Showing 78 open source projects for "network access control"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    jCasbin

    jCasbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Spring Security

    Spring Security

    Authentication and access-control framework

    Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications. Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the real power of Spring Security is found in how easily it can be extended to meet custom requirements.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Cryptomator

    Cryptomator

    Multi-platform transparent client-side encryption for your cloud files

    Cryptomator is a free and open source project that offers multi-platform, transparent client side encryption of your files in the cloud. It works with just about any cloud storage service; is totally transparent so you can work with your files how you normally would; and secure with a 256-bit key length AES encryption. It’s also simple and easy to use with no need for different accounts, key management, cloud access grants or cipher configurations.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 4
    unity-idm

    unity-idm

    Identity management and federations integration

    This project is used to host the mailing list and downloads of the Open Source Unity system - versatile identity management solution.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Briar
    Briar is a messaging app designed for activists, journalists, and anyone else who needs a safe, easy and robust way to communicate. Unlike traditional messaging tools such as email, Twitter or Telegram, Briar doesn't rely on a central server - messages are synchronized directly between the users' devices. If the Internet's down, Briar can sync via Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If the Internet's up, Briar can sync via the Tor network, protecting users and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Hystrix

    Hystrix

    Latency and Fault Tolerance for Distributed Systems

    Defend your app with Hystrix, a latency and fault tolerance library developed by the Netflix API team. It works by isolating points of access to remote systems, services and 3rd party libraries, thereby stopping cascading failure and providing fallback options, and making complex distributed systems more resilient in cases where failure is inevitable. In a distributed environment, failure is simply inevitable for some service dependencies. With Hystrix you can control the interactions between these distributed services and protect your host application. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    StrongKey CryptoEngine

    StrongKey CryptoEngine

    FIDO strong authentication, encryption, digital signature engine

    StrongKey CryptoEngine (SKCE) 2.0 is a "crypto Swiss Army knife" server to perform cryptographic functions through web services, while freeing application developers to focus on business functionality. Its modules include: - A FIDO Engine to support FIDO U2F key registrations/authentications - An encryption engine to encrypt/decrypt files using AES/TDES keys - Escrowing keys to on-premises key management system (StrongAuth KeyAppliance/SAKA) - Integration to cloud storage services...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    MotOrBAC

    An OrBAC policy editor

    MotOrBAC is a tool to help you design and implement a security policy using the OrBAC (Organisation Based Access Control) model. It is developped using the OrBAC API, an implementation of the OrBAC model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Bias :: Versatile Information Manager
    Bias is a cross-platform versatile information management application / Organizer
    Downloads: 1 This Week
    Last Update:
    See Project
  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • 10
    Google Authenticator OpenSource

    Google Authenticator OpenSource

    Open source version of Google Authenticator (except the Android app)

    Google Authenticator is the open-source counterpart of Google’s one-time passcode apps, implementing industry-standard OATH algorithms such as TOTP (time-based) and HOTP (counter-based) for two-factor authentication. The repository historically hosts code for mobile platforms like iOS and BlackBerry, demonstrating how to generate numeric codes locally without needing network access. Its core purpose is to help services and users add a second factor that’s simple to deploy yet resistant to password reuse and phishing. The app flow revolves around enrolling secrets via QR codes or manual entry, storing them securely on-device, and rendering rotating codes synchronized by time. Because it uses open standards, it interoperates with virtually any service that supports TOTP/HOTP, not just Google properties. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Untangle
    Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com
    Downloads: 38 This Week
    Last Update:
    See Project
  • 12
    JPA Security is an Access Control Solution for the Java Persistence API. JPA Security enables you to configure access control to your JPA Entity Beans based on the currently authenticated user and its roles via XML or Annotations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    FACPL - Access control policies

    FACPL - Access control policies

    A Java library for Attribute-based Access Control Policies

    FACPL: a Java-based library for the specification and enforcement of Access Control policies - Attribute-based Access Control Policies - Advanced features for the management of, e.g., combining algorithms and missing attributes - Generation of XACML code starting from FACPL code - Generation of FACPL code starting from XACML code Source Code: https://github.com/andreamargheri/FACPL/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    SilverTunnel-NG

    Java library for easy accessing Tor network.

    SilverTunnel-NG is a Java library that implements and encapsulates all the complex network protocol stuff needed for anonymous communication over the Tor anonymity network. SilverTunnel-NG Netlib can be easily integrated in almost every existing and new Java application. The library requires Java 1.6/Java SE 6 or a newer version. This is a fork of silvertunnel (https://silvertunnel.org) Version (0.0.4) is deployed to maven. Since Version 0.0.4 SilverTunnel-NG also runs on...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Hypersocket FTS

    Hypersocket FTS

    A File Transfer Server built with RBAC and custom business rules

    Hypersocket FTS is cross-platform File Transfer Server that provides web-based and FTP/S access to different file systems (Local, FTP, Windows). You can install the server on any operating system supporting a Java runtime and we provide easy-to-use installers for Linux, Windows and MacOSX. The server comes with built in support for executing tasks based on custom trigger rules and also on a automated schedule. With its powerful role-based access control you have very granular control over who has access to what files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    SEWOL: Security-oriented Workflow Lib

    SEWOL: Security-oriented Workflow Lib

    Java Library for workflow handling

    ...It allows to specify the shape and content of process traces in terms of entries representing the execution of a specific workflow activity. Currently it supports plain text, Petrify, MXML and XES log file types. In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). SEWOL uses and encloses the following libraries: - TOVAL (http://sourceforge.net/p/toval), - JAGAL (http://sourceforge.net/p/jagal), - OpenXES (http://www.xes-standard.org/openxes/), - Spex (http://code.deckfour.org/Spex/) - Google Guava (https://github.com/google/guava), - xstream (http://xstream.codehaus.org/) and - graph-impl and visualization components of Jung 2 (http://jung.sourceforge.net/). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    ...Besides basic synthesis properties (cases per day, office hours, randomized activity duration, ...), its detailed parameter setting for simulating business processes also allows to specify data usage (objects + access modality), actors for process activities and access control constraints for task/object permissions. It is also capable of enforcing/violating specific security properties on process traces, such as SoD/BoD, Unauthorized Access, Corrupted log entries, Skipped Activities. SecSy builds upon the following libraries, that have to be included in the projects' build path: - JAGAL: http://sourceforge.net/p/jagal - JAWL: http://sourceforge.net/p/jawl - SEPIA: http://sourceforge.net/p/sepiaframework - SERAM: http://sourceforge.net/p/seram - TOVAL: http://sourceforge.net/p/toval
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SERAM: Security Reasoning Framework

    SERAM: Security Reasoning Framework

    Framework for security-related definition and reasoning.

    The content of SERAM has been moved to the security-oriented workflow library SEWOL: https://sourceforge.net/projects/jawl/ SEARM provides support for the definition of access control policies, such as ACLs and RBAC models. Additionally, it allows to specify inference policies and comprises techniques for reasoning about inferences and information distribution along a set of inference rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Access control PEP PDP PIP PAP

    Implementation of the PEP/PDP/PIP/PAP access control pattern.

    This project provides an implementation of the PEP/PDP/PIP/PAP access control pattern. The implementation is in Java. For the moment it implements an XACML PDP. It provides a web based user interface to manage users, roles, actions, assign actions to roles, and assign users to roles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Scramble!
    “Scramble your social network data!” - With Scramble you can selective enforce you access control preferences for your content on social networks like Facebook or Twitter ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Access Road

    Access Road

    Simulator of access controls

    The Access Road software is a universal simulator of access controls that is intended to improve design and auditing of IT security. Access Road offers the out-of-the-box simulations of GNU/Linux Ubuntu® (components and rights on the file system), MySQL Server®, and a generic Role-Based-Access-Control application to adapt to your needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    DENRIT

    DENRIT

    Perform anonymous and non-anonymous pentesting.

    DENRIT allows remote administration of anonymous networks (TOR, I2P and FreeNet). Also, contains a pentesting module to execute commands using a selected anonymous network, pentesting with TOR or TCP Follows a client/server model with well-defined communication interfaces. SSH is used to allow remote clients to access the machine and manage any anonymous network that is installed there, plus allows penetration testing anonymously (or non-anonymously) using tools such as Metasploit Framework, nmap, nikto, among others. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    iAlertU

    iAlertU

    An alarm for your MacBook.

    iAlertU is an alarm system for your Apple MacBook that uses the built in motion detection to trigger the alarm and the iSight to capture the image of the thief. Among many other features, it incorporates the ability for users with iPhone, iPad, or iPod Touch to connect to and control iAlertU remotely.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    silvertunnel - Java lib+browser for TOR
    silvertunnel.org is a project that provides an end-user browser, a Java library and additional Java security tools to easily access anonymity networks such as the Tor (torproject.org) network. Secure and easy to use. Tor4Java and Tor Browser. Attention: see project status on page https://sourceforge.net/p/silvertunnel/discussion/962278/thread/83dc2d02/#
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB