Essays about: "Third-Party Access"
Showing result 1 - 5 of 61 essays containing the words Third-Party Access.
-
1. How do Social Enterprises transform Education Inequality in Developing Countries?
University essay from Göteborgs universitet/Graduate SchoolAbstract : Education inequality continues to be a barrier to social progress and reinforces the cycle of poverty. That is best visible in developing countries- where resources dedicated to education are not optimal and traditional approaches to reduce education inequality have proven to be ineffective, if there are any at all, due to resource limitations, bureaucratic barriers, and systemic complexities. READ MORE
-
2. Open standards and interoperability within the automotive domain and smart cities
University essay from Institutionen för tillämpad informationsteknologiAbstract : Vehicle signals are today in highly heterogeneous formats which leads to difficulties for third-party developers to access, understand and integrate with these signals. Thus, the automotive domain needs to find a way to describe its vehicle signals to the outside world. READ MORE
-
3. Vulnerability Management of Open-Source Libraries
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE
-
4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
5. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry
University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakultetenAbstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE