Showing 8 open source projects for "separation"

View related business solutions
  • Orchestrate Your AI Agents with Zenflow Icon
    Orchestrate Your AI Agents with Zenflow

    The multi-agent workflow engine for modern teams. Zenflow executes coding, testing, and verification with deep repo awareness

    Zenflow orchestrates AI agents like a real engineering system. With parallel execution, spec-driven workflows, and deep multi-repo understanding, agents plan, implement, test, and verify end-to-end. Upgrade to AI workflows that work the way your team does.
    Try free now
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Casdoor

    Casdoor

    An open-source Identity and Access Management (IAM)

    A UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supporting OAuth 2.0, OIDC, SAML and CAS, integrated with Casbin RBAC and ABAC permission management. Within a few steps, we can setup a Casdoor app and realize our authorization management. Casdoor has a front-end back-end separation architecture, with maneuverable web UI and supporting high concurrency. Casdoor is supporting multi-languages, using i18n to support multi-languages UI. For more languages support, welcome to propose in our community. Casdoor SDK provides many functions, such as identity authentication, user management, resource upload, etc. Access to Casdoor is very convenient, please visit How to Connect to Casdoor for details. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Trillian

    Trillian

    A transparent, highly scalable and cryptographically verifiable data

    trillian is a transparent, cryptographically verifiable data store built on Merkle trees that provides append-only logs and verifiable key–value maps. It separates a storage layer from a verifiability layer, letting applications prove inclusion, consistency, and non-existence through compact cryptographic proofs. The system is designed for horizontal scale with gRPC APIs, enabling multiple frontends and sequencers to operate over a shared backend. Common use cases include certificate...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design — ARX-based sponge resistant to Grover-type attacks. Context and salt separation — unique hashing domains for each use-case. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PQS

    PQS

    Petoron Quantum Standard (PQS)

    ...PQS v1.2 is a minimalistic, self-contained encryption engine for secure file protection, with zero reliance on external cryptographic libraries. PBKDF2-HMAC-SHA256 (200k iterations, adjustable) for password hardening. Key separation via BLAKE2s - independent keys for encryption and MAC. BLAKE2s-MAC authentication - 16-byte tag, any modification = instant rejection. Streaming keystream generator - secure, large-scale XOR without key reuse. Fake padding (HEAD/TAIL) - obfuscates binary boundaries and payload structure. Precise size encoding - restores original payload exactly. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 5
    SurveyKing

    SurveyKing

    Make a better survey system

    ...Simple installation and deployment ( deployment within 1 minute at the fastest ), supports one-click windows deployment, one-click docker deployment, front-end and back-end separation deployment, single jar deployment, and secondary directory deployment.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Key Transparency

    Key Transparency

    A transparent and secure way to look up public keys

    Key Transparency is a system for accountable public-key discovery that lets users and senders verify the keys associated with an account over time. It combines an append-only log with a verifiable map so changes to a user’s keys produce cryptographic proofs, enabling clients to detect malicious insertions or undetected key rotations. The architecture separates operators from verifiers: even if the service is compromised, independent clients can audit inclusion and consistency proofs to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    HiJackThis

    HiJackThis

    A free utility that finds malware and other threats

    ...You may want to look at the existent unofficial forks though: https://github.com/dragokas/hijackthis/ -- HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis scan results make no separation between safe and unsafe settings , which gives you the ability to selectively remove items from your machine. In addition to scan and remove capabilities, HijackThis comes with several useful tools to manually remove malware from your computer. However, HijackThis does not make value based calls between what is considered good or bad. ...
    Leader badge
    Downloads: 836 This Week
    Last Update:
    See Project
  • 8
    Zas is an aspect-oriented access control framework for Java applications, based on the abstract reference monitor model proposed by Anderson, which enables the separation of the access control concern from the functional logic of the application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next