The Master thesis work will study and propose how workstation identity management can be made more user-friendly and secure by using the mobile phone in the Linux workstation log on process. The current log on process is neither user friendly nor sufficiently secure. This work consists of the following tasks: 1. Study of existing identity management and authentication for enterprise network and workstations. 2. Study of Platform security architecture of Linux. 3. Study of Authentication and identity management standards and protocols (e.g. EAP, RADIUS/ DIAMETER, SAML etc.) 4. Design and implementations of solutions for integration of the mobile phone with the workstation logon processes in different operating systems 5. Threat and vulnerabi...
Abstract Identity management is defined as the set of processes related to identity and access infor...
This report was written as part of our thesis based on an assignment provided by Kantega. It deals w...
Identity management is a hot topic today for mobile network operators and service providers, especia...
Password based logon schemes have many security weaknesses. For secure environments smart card and b...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
The master thesis is divided into two parts. In the first part, identity management is described on ...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Typically, cloud computing has been embraced by businesses. However, this master thesis introduces t...
This paper details the development of an access control mechanism based on fingerprint biometrics an...
© 2017 IEEE. Enterprises have recognised the importance of personal mobile devices for business and ...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Abstract Identity management is defined as the set of processes related to identity and access infor...
This report was written as part of our thesis based on an assignment provided by Kantega. It deals w...
Identity management is a hot topic today for mobile network operators and service providers, especia...
Password based logon schemes have many security weaknesses. For secure environments smart card and b...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
The master thesis is divided into two parts. In the first part, identity management is described on ...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Evolving communication technologies stimulate a rapid growth in utilisation of communication-capable...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Typically, cloud computing has been embraced by businesses. However, this master thesis introduces t...
This paper details the development of an access control mechanism based on fingerprint biometrics an...
© 2017 IEEE. Enterprises have recognised the importance of personal mobile devices for business and ...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Abstract Identity management is defined as the set of processes related to identity and access infor...
This report was written as part of our thesis based on an assignment provided by Kantega. It deals w...
Identity management is a hot topic today for mobile network operators and service providers, especia...