Spelling suggestions: "subject:"accesscontrol"" "subject:"accesskontroll""
571 |
Zařízení pro testování výroby / Production testing equipmentVokřál, Jiří January 2019 (has links)
The thesis introduces the design of a test device for preassembled mechatronic cylindrical locks. The device is designed to test the mechanical and electronic parts which ensure minimisation of loss caused by poor preassembling or defect due to electronic parts. Since the defect will only come to realisation upon the complete product testing, the time of complete dismounting, exchange and assembly of the mechatronic parts would be saved and also time required for the final test of the whole product on the device would be saved.
|
572 |
Zabezpečená komunikace v rámci platformy PX4 / Secure communication within the PX4 platformLigocki, Roman January 2020 (has links)
PX4 platforma je jedna z nepoužívanějších softwarových balíčků pro řízení bezpilotníhosystému. Používá MAVLink protokol pro komunikaci mezi autopilotem, pozemní stanicía dalšími zařízeními v MAVLink síti. Je speciálně navržen pro bezpilotní systémy použí-vající rádia s nízkou datovou propustností. S rostoucím počtem těchto zařízení docházírovněž k růstu počtu útoků na tyto systémy. Tato diplomová práce obsahuje analízua popis bezpečnostních nedostatků v telemetrické komunikaci platformy PX4 běžící naprotokolu MAVLink. Na základě těchto nedostatků byla dále navržená a implementovánabezpečnostní řešení. Tato implementace zahrnuje šifrování, řízení přístupu, autentizacia systém pro výměnu klíčů. Bezpečnostní implementace je postavená na knihovně Mo-noCypher. Všechny části práce jsou naprogramováno v jazyce C. Cílem autora je sdíletvýsledky, kterých dosáhl s komunitou kolem paltformy PX4. Proto během finální částipráce vznikl pull request do veřejného repozitáře.
|
573 |
Kryptografie a ochrana soukromí / Cryptography and Privacy ProtectionMalík, Ondrej January 2021 (has links)
The main goal of this diploma thesis was to create web applications for issuer, verifier and revocation authority of revocable keyed-verification anonymous credentials system. Applications created in this thesis provide functions for all tasks, that are performed by each entity. Using these applications a global management of RKVAC system is possible. Authentication module created in verifier’s app is universaly usable for access control to any web service. Both issuer’s and revocation authority’s app are compatible with whole RKVAC system and are therefor applicable as central elements of systems.
|
574 |
Implementace protokolu ACP do operačního systému L4 / Implementation of the ACP protocol into L4 operating systemKolarík, Tomáš January 2012 (has links)
This thesis deals with the implementation of ACP protocol which serves to manage the access for operation system based on L4 microkernel. The theoretical part of the thesis deals with methods of access management in computer networks. It focuses primarily on AAA systems which make access management possible. Furthermore it describes in detail the ACP protocol, the types of messages and their feedback. The next theoretical part is dedicated to operation systems and in particular to their architecture and services. Then we get a closer look at L4 microkernel family, their philosophy and properties. We continue with a detailed description of the L4 application interface and its ways of expansion. The practical section deals with the implemented concept of system for ACP protocol support in computers. General concept is then applied in real implementation of ACP protocol into the L4 operation system environment based on the L4 platform. To assist, I also included a detailed tutorial explaining the modeling and compilation of software for this platform. At this point we describe the methods used at the implementation and the description of particular modules and features. The end of the thesis concludes the information about the ways of testing and the implementation properties.
|
575 |
Návrh a realizace jednotek modulárního přístupového systému / Modular access control system units design and implementationFoltýn, Petr January 2010 (has links)
This thesis describes design and realization of units of a developed modular access control system. It is focused on creating a software units modular system and its function.
|
576 |
Vícedimenzionální přístup k WWW aplikacím / Mutli-Dimensional Access Control in Web ApplicationsGrešša, Pavol January 2011 (has links)
This master's thesis deals with the analysis, design and implementation of authentication and authorization subsystem into the environment of distributed web application. It unifies the well-known security models into the one universal security model that can be used for the development of authorization device enabling the user to secure the applications with various security models. Furthermore, it applies this integration of models into the Takeplace system.
|
577 |
Moderní přístupový systém / Modern access control systemVomáčka, Martin January 2016 (has links)
The thesis describes the design of scheme for access system with user authentication via smart cards. The first chapter explains various types of identification items used for authentication of users and different types of readers and terminals, followed by chapter 2 with a deeper insight on smart cards with focus on their types, what internal structure and principle of communication with card readers are used, etc. with primary focus on Java cards. The third chapter describes Java Card cryptography - especially elliptic curve cryptography used on this platform. The fourth part focuses on PACE protocol with subsections dedicated to the individual parts of the protocol and its applicability to smart cards environment. Chapter 5 explains the proposed design of the authentication scheme elaborated in the thesis, including a detailed description of specific parts, their funcionality and exemplary usage in the created applications.
|
578 |
Role and trends of records management with specific reference to Vhembe District Municipality, Limpopo ProvinceNevhutalu, Takalani 02 February 2016 (has links)
MPM / Oliver Tambo Institute of Governance and Policy Studies
|
579 |
CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMSLeclerc, Sebastian, Kärrström, Philip January 2022 (has links)
The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. Cloning attacks can deceive access control systems which may cause serious damage to organizations such asinformation leakage and financial loss. This type of attack attempts to deceive a system with anillegitimate cloned card that may be an identical copy of all the data on a card, parts of the data, orperhaps only by using its identification number. Therefore the existing security flaws that cloningattacks exploit are an important threat for organizations to acknowledge and manage. This thesis focuses on evaluating three different access control systems in use and demonstratessecurity flaws that exist in these systems. The systems are evaluated by how data can be extractedfrom the access control cards, this includes the time to collect all the data, reading distance, andinterfering objects. Systems are also evaluated by what information the systems validate. Compatible equipment for evaluating the different systems is necessary such as readers, writers, and otherpenetration testing tools. The type of card that the systems use is called Mifare classic whereastwo of the systems used a 1K version and one a 4K version, specifying the amount of availablememory on the card itself. The equipment also made it possible to perform and verify cloningattacks through different processes such as simulation and sniffing to explore what information certain access control systems deem necessary on the access cards. Rigorous experiments on the systems and the results reveal that crucial information on the accesscards could easily be extracted, reused, and simulated for accessing two of the systems. One systemproved to be more secure since it required more advanced methods to clone cards that the systemaccepted. The results of this thesis demonstrate that the evaluated access control systems cannotbe considered secure without additional layers of security added to them, instead, it is important tokeep the back-end system maintained through various applicable means.
|
580 |
Auktorisering i system för digitalt bevarandeDyk, Olivia January 2019 (has links)
The purpose is to investigate, analyze and clarify the relationship between authorization and security policy for digital preservation system. Information security comes into focus when digital preservation systems are discussed. The handling of electronic documents in digital preservation systems is now widespread and a large part of many activities. This means that the business must ensure that it protects against the loss of information stored in the digital preservation system. Authorization and security policy are relevant to archive and information science because digital objects in digital preservation system are to be protected from unauthorized access. With a qualitative method the research will go through security policy, systems and models for access architecture. With open approach and open questions, the research will be summarized with a discussion on the most important conclusions for access management for digital preservation system, which are mainly built on roles. It is of great importance that the company uses roles and authorization levels to ensure that everyone knows with certainty what to do and what they cannot do. / Syftet är att undersöka, analysera och klargöra relationen mellan auktorisering och säkerhetspolicy för system för digitalt bevarande. Informationssäkerhet kommer i fokus när system för digitalt bevarande diskuteras. Hanteringen av elektroniska dokument i system för digitalt bevarande är nu utbrett och en stor del av många aktiviteter. Det innebär att verksamheten måste se till att den skyddar mot förlust av information som lagras i system för digitalt bevarande. Auktorisering och säkerhetspolicy är relevant för arkiv- och informationsvetenskap eftersom digitala objekt i system för digitalt bevarande ska skyddas mot obehörig åtkomst. Med en kvalitativ metod kommer forskningen att gå igenom säkerhetspolicy, system och modeller för åtkomstarkitektur. Med öppet tillvägagångssätt och öppna frågor kommer forskningen slutligen att sammanfattas med en diskussion om de viktigaste slutsatserna för åtkomsthantering för system för digitalt bevarande, som huvudsakligen bygger på roller. Det är av stor vikt att företaget använder roller och auktoriseringsnivåer för att säkerställa att alla med säkerhet vet vad de ska göra och vad de inte får göra.
|
Page generated in 0.0638 seconds