• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 11
  • 5
  • 2
  • 2
  • 1
  • Tagged with
  • 43
  • 43
  • 16
  • 14
  • 13
  • 12
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Tvorba uživatelsky přívětivého mapového portálu

Svoboda, Ondřej January 2013 (has links)
No description available.
2

Připojení externího modemu k J2EE aplikaci

Palát, Pavel January 2012 (has links)
No description available.
3

Synchronizace webových aplikací na platformě Java EE / Java EE Application Synchronization

Poul, Jan January 2017 (has links)
This work deals with the Java EE platform and the bidirectional client-server communication. It presents a design of an application architecture that allows to synchronize the state of applications and their graphical output for a larger number of clients. The final solution contains a sample application that demonstrates the synchronization of connected clients.
4

Um serviço de autorização Java EE baseado em certificados de atributos X.509. / A Java EE authorization service based on X.509 attribute certificates.

Guilhen, Stefan Neusatz 03 June 2008 (has links)
O surgimento e a popularização de arquiteturas de software que fornecem suporte à programação distribuída orientada a objetos, como CORBA, .NET e Java EE, gerou uma demanda por infra-estruturas de segurança eficientes, capazes de proteger os recursos dos sistemas de ataques maliciosos. Essa proteção começa pela identificação dos usuários que interagem com os sistemas, processo conhecido como autenticação. Entretanto, a autenticação por si só não é suficiente para garantir a segurança dos recursos, uma vez que a autenticação não determina quais ações os usuários estão autorizados a executar depois de autenticados. Em outras palavras, um mecanismo de autorização, que faz valer as políticas de controle de acesso aos recursos definidas pelos administradores de sistemas, se faz necessário. Neste trabalho estudamos mecanismos de controle de acesso baseado em papéis e a aplicabilidade dos certificados de atributos X.509 como estrutura de armazenamento desses papéis em um ambiente Java EE. Em particular, estendemos a infra-estrutura de segurança do servidor de aplicações JBoss, de modo que ela passasse a comportar os certificados de atributos X.509. Além disso, analisamos as vantagens e desvantagens do uso de tais certificados e avaliamos o desempenho da extensão desenvolvida em relação a outras alternativas que são oferecidas pelo JBoss para o armazenamento de papéis dos usuários. / The popularization of software architectures that provide support for distributed object-oriented programming, like CORBA, .NET, and Java EE, revealed the need for efficient security infrastructures to protect the resources of enterprise systems from malicious attacks. This protection usually begins with the identification of the users that interact with the systems, a process known as authentication. However, authentication alone is not enough to guarantee the protection of the resources, as it cannot determine what actions a particular user is allowed to execute on a given resource. In other words, an authorization mechanism is needed in order to enforce the access control policies as defined by the system administrators. In this dissertation we studied role-based access control mechanisms and the use of X.509 attribute certificates as data structures that store the users roles in a Java EE environment. Particularly, we added X.509 attribute certificates support to the existing JBoss application server security infrastructure. Furthermore, we evaluated the pros and cons of using these certificates, and compared the performance of the developed extension to the performance of the existing solutions provided by JBoss to store the users roles.
5

Um serviço de autorização Java EE baseado em certificados de atributos X.509. / A Java EE authorization service based on X.509 attribute certificates.

Stefan Neusatz Guilhen 03 June 2008 (has links)
O surgimento e a popularização de arquiteturas de software que fornecem suporte à programação distribuída orientada a objetos, como CORBA, .NET e Java EE, gerou uma demanda por infra-estruturas de segurança eficientes, capazes de proteger os recursos dos sistemas de ataques maliciosos. Essa proteção começa pela identificação dos usuários que interagem com os sistemas, processo conhecido como autenticação. Entretanto, a autenticação por si só não é suficiente para garantir a segurança dos recursos, uma vez que a autenticação não determina quais ações os usuários estão autorizados a executar depois de autenticados. Em outras palavras, um mecanismo de autorização, que faz valer as políticas de controle de acesso aos recursos definidas pelos administradores de sistemas, se faz necessário. Neste trabalho estudamos mecanismos de controle de acesso baseado em papéis e a aplicabilidade dos certificados de atributos X.509 como estrutura de armazenamento desses papéis em um ambiente Java EE. Em particular, estendemos a infra-estrutura de segurança do servidor de aplicações JBoss, de modo que ela passasse a comportar os certificados de atributos X.509. Além disso, analisamos as vantagens e desvantagens do uso de tais certificados e avaliamos o desempenho da extensão desenvolvida em relação a outras alternativas que são oferecidas pelo JBoss para o armazenamento de papéis dos usuários. / The popularization of software architectures that provide support for distributed object-oriented programming, like CORBA, .NET, and Java EE, revealed the need for efficient security infrastructures to protect the resources of enterprise systems from malicious attacks. This protection usually begins with the identification of the users that interact with the systems, a process known as authentication. However, authentication alone is not enough to guarantee the protection of the resources, as it cannot determine what actions a particular user is allowed to execute on a given resource. In other words, an authorization mechanism is needed in order to enforce the access control policies as defined by the system administrators. In this dissertation we studied role-based access control mechanisms and the use of X.509 attribute certificates as data structures that store the users roles in a Java EE environment. Particularly, we added X.509 attribute certificates support to the existing JBoss application server security infrastructure. Furthermore, we evaluated the pros and cons of using these certificates, and compared the performance of the developed extension to the performance of the existing solutions provided by JBoss to store the users roles.
6

Design och implementation av ett distribuerat system med hög säkerhet / Design and Implementation of a Distributed System with High Security

Fly, Thomas, Villén, Arvid January 2014 (has links)
Målet med detta projekt har varit att designa och implementera ett distribuerat system där privatpersoner kan ta del av analysresultat på sina egna blodprover. Tjänsten är en utbyggnad av ett befintligt system för beställning av laboratorietjänster. Eftersom denna tjänst hanterar känsliga personuppgifter har säkerhetsaspekter särskilt beaktats. Ett flertal kända tekniker och ramverk för detta har utvärderats. Resultatet av projektet är ett urval av ramverk som används för att skapa en design och implementation av ett distribuerat system med hög säkerhet. / The aim of this project has been to design and implement a distributed system where individuals can view the results of analyzes of their own blood tests. The service is an extension of an existing system for ordering laboratory services. Because this service handles sensitive data, security has been central to the project. Many different techniques and frameworks for this have been evaluated. The outcome of the project is a selection of frameworks used to create a design and implementation of distributed system with high security.
7

Parallelism within queue application

Åberg, Ludvig January 2017 (has links)
The aim of this thesis was to modify an existing order queue application which was unable to execute orders in a queue in parallel which in turn could lead to a bad user experience due to the increased queue delay. The thesis proposes two queue structures to allow parallel execution within a queue. One of the two is selected for implemented in the modified order queue application. The implementation was carried out in Java EE and used different types of frameworks such as JPQL. Some parts of the order queue application had to be modified to be able to handle the new queue structure. New attributes that defines dependencies of the orders are used to find a suitable parent for each order in the queue. The queue structure was visualized making it possible to see the execution in real time, and a test server was implemented to test the queue structure. This resulted in a working prototype able to handle dependencies and parallel orders. The modified order queue application was performance measured and compared to the original order queue application. The measurement showed that the modified order queue application performed better than the original order queue application in terms of execution time below a certain number of queues. Future work includes optimizing the methods and queries in the implementation to increase the performance and to handle parallelism within the orders.
8

Java EE aplikácia pre podporu tímovej spolupráce / Java EE application supporting teamwork

Kuchár, Pavol January 2012 (has links)
Diploma thesis deals with the support of teamwork with the use of information technology. It indicates potential problems in the use of various software tools and its aim is to develop an application that eliminates frequent shortcomings and provides an integrated environment for solving of school projects. The contribution of this work is the use of developed application by students or other smaller teams. Chapters 2 and 3 are devoted to a survey of existing works and the applications and to a theoretical introduction to the field of computer supported teamwork. Chapter 4 focuses on the analysis and software architecture design and chapter 5 describes the used technologies and justifies their selection. The chapter 6 contains the user manual, which includes all the information needed for use of application from the user's perspective as well as from the perspective of the administrator.
9

Implementation of the Integrated Development Platform (IDP) / Implementation of the Integrated Development Platform (IDP)

Dvořák, Petr January 2012 (has links)
The aim of the thesis was to design and develop a unified application for installation and integration of the software management tools into a single comprehensive and functional unit. The application should also allow export of the project metadata via the RESTful API. The goals of the thesis were fulfilled relatively well. A set of installation scripts was created, as well as a functional web application built using the JavaEE platform. The application can be deployed in a small company after performing minor modifications. Less common deployment scenarios for CGI based applications on Apache Tomcat were also examined. Minor enhancements in the open-source project NetBeans were implemented as well. Also, a branded version of Bugzilla was created and deployed in an existing small software company.
10

Development of a location-based taxi service : using open-source tools

Maechel, Lars January 2016 (has links)
The aim of this project is to develop a component able to retrieve taxi providers in Sweden, based on input of coordinates and a search radius. The result should be available in a well-structured and accessible way through an RESTful web service. The study is conducted based on a customer inquiry stating that the component should be built using open-source tools and be developed in such a way that allows the component, or parts of the component, to be integrated in a larger system. Therefore, a preliminary study was conducted in order to find suitable open-source tools that are able to solve the specific customer requirements. The component uses an ad hoc company search engine to retrieve the taxi providers, contact information and coordinates. Additional information needed for determining the correctness of the taxi providers are retrieved from external resources and a filtering process is then performed before they are saved in persistent store. The project is successful in solving the main purpose and most of the customer requirements, while the RESTful service is unable too fully meet the requirement stating that the component should be able to handle multiple concurrent clients while still maintain responsiveness. This, is mainly due to the decision not to use an ad hoc framework in handling geospatial data structures and calculations and was a trade-off to ensure re-usability and integration of the component in a larger system. / Avsikten med denna studie är att bygga en komponent som kan returnera taxiföretag i Sverige baserat på koordinater och en sökradie. Resultatet skall presenteras för användare eller andra tjänster på ett välstrukturerat och tillgängligt sätt via en RESTbaserat webbtjänst. Projektet är ett resultat av en kundförfrågan i vilken det även specificeras att komponenten skall använda sig av data eller verktyg som är fritt tillgängliga och att den skall vara byggd på ett sådant sätt att det går att använda hela, eller delar av, komponenten i ett större system. En kortare förstudie genomfördes med syfte att hitta lämpliga verktyg som bygger på öppen källkod för att lösa de specifika krav kunden ställt på komponenten. Komponenten använder sig av en sökmotor för företag-sök där resultaten görs tillgängliga via ett RESTbaserat API. Varje företag genomgår sedan en filtreringsprocess innan de sparas i databas för att avgöra om det uppfyller de kriterier som är uppsatta. Denna filtrering baseras på information som inhämtats genom en automatiserad process. Denna studie har varit framgångsrik i avseendet att bygga en komponent som kan returnera företag inom ett visst område baserat på koordinater och en given sökradie. Den uppfyller även de allra flesta av de krav kunden har satt upp, med undantag för det krav som efterfrågar en responsiv hantering av många samtidiga användare. Detta beror främst på valet att inte använda sig av ett ramverk avsett för hantering av geospatial data. Detta var en avvägning som gjordes för att försäkra sig om att komponenten skulle vara återanvändbar i ett större system.

Page generated in 0.047 seconds