Secure enrollment token delivery mechanism for zero trust networks using blockchain

JJD Rivera, W Akbar, TA Khan… - IEICE Transactions …, 2023 - search.ieice.org
Zero Trust Networking (ZTN) is a security model where no default trust is given to entities in
a network infrastructure. The first bastion of security for achieving ZTN is strong identity …

Secure enrollment token delivery for Zero Trust networks using blockchain

JJD Rivera, TA Khan, W Akbar… - 2022 23rd Asia …, 2022 - ieeexplore.ieee.org
Zero Trust Networking (ZTN) is a security model where no entity in a network infrastructure is
trusted. The first bastion of security for achieving ZTN is to have strong identity verification …

Large-scale integrated infrastructure for asynchronous microservices architecture

I Ramadhan, G Guarddin - Jurnal Teknologi dan Sistem …, 2022 - jtsiskom.undip.ac.id
Integrated large-scale business activities increasingly rely on the use of remote resources
and services across multi-platform applications. Microservice in previous research has …

Investigating the role of usable security in developers' intention toward security enhancement in service‐oriented applications

F Jalali, M Alidoost Nia, T Ermakova… - Security and …, 2022 - Wiley Online Library
Security threats have increased in recent years. To motivate the developers to stick to the
security policies, the notion of usable security is investigated. Enhancing the usability of …

AMAN: Token-based Authentication to Improved Single Sign-On Security Between Systems

ES Mansur, A Rahmatulloh, RN Shofa… - … on Advancement in …, 2023 - ieeexplore.ieee.org
The problems caused during the Covid-19 pandemic included disrupting the learning
process, which was usually done face-to-face, and had switch to online. Many applications …

Design and implementation of campus Single sign-on system based on CAS

X Li - 2024 5th International Conference on Big Data & …, 2024 - ieeexplore.ieee.org
With the progress of network and information technologies, campuses rely heavily on
diverse information systems, each with unique login mechanisms. This results in frequent …

[PDF][PDF] Sistem za kreiranje specifikacije i kontrolisanje razvoja angular komponenti

P Erić - joc.raf.edu.rs
Sadržaj–Predmet rada je projektovanje modela baze podataka u kojoj bi se skladištila
dokumentacija o načinu povezivanja komponenti, baziranih na Angular razvojnom alatu …

Käyttäjähallinta moniasiakasympäristössä

M Korpimaa - 2021 - trepo.tuni.fi
Software as a service-palvelumalli on yleistynyt ohjelmistokehityksen keskuudessa.
Palveluiden siirtyessä yksityisistä asennuksista software as a service-palvelumalliin, täytyy …

Aplicaciones de software que permitan la integración con otras aplicaciones de otras plataformas en la empresa A

DI Barrera Garay, EL Poma Chavez - 2020 - alicia.concytec.gob.pe
Las empresas usualmente poseen diversos sistemas informáticos (SI), originado por la
necesidad de su labor cotidiana e influenciada por la demanda de sus clientes y la …

[引用][C] TOKEN-BASED AUTHENTICATION USING JSON WEB TOKEN (JWT)

AAB ABDULLAH - 2016