Zobrazeno 1 - 10
of 18
pro vyhledávání: '"pääsynvalvonta"'
Autor:
LEINO, SAMI
Tutkielman tarkoituksena on tutkia ja kehittää Javalla toteutettujen websovellusten pääsynvalvontaan liittyviä ratkaisuja tilanteessa, jossa erilaisista ryhmätyösovelluksista ja käyttäjien välisestä yhteistoiminnasta on tullut verkossa ark
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4853::85a709a801fe616d90693fa98521e02f
https://trepo.tuni.fi/handle/10024/79805
https://trepo.tuni.fi/handle/10024/79805
Publikováno v:
Applied Sciences; Volume 12; Issue 5; Pages: 2669
This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices. We extend the desig
Azure Active Directory (Azure AD) is an identity and access management service used by Microsoft 365 and Azure services and thousands of third-party service providers. Azure AD uses OIDC and OAuth protocols for authentication and authorisation, respe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc92587126b63ab34702786da3f4f6ce
http://urn.fi/URN:NBN:fi:jyu-202303032007
http://urn.fi/URN:NBN:fi:jyu-202303032007
Autor:
Syynimaa, Nestori
Publikováno v:
Proceedings of the 24th International Conference on Enterprise Information Systems.
Azure Active Directory (Azure AD) is Microsoft’s identity and access management service used globally by 90 per cent of Fortune 500 companies and many other organisations. Recent attacks by nation-state adversaries have targeted these organisations
Autor:
Vuorinen, Jukka, Uusitupa, Ville
This philosophy-oriented paper examines cybersecurity and its ontological work in relation to spaces which are created by conventional perimeter security model and Zero Trust model. We argue that security works by a code of inclusion and exclusion, e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::55f3f4823b2a5ba4797a0862e04cbe15
http://urn.fi/URN:NBN:fi:jyu-202302271916
http://urn.fi/URN:NBN:fi:jyu-202302271916
Autor:
Leppänen, Marko
The use of VPN remote access services, especially in companies, has grown significantly in recent years as remote work has become more common. Users who log in to the service must be authenticated and access to the network must be authorized accordin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4853::17a597f80f58b9803b17bd630c27f509
https://trepo.tuni.fi/handle/10024/138018
https://trepo.tuni.fi/handle/10024/138018
Autor:
Nestori Syynimaa
Publikováno v:
TrustCom/BigDataSE
Azure Active Directory (AAD) is Microsoft's cloud-based directory and identity management service used by various service providers (SPs). For instance, Microsoft's own Office 365 is utilizing identity management services of AAD. Hundreds of external
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d85c21bf4ea10cc69a0be9c1dc8b9ea2
http://juuli.fi/Record/0334975218
http://juuli.fi/Record/0334975218
Publikováno v:
ISCC
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3bc76b2b99c1a0433fb3246e7415d51e
https://doi.org/10.1109/ISCC.2017.8024638
https://doi.org/10.1109/ISCC.2017.8024638
Publikováno v:
ICISSP
Autor:
Resh, Amit
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are div
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::f517dc3b7d794fd5fc3aba99406117ab
http://urn.fi/URN:ISBN:978-951-39-6887-8
http://urn.fi/URN:ISBN:978-951-39-6887-8