Essays about: "access control system"
Showing result 1 - 5 of 373 essays containing the words access control system.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Kartläggning av krisberedskapen på nötkreatursgårdar i Uppland : en intervjustudie av lantbrukares uppfattningar om sårbarheter och styrkor i beredskapen på mjölk- och köttgårdar
University essay from SLU/Dept. of Clinical SciencesAbstract : Primärproduktionen, där animalieproduktion är en del, behöver kunna fortgå trots störningar så som mer extrema väderförhållanden med långdragen torka eller kraftiga skyfall, större sjukdomsutbrott eller i värsta fall väpnad konflikt. Idisslare har en viktig roll i vår livsmedelsförsörjning men i dagsläget vet vi väldigt lite om hur den enskilda gården skulle påverkas vid olika samhällsstörningar. READ MORE
-
3. A Decentralised Application for Storing Electronic Health Records using Blockchain Technology
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : With the systems currently used in healthcare, medical records are often centrally stored in local databases or cloud services and managed by each individual healthcare provider. Due to this, the information exchange between healthcare providers is often limited. READ MORE
-
4. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE
-
5. Wi-Fi fingerprinting as a mean to measure building occupancy : A case study in an office environment
University essay from KTH/TransportplaneringAbstract : The task of collecting visitor data in an indoor environment and therein determining the occupancy of a building is an extensive task. Conventional methods are expensive, time-consuming, and often lack the ability to produce data in longer time series. Further, they often require disruption of the studied area as equipment must be deployed. READ MORE