockchain brings a challenge to the supervision, but it also provides an opportunity. Authorities should be optimistic to build a digital financial market in the future.
Gyorffy, John. "Token-based Graphical Password Authentication." Master's thesis, 2009. http://hdl.handle.net/10048/411.
Full textComputer Engineering
Neves, Pedro Fonseca das. "Multifactor authentication using smartphone as token." Master's thesis, 2015. http://hdl.handle.net/10071/11150.
Full textA biometria é uma área de estudo que observou desenvolvimentos relevantes na última década. Em específico, a biometria baseada no eletrocardiograma (ECG) é atualmente considerada uma fonte de identificação confiável. Um dos maiores avanços nesta tecnologia consiste na evolução da autenticação off-the-person, que permite realizar a aquisição de sinal de forma não intrusiva usando as mãos do utilizador. Contudo, a identificação através deste método ainda apresenta uma performance relativamente baixa quando usada uma base de dados de dimensão acima das dezenas. Nesta dissertação sugerimos usar a autenticação ECG associada a um telemóvel a funcionar como security token com o objectivo de melhorar a performance e diminuir o tempo necessário para o reconhecimento. Para isso, desenvolvemos a nossa solução usando a tecnologia Bluetooth (BL) clássico, mas também Bluetooth Low Energy (BLE) para preservar a bateria do telemóvel; além disto, desenvolvemos as aplicações em Windows Phone e também Android, dadas as limitações que encontrámos. Para criar um ambiente mais versátil e móvel, usámos a recente plataforma Intel Edison. Os resultados obtidos provam que a nossa solução é viável. Executámos uma série de testes, nos quais observámos uma melhoria nos tempos associados à autenticação quando comparados com o cenário clássico de identificação por ECG. Adicionalmente, a performance do ECG no que diz respeito ao número de falsos-negativos e falsos-positivos apresentou também melhoria.
Shen, Che-Han, and 沈哲漢. "Research on new fundraising methods – Initial Coin Offering and Security Token Offering." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/226a7w.
Full text國立臺灣大學
商學研究所
107
The blockchain is an emerging technology in the world which is creating a new and effective way for companies and people to collaborate. With the blockchain, it is no longer necessary to involve any third party to enable participants to reach consensus and solve trust at a very low cost. Blockchain, like the Internet that emerged in the 20th century, will bring disruptive innovation and change the rules of operation in many industries. The content of this study will focus on Initial Coin Offering and Securities Token Offering, including the introduction of ICO and STO, current status and possible future development of it. I wish this paper can help Taiwanese companies and the public understand blockchain related knowledge well and can become the forerunner of the blockchain industry in the international competition. Finally, sum up the possible drawbacks and failures of the blockchain fundraising, which can make it easier for the public to distinguish the fundraising projects that must fail or even defraud.
"BCERT: securing electronic commerce using a biometric secured token." Thesis, 2010. http://hdl.handle.net/10210/3260.
Full textAn increasing number of corporate and government institutions are utilising electronic commerce to provide or improve their services. These new online services are becoming increasingly complex, offering diverse functionality and managing high volumes of personal and confidential data. The protection and confidentiality of such data is imperative but the security mechanisms and the policies governing its security are rarely sufficient. Nonetheless electronic commerce service providers market their services as being “secure” and by doing so they are developing a false sense of security within computer users. Average computer users are aware of security threats like hackers, viruses, Trojans and spyware, but their limited computer knowledge doesn’t allow them to understand, identify or respond to such security threats. A lack of computer knowledge, little experience and gullibility render the average computer user incapable of managing computer security. This is even more true when the average computer user is put up against the wit and cunning of a hacker. Electronic commerce has changed, the threats have changed, the users have changed and electronic commerce security solutions remain the same. Hackers are no longer hobbyists: they hack for financial gain and not fame, they work together and they exploit any security weakness to get what they want. More and more often the average computer user falls victim to hacker attacks, not only because of the above mentioned human factors but also because of weak security mechanisms that govern users’ access to critical online services.
Huang, Chieh-Chun, and 黃睫淳. "A study based on Tokenism of the work situation of policewomen in the Second Security Police Brigade, Special Police Sixth Headquarters." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ts5qhd.
Full textRodrigues, Mário Amilcar Freitas. "Combating shoulder-surfing: a hidden button gesture based scheme." Master's thesis, 2009. http://hdl.handle.net/10400.13/348.
Full textUniversidade da Madeira