Empreu aquest identificador per citar o enllaçar aquest ítem: http://elartu.tntu.edu.ua/handle/lib/51446
Registre complet de metadades
Camp DCValorLengua/Idioma
dc.contributor.advisorГолотенко, Олександр Сергійович-
dc.contributor.advisorHolotenko, Olexander-
dc.contributor.authorAkinyemi, Victor Oluwaseyi-
dc.date.accessioned2026-01-28T20:00:29Z-
dc.date.available2026-01-28T20:00:29Z-
dc.date.issued2026-01-26-
dc.date.submitted2026-01-12-
dc.identifier.citationAkinyemi V. O. Design and Modeling of Passwordless Authentication Architectures in Compliance with Industry-Standard Security Frameworks : Master’s qualification thesis in specialty 126 Information Systems and Technologies / supervisor O. Holotenko. — Ternopil : Ternopil Ivan Puluj National Technical University, 2025. — 95 p.uk_UA
dc.identifier.urihttp://elartu.tntu.edu.ua/handle/lib/51446-
dc.descriptionРоботу виконано на кафедрі комп'ютерних наук Тернопільського національного технічного університету імені Івана Пулюя. Захист відбудеться 26.01.2026р. на засіданні екзаменаційної комісії №37 у Тернопільському національному технічному університеті імені Івана Пулюяuk_UA
dc.description.abstractThe qualification work is dedicated to the research and development of architectural solutions for implementing passwordless authentication. The first chapter analyzes the vulnerabilities of traditional password-based access systems and examines current cybersecurity threats. The second chapter focuses on studying industry standards such as FIDO2 and WebAuthn, as well as modeling interaction processes between the user, authenticator, and server. The third chapter proposes an architectural model that ensures a high level of security and user convenience by integrating biometric methods. The performed modeling confirmed the system's resistance to man-in-the-middle (MITM) and phishing attacks. The work also includes an analysis of life safety aspects and an economic justification for the transition to passwordless technologiesuk_UA
dc.description.tableofcontentsINTRODUCTION 1 THEORETICAL ANALYSIS OF AUTHENTICATION SYSTEMS 1.1 Evolution of authentication methods and password limitations 1.2 Modern cybersecurity threat landscape 1.3 Review of current passwordless technologies 2 MODELING PASSWORDLESS AUTHENTICATION ARCHITECTURES 2.1 FIDO2 and WebAuthn frameworks overview 2.2 Modeling system interaction workflows 2.3 Integration of biometric verification factors 3 IMPLEMENTATION AND SECURITY ANALYSIS 3.1 Proposed architecture design for enterprise systems 3.2 Resistance to common cyberattacks 3.3 Usability and deployment considerations 4 ECONOMIC JUSTIFICATION OF THE PROJECT 5 OCCUPATIONAL HEALTH AND SAFETY IN EMERGENCY SITUATIONS CONCLUSIONS REFERENCESuk_UA
dc.format.extent95-
dc.language.isoukuk_UA
dc.publisherТНТУ ім. І.Пулюя, ФІС, м. Тернопіль, Українаuk_UA
dc.subject126uk_UA
dc.subjectінформаційні системи та технологіїuk_UA
dc.subjectавтентифікаціяuk_UA
dc.subjectбезпарольний доступuk_UA
dc.subjectінформаційна безпекаuk_UA
dc.subjectкібербезпекаuk_UA
dc.subjectмоделювання архітектуриuk_UA
dc.subjectстандарти безпекиuk_UA
dc.subjectбіометріяuk_UA
dc.subjectauthenticationuk_UA
dc.subjectbiometricsuk_UA
dc.subjectfido2uk_UA
dc.subjectpasswordlessuk_UA
dc.subjectsecurity frameworksuk_UA
dc.subjectwebauthnuk_UA
dc.titleDesign and Modeling of Passwordless Authentication Architectures in Compliance with Industry-Standard Security Frameworksuk_UA
dc.typeMaster Thesisuk_UA
dc.rights.holder© Akinyemi Victor Oluwaseyi, 2026uk_UA
dc.contributor.committeeMemberТиш, Євгенія Володимирівна-
dc.coverage.placenameТернопільuk_UA
dc.subject.udc004.056.52:004.7uk_UA
dc.relation.references1. America's Password Habits | Security.org. Security.org. URL: https://www.security.org/resources/online-password-strategies/ (accessed: 03.10.2024).uk_UA
dc.relation.references2. Das S., Phelan L. A., Hoyos-Rivera J. A. Password Managers Usage and Trust: A US Study of User Behavior, Preferences, and Perceptions. ACM Transactions on Privacy and Security. Vol. 24, no. 3, article 16, July 2021. URL: https://doi.org/10.1145/3447564 (date of access: 09.10.2024).uk_UA
dc.relation.references3. Saul Johnson, Jo˜ao F. Ferreira, Alexandra Mendes, and Julien Cordry. “Skeptic: Automatic, justified and privacy-preserving password composition policy selection”. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), October 2020uk_UA
dc.relation.references4. What is WebAuthn? Authentication standard. Wallarm | Integrated App and API Security Platform. URL: https://www.wallarm.com/what/webauthn-web- authentication (accessed: 05.10.2024)uk_UA
dc.relation.references5. Gordin, A. Graur, S. Vlad and C. I. Adomniței, "Moving forward passwordless authentication: challenges and implementations for the private cloud," 20th RoEduNet Conference: Networking in Education and Research (RoEduNet), 2021, pp. 1-5, doi: 10.1109/RoEduNet54112.2021.9638271 (date of access: 09.10.2024)uk_UA
dc.relation.references6. Decoding How WebAuthn Works. FusionAuth. URL: https://fusionauth.io/articles/authentication/webauthn (accessed: 05.10.2024)uk_UA
dc.relation.references7. What is the Passkey and how it works? Simple explanation | Hideez. Passwordless Workforce Identity Solutions | Hideez. URL: https://hideez.com/uk-ua/blogs/news/what-is-a-passkey (accessed: 25.11.2024)uk_UA
dc.relation.references8. Rolfe B. Synced vs Device-Bound Passkeys: How User Convenience and Authentication Experiences Vary. Authsignal - Drop-in Passkeys & Passwordless Authentication. URL: https://www.authsignal.com/blog/articles/synced-vs-device-bound-passkeys-convenience-and-authentication-experiences (date of access: 25.11.2024)uk_UA
dc.relation.references9. Device-Bound vs. Synced Passkeys (SCA & Passkeys I). Corbado - Add passkeys to any new or existing app. URL: https://corbado.com/blog/device-bound-synced-passkeys (date of access: 25.11.2024)uk_UA
dc.relation.references10. HYPR. What is a FIDO Platform Authenticator? | Security Encyclopedia. HYPR: Identity Security & Passwordless Authentication Solution. URL: https://www.hypr.com/security-encyclopedia/platform-authenticator (date of access: 25.11.2024)uk_UA
dc.relation.references11. Platform vs Cross-Platform. Yubico Developers. URL: https://developers.yubico.com/WebAuthn/WebAuthn_Developer_Guide/Platform_vs_Cross-Platform.html (date of access: 25.11.2024)uk_UA
dc.relation.references12. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. Independently Published, 2022, 462 puk_UA
dc.relation.references13. Blokdyk G. Passwordless Authentication, Second Edition. 5STARCooks, 2021. pp. 80-93uk_UA
dc.relation.references14. Passwordless Authentication Methods - Wise IT Ukraine. Wise IT Ukraine. URL: https://wiseit.com.ua/metody-autentyfikacziyi-bez-parolya-vid-fudo/ (accessed: 30.09.2024)uk_UA
dc.relation.references15. A Study on Passwordless Authentication Technology and Its Effects. The International Journal of Reliable Information and Assurance. 2018. Vol. 6, no. 1. URL: https://doi.org/10.21742/ijria.2018.6.1.03 (date of access: 19.11.2024)uk_UA
dc.relation.references16. Passwordless Magic Links vs. Certificates for Secure Access. SecureW2. URL: https://www.securew2.com/blog/passwordless-magic-link-authentication-explained (date of access: 25.11.2024)uk_UA
dc.relation.references17. Java: Basic Principles and Benefits of Use. www.mathros.net.ua - Website for Computer Science Students. URL: https://www.mathros.net.ua/basic-principles-of-java-programming.html (accessed: 25.11.2024)uk_UA
dc.relation.references18. Java: The Complete Reference, Thirteenth Edition. McGraw-Hill Education, 2023uk_UA
dc.relation.references19. Horstmann C. S. Core Java, Volume II--Advanced Features (11th Edition). Prentice Hall, 2019. pp. 26-28uk_UA
dc.relation.references20. Scarioni C., Nardone M. Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications. Apress, 2019. 428 puk_UA
dc.relation.references21. Spring Boot. Spring Boot. URL: https://spring.io/projects/spring-boot (date of access: 25.11.2024)uk_UA
dc.relation.references22. Spring Data. Spring Data. URL: https://spring.io/projects/spring-data (date of access: 25.11.2024)uk_UA
dc.relation.references23. Macero García M., Telang T. Learn Microservices with Spring Boot 3. 3rd ed. Berkeley, CA : Apress, 2023. pp. 11-18uk_UA
dc.relation.references24. Yubico Developers. Yubico Developers. URL: https://developers.yubico.com/ (date of access: 25.11.2024)uk_UA
dc.relation.references25. Tudose C. Java Persistence with Spring Data and Hibernate. Manning, 2022. 625 puk_UA
dc.relation.references26. Hibernate. Everything data. Hibernate. URL: https://hibernate.org/ (date of access: 25.11.2024)uk_UA
dc.relation.references27. Apache Maven Series | Baeldung. Baeldung. URL: https://www.baeldung.com/maven-series (accessed: 11.10.2024)uk_UA
dc.relation.references28. Gaba I. What is Maven: Here's What You Need to Know [Updated]. Simplilearn.com. URL: https://www.simplilearn.com/tutorials/maven-tutorial/what-is-maven (date of access: 25.11.2024)uk_UA
dc.relation.references29. What Is PostgreSQL?. Kinsta®. URL: https://kinsta.com/knowledgebase/what-is-postgresql/#what-is-postgresql (date of access: 29.09.2024)uk_UA
dc.relation.references30. Schönig H.-J. Mastering PostgreSQL 12: Advanced Techniques to Build and Administer Scalable and Reliable PostgreSQL Database Applications, 3rd Edition. Packt Publishing, Limited, 2019uk_UA
dc.relation.references31. Mastering PostgreSQL 15: Advanced techniques to build and manage scalable, reliable, and fault-tolerant database applications, 5th Edition. Packt Publishing, 2023. 522 puk_UA
dc.relation.references32. Blog H. H. T. Passwordless Authentication With Passkey: How It Works and Why It Matters – Part 1. Medium. URL: https://medium.com/@heritage.tech/passwordless-authentication-with-passkey-how-it-works-and-why-it-matters-part-1-dcae2a004988 (date of access: 29.09.2024)uk_UA
dc.relation.references33. Web client definition Glossary. NordVPN. URL: https://nordvpn.com/uk/cybersecurity/glossary/web-client/ (date of access: 09.10.2024)uk_UA
dc.relation.references34. HYPR. What is a FIDO Relying Party (RP)? | Security Encyclopedia. Identity Security & Passwordless Authentication Solution | HYPR. URL: https://www.hypr.com/security-encyclopedia/relying-party-rp (date of access: 05.10.2024)uk_UA
dc.relation.references35. Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication / S. Ghorbani Lyastani et al. 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–21 May 2020. 2020. URL: https://doi.org/10.1109/sp40000.2020.00047 (date of access: 19.11.2024)uk_UA
dc.relation.references36. Biometrics, FIDO, and More: A Guide to Passwordless Authentication Methods. BIO-key Blog. URL: https://blog.bio-key.com/biometrics-fido-and-more-a-guide-to-passwordless-authentication-methods (accessed: 09.10.2024)uk_UA
dc.relation.references37. What is a relational database?. Oracle | Cloud Applications and Cloud Platform. URL: https://www.oracle.com/database/what-is-a-relational-database/ (date of access: 09.10.2024)uk_UA
dc.relation.references38. Does my browser support WebAuthn?. Does my browser support WebAuthn?. URL: https://webauthn.me/browser-support (date of access: 25.11.2024)uk_UA
dc.relation.references39. Rasmussen B. A Usability Study of FIDO2 Roaming Software Tokens as a Password Replacement. 2021. URL: https://scholarsarchive.byu.edu/etd/9227 (date of access: 19.11.2024)uk_UA
dc.relation.references40. What is Passwordless Authentication and How Does It Work?. LoginTC. URL: https://www.logintc.com/types-of-authentication/passwordless-authentication/ (date of access: 09.10.2024)uk_UA
dc.contributor.affiliationТНТУ ім. І. Пулюя, Факультет комп’ютерно-інформаційних систем і програмної інженерії, Кафедра комп’ютерних наук, м. Тернопіль, Українаuk_UA
dc.coverage.countryUAuk_UA
dc.identifier.citation2015Akinyemi V. O. Design and Modeling of Passwordless Authentication Architectures in Compliance with Industry-Standard Security Frameworks: Master’s qualification thesis in specialty 126 Information Systems and Technologies / supervisor O. Holotenko. Ternopil: Ternopil Ivan Puluj National Technical University, 2025. 95 p.uk_UA
Apareix a les col·leccions:126 — інформаційні системи та технології

Arxius per aquest ítem:
Arxiu Descripció MidaFormat 
KRM_2026_ISTm-62_Akinyemi_VO.pdfДипломна робота2,01 MBAdobe PDFVeure/Obrir


Els ítems de DSpace es troben protegits per copyright, amb tots els drets reservats, sempre i quan no s’indiqui el contrari.

Eines d'Administrador