Essays about: "accesskontroll"

Found 5 essays containing the word accesskontroll.

  1. 1. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  2. 2. Security of dynamic authorisation for IoT through Blockchain technology

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Sandor; [2018]
    Keywords : Blockchain; IoT; Public Key Encryption; Public Key Infrastructure;

    Abstract : The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with asymmetric key encryption that is handled by the centralized certificate authority infrastructure. READ MORE

  3. 3. Designing an Access Control System for Internet of Things

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Felix Grape; [2017]
    Keywords : IoT; internet of things; access control system; security; generic; remote procedure call; rpc; access control; distributed access control; decentralized access control; generic access control system; sakernas internet; accesskontrollsystem; accesskontroll; generisk accesskontroll; generisk;

    Abstract : For many Internet of Things (IoT) devices security have not been a priority during the development, but what happens if the makers of IoT devices use a secure framework for developing their devices? In this thesis a number of such frameworks have been evaluated for their suitability to build an access control system around. Both Vanadium and Protocol of Things (PoT) were found to be suitable candidates. READ MORE

  4. 4. Discretionary Version Control : Access Control for Versionable Documents

    University essay from KTH/Skolan för teknik och hälsa (STH)

    Author : Rickard Hermansson; Johan Hellström; [2014]
    Keywords : Version control; access control; content management; docu ment control; java content repository; webDAV; document sharing;

    Abstract : A common problem in the workplace is sharing digital documents with coworkers. Forsome companies the problem extends to wanting the documentskept internally backedup and controlling which people in the company has rights to read and revise certaindocuments. READ MORE

  5. 5. Discretionary Version Control : Access Control for Versionable Documents

    University essay from KTH/Data- och elektroteknik; KTH/Skolan för teknik och hälsa (STH)

    Author : Rickard Hermansson; Johan Hellström; [2014]
    Keywords : Version control; access control; content management; docu ment control; java content repository; webDAV; document sharing;

    Abstract : A common problem in the workplace is sharing digital documents with coworkers. Forsome companies the problem extends to wanting the documentskept internally backedup and controlling which people in the company has rights to read and revise certaindocuments. READ MORE