National Repository of Grey Literature 45 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Portal of the universal access control protocol
Čepelák, Tomáš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The paper focuses on the issue of access control. It presents an universal bilateral protocol of access control of ACP. The paper describes the messages and its sequences that AC portals uses for communication. It describes the functions and features of the modules from which the portal is composed. The paper suggests the concept of a modular AC portal solutions including the design of basic modules. It also outlines possible test scenarios. Under this proposal is generated functional AC portal on the .NET Framework platform using the C\# programming language. The portal provides access to local assets or to the assets on other computers in the local network. Created application is tested according to the scenarios proposed in both the network version and the local version of the AC portal. Test results are objectively evaluated and commented.
SELinux application for Linux server security
Jirka, Michal ; Pelka, Tomáš (referee) ; Šimek, Milan (advisor)
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretionary and mandatory access control are compared and examine basic technologies based on mandatory access control. More closely is focused on project SELinux, whose generation of new rules is explained. Within the thesis is made application for logging evaluation and for writing new Type Enforcement rules.
Interactive Web Page Design Environment
Moravec, Jaroslav ; Očenášek, Pavel (referee) ; Burget, Radek (advisor)
This master's thesis describes an environment for creation and management of interactive web pages. It deals with both the structure design and the visual part. The basic idea is that the page consists of individual elements that can be arbitrarily composed together. There exist several kinds of such elements: interactive, content, database and informative elements. Furthermore, the environment includes tools for account management, access control, database administration, auditing, multilanguage support and some more.
Electronic Security Systems
Tomek, Dominik ; Baumgartnerová, Alena (referee) ; Rujbrová, Šárka (advisor)
Cílem této práce je seznámit čtenáře s nejběžněji používanými elektronickými zabezpečovacími systémy. Práce popisuje základní principy, vlastnosti a využití moderních elektronických zabezpečovacích systémů používaných v domácnostech a firmách. Dále práce porovnává jednotlivá zabezpečovací zařízení, která se v těchto systémech používají a uvádí jejich výhody a nevýhody. Tento dokument je vhodný pro studenty a osoby, které chtějí začít pracovat v tomto oboru nebo je tato problematika pouze zajímá.
Optimization of Access to CDMA Networks
Kejík, Petr ; Masopust, Jiří (referee) ; Wieser, Vladimír (referee) ; Hanus, Stanislav (advisor)
The aim of this dissertation thesis is an optimization of access to CDMA networks. To be more specific, this thesis deals with an optimization of admission control in UMTS network. The first part of the thesis deals with the present progress of the particular topic. Thereinafter there is an analysis of admission control in UMTS system. An own UMTS simulation program was created in MATLAB. This program enables implementation and simulation of the selected admission control algorithms. The thesis is focused on load factor based, fuzzy logic based and genetic algorithms. The created UMTS simulator was used for the mutual comparison of all algorithms. The aims of this thesis are the suitable UMTS model design, evaluation and possible optimization of selected algorithms.
Cryptography and Privacy Protection
Malík, Ondrej ; Dzurenda, Petr (referee) ; Hajný, Jan (advisor)
The main goal of this diploma thesis was to create web applications for issuer, verifier and revocation authority of revocable keyed-verification anonymous credentials system. Applications created in this thesis provide functions for all tasks, that are performed by each entity. Using these applications a global management of RKVAC system is possible. Authentication module created in verifier’s app is universaly usable for access control to any web service. Both issuer’s and revocation authority’s app are compatible with whole RKVAC system and are therefor applicable as central elements of systems.
Authentication using a device with OS Android
Smíšek, Martin ; Člupek, Vlastimil (referee) ; Dzurenda, Petr (advisor)
This thesis describes the basics of cryptography including symmetric and asymmetric cryptography. It also looks into methods of authentication, using knowledge of some information, having any object and user specific proportions. The thesis engage in description of modern technologies NFC and BLE and shows, how to develop applications, working with them. It deals with the way of storing data used for cryptography, in the safe way. The access system created in the scope of this thesis, which is using Android powered device as an authentication object and communicating over NFC is described. The system can be divided into two parts. The first part works on the device powered by Android. It creates, resets and saves secret data safely and communicate with the other part. The second part is working in a terminal with connected RFID/NFC card reader. The task of this part is to communicate with the part on the Android device, attached to the reader and saving data of users and chambers centrally on the web server. It also creates logs in the form of text files and upload it to the FTP server.
Multiplatform authentication system
Pokorný, Lukáš ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This thesis describes the design of a multiplatform authentication system that enables user authentication by using a wide variety of authentication tokens. The theoretical part is devoted to an overview of authentication interfaces with focus on modern methods of verification. There is also an overview of authentication schemes. The practical part gives requirements for an authentication terminal and sets a specific hardware structure, including the specification of individual functional blocks. The implementation of the software logic uses Java and JavaScript programming languages. Attention is also paid to the used authentication schemes including details and comparison of used platforms. Finally, we evaluate the user and security aspects of the proposed solution. It is also given the possibility of additional hardware and software optimization.
Test implementation of the ACP protocol
Ležák, Petr ; Strašil, Ivo (referee) ; Burda, Karel (advisor)
In general this master’s thesis deals with access control methods and their individual modules and in particular with authentication of supplicants. There are listed authentication methods useful in the implementation of the ACP protocol. ACP protocol is also discussed including possibilities and uses. ACP message format is described in detail with AVP format and types. The transaction mechanism is also mentioned here. The main part of the thesis is focused on software design for protocol testing. Possibilities of the testing are discussed and test scenarios are suggested. Consequently, requirements for test software are listed and its implementation is designed. Furthermore, there is technical documentation of the program. The main ideas used in the program are explained in it. The purpose of each part of the program is written including links between them. Finally, there is a manual for the program. It also contains an illustrative example describing how to make and test a simple scenario of the authentication.
Modern access control system
Vomáčka, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis describes the design of scheme for access system with user authentication via smart cards. The first chapter explains various types of identification items used for authentication of users and different types of readers and terminals, followed by chapter 2 with a deeper insight on smart cards with focus on their types, what internal structure and principle of communication with card readers are used, etc. with primary focus on Java cards. The third chapter describes Java Card cryptography - especially elliptic curve cryptography used on this platform. The fourth part focuses on PACE protocol with subsections dedicated to the individual parts of the protocol and its applicability to smart cards environment. Chapter 5 explains the proposed design of the authentication scheme elaborated in the thesis, including a detailed description of specific parts, their funcionality and exemplary usage in the created applications.

National Repository of Grey Literature : 45 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.