Essays about: "Network Access Control"

Showing result 1 - 5 of 189 essays containing the words Network Access Control.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. The Cost of Convenience: An Exploration of the Privacy Aspects in Period-Tracking Applications : A mixed-method study of perceived privacy by users in period-tracking applications

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Linnéa Beramand; [2023]
    Keywords : Femtech; Period-tracking; Actor-Network Theory; Privacy; Sceptical Design;

    Abstract : The increasing demand for female-centred services and devices in the digital era has challenged traditional notions of privacy. This thesis explores how users perceive privacy issues in period- tracking applications provided by various developers. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  5. 5. Designing Diverse Features to Reduce the Filter Bubble Effect on Social Media

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ramya Kandula; [2023]
    Keywords : Filter bubbles; recommender systems; diversity; social media; filter bubblor; rekommenderande system; mångfald; sociala medier;

    Abstract : The filter bubble effect has been an active area of research that has been explored in various contexts within social media. Research on recommender system designs within filter bubbles has received a lot of attention, mainly due to its impact on the phenomena. READ MORE