Authentication and device discovery as a service for developing liquid software applications

dc.contributor.advisorPerera I
dc.contributor.authorChandrasekara P
dc.date.accept2019
dc.date.accessioned2019
dc.date.available2019
dc.date.issued2019
dc.description.abstractIn this era where an average person consumes at least two computing devices, the applications that are developed for these devices should have the transformability among them. It not only ensures the users are not interrupted when switching between devices but also allows them to use the power of computing whenever, wherever. These kinds of applications with maximum transformability among computing devices are known by the term “Liquid Software”. Even though this concept of Liquid Software can be identified as a subsection of ubiquitous computing, it can prevail alone, whereas it is not the case for ubiquitous computing which cannot exist without liquid software. There are many architectural concerns that need to be addressed when developing liquid software applications. Application security and device discovery are two of the main architectural concerns of liquid software. Ensuring security while also maintaining liquidity in applications is a challenging task. In the application level granularity, device discovery when combined with proper authentication could provide a secure liquid experience to the users. But developing solutions while also addressing these concerns would require considerable amount of design and development effort. This research introduces a service model that could provide out-of-the-box authentication and device discovery features to assist development of liquid software applications. The authentication mechanism presented through this service model is mainly based on an authentication server and is also capable of providing service level security. The device discovery mechanism of the proposed service model is based on QR codes which could be controlled at the application level in order to be integrated with the authentication mechanism while hiding the complexity of device registration. The proposed Authentication and Device Discovery as a Service model could be either consumed by web applications to adhere to liquid concepts or extended by development teams in order to plug in their own services.en_US
dc.identifier.accnoTH4016en_US
dc.identifier.citationChandrasekara, P. (2019). Authentication and device discovery as a service for developing liquid software applications [Master’s theses, University of Moratuwa]. Institutional Repository University of Moratuwa. http://dl.lib.mrt.ac.lk/handle/123/16007
dc.identifier.degreeMSc in Computer Science and Engineeringen_US
dc.identifier.departmentDepartment of Computer Science & Engineeringen_US
dc.identifier.facultyEngineeringen_US
dc.identifier.urihttp://dl.lib.mrt.ac.lk/handle/123/16007
dc.language.isoenen_US
dc.subjectCOMPUTER SCIENCE AND ENGINEERING-Dissertationsen_US
dc.subjectCOMPUTER SCIENCE-Dissertationsen_US
dc.subjectSOFTWARE DEVELOPMENTen_US
dc.subjectLIQUID SOFTWAREen_US
dc.subjectCOMPUTER ARCHITECTUREen_US
dc.titleAuthentication and device discovery as a service for developing liquid software applicationsen_US
dc.typeThesis-Full-texten_US

Files

Original bundle

Now showing 1 - 3 of 3
Loading...
Thumbnail Image
Name:
TH4016-1.pdf
Size:
241.76 KB
Format:
Adobe Portable Document Format
Description:
Pre-text
Loading...
Thumbnail Image
Name:
TH4016-2.pdf
Size:
127.55 KB
Format:
Adobe Portable Document Format
Description:
Post-text
Loading...
Thumbnail Image
Name:
TH4016.pdf
Size:
2.41 MB
Format:
Adobe Portable Document Format
Description:
Full-thesis