National Repository of Grey Literature 101 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
A Jabber/XMPP Transport for News via the NNTP Protocol
Halfar, Patrik ; Weiss, Petr (referee) ; Rychlý, Marek (advisor)
This document mention some possibilities of information sharing over computer networks. At the beginning there is described exchange information between group of users by NetNews . Next chapter make short introduction to project Jabber/XMPP and its possibilities. Other part appropriate to possibility combination these services and comment implemented application. There are include descriptions how configure most known Jabber servers for use of this application. There are contain XML schemes of uses files too.
Web application of attribute-based authentication system
Klampár, Roman ; Malina, Lukáš (referee) ; Dzurenda, Petr (advisor)
This bachelor thesis deals with the creation of web applications for the issuer and verifier entities of an Attribute-Based Credentials system Adopsio. The web applications were implemented using the microframework Flask, the Vue.js framework, and the PostgreSQL database. The issuer application allows the creation of new digital certificates containing signed attributes. The second application is the verifier entity, for which a graphical user interface is created to manage the authentication script.
Framework for a Web Internet Service
Hájek, Filip ; Smrčka, Aleš (referee) ; Hrubý, Martin (advisor)
The goal of this thesis is to design and implement a containerized web service, which provides the ability to create and run users' tasks. The task is only an abstraction over some particular implementation of computation. The task runs as a Docker container. The thesis also implements user management and the method of running task charging. The system architecture consists of a REST API web server and a user web environment. Worker applications are an essential component of the system. They start user tasks assigned by the server. The system was implemented using the .NET 6 framework in programming language C#. The run of the service has been simulated in a Docker environment. The service integrates existing Auth0 and Google Cloud Storage services. The result is an internet service deployed on a public cloud server.
Authenticing Active Devices in Identity-Based Networking Services
Lomnický, Marek ; Lampa, Petr (referee) ; Matoušek, Petr (advisor)
Main goal of this thesis is to study and test network access based on IBNS technology giving possibility to design flexible security policy based on user's identity and rights that is transparent to physical network components.
Portal of the universal access control protocol
Čepelák, Tomáš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
The paper focuses on the issue of access control. It presents an universal bilateral protocol of access control of ACP. The paper describes the messages and its sequences that AC portals uses for communication. It describes the functions and features of the modules from which the portal is composed. The paper suggests the concept of a modular AC portal solutions including the design of basic modules. It also outlines possible test scenarios. Under this proposal is generated functional AC portal on the .NET Framework platform using the C\# programming language. The portal provides access to local assets or to the assets on other computers in the local network. Created application is tested according to the scenarios proposed in both the network version and the local version of the AC portal. Test results are objectively evaluated and commented.
Administration of development documetation over WWW I
Kolář, Miroslav ; Sysel, Petr (referee) ; Balík, Miroslav (advisor)
Master`s thesis is based on the assignment of company Honeywell to create integral system for saving and management of development documentation. Designed system will introduce data warehouse with transparent display of documents being connected with development of customer’s requirements, products and tests, test runs. Solution consists of two parts: A – Requirements and Products and B – Tests, Test runs and Person, whereas Master`s thesis deals with the part B. For system creation utilities of following programming languages were used HTML, PHP, JavaScript and database system MySQL. In the first phase was designed database structure (tables and relations between them). Except that was designed structure for authorization algorithm and integral concept of whole application was created. The second phase is realization. At first are created supporting algorithms. It is servicing database by functions, uniform displaying results from database and authorized access of users to the application. Further data library for integral display data forms, based on used template system Smarty and other libraries, f.e. attribution of the files to records in SQL tables. Important part was implementation of designed database system and related programs. In Tests and Test runs there is user interface established and individual relations between them. According to assignment all fundamental programs were designed together with support instruments. Individual source files are saved in transparent structure of folders, so this structure is possible to apply on any computer, where are installed programs to web hosting. The result of Master`s thesis is then integrated progress report together with functional source codes.
Accounting Module of the Company Information System
Machala, Ondřej ; Husár, Adam (referee) ; Kříž, Jiří (advisor)
The subject of this project is the development of accounting module of the information system in company inLink CZ, s.r.o. The first part deals with the analysis of needs about accounting transactions, the relevant documents and subsequent financial analysis, selection of appropriate tools for the implementation and determination of the theoretical foundations. The practical part is focused on my own design solution, its implementation and deployment operations. The final part analyzes the usability and benefits of the project.
Specified construction activities
Závěrková, Jana ; Superatová, Alena (referee) ; Smětáková, Ivana (advisor)
The thesis focuses to define the concept of selected activities in construction and further entities which are allowed to conduct the activities in construction and what qualification is needed for them and what is their range of responsibility. The thesis is divided on two parts. The theoretical part deals to define the basic concepts, which origins in law. The practical part contains exact example on which are, used activities of authorized persons, their duties during the activities in construction and their responsibility. The essential part of the thesis are the proposals and recommendations, which could open the discussion for some future changes leading to more effective achievement in selected activities in construction.
Authentication of web service users
Plašil, Matouš ; Ležák, Petr (referee) ; Burda, Karel (advisor)
In this bachelor thesis are presented methods for Single Sign-On from perspective of client application. It takes a closer look at protocols OpenID and OAuth and explains the main differencies. Next part of the thesis is focused on registration of application and communication between server and client application. This is realized by OAuth protocol. In the practical part is described a created web application and used methods are explained.
Data-efficient security of cloud storages
Elis, Martin ; Fujdiak, Radek (referee) ; Člupek, Vlastimil (advisor)
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own design of possible realization. In the next part of the document, process of building a safe cloud data storage is described together with principles of ensuring its security. In the conclusion, the author focuses on comparison of cryptographic algorithms and their behavior depending on the length of a used keys.

National Repository of Grey Literature : 101 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.