1º Year
Secure Execution Environments
Applied Cryptography
Robust Software
Quantum Safety
Machine Learning Applied to Security
Analysis and Exploration of Vulnerabilities
Computer Systems Forensic Analysis
Reverse Engineering
Identification, Authentication and Authorization
Secure Execution Environments
Direito da Organização e da Segurança
More
Search
Ctrl + K
Authorization roles
Previous
Sessions
Next
AEGIS
Last updated
4 months ago
3 roles
USER
ADMIN
DUP
Entities’ attributes for authorization
userWithAuth
adminWithPolicy
Set
Clear
userWithAuth
password
HMAC
policy
policy
adminWithPolicy
policy
password
HMAC
policy