Essays about: "identity management system"

Showing result 1 - 5 of 74 essays containing the words identity management system.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. “It is an act of rebellion” The Intersectional Perspective on Bilingual Schools Experiences in Israel’s Ethnic Conflict

    University essay from Lunds universitet/Institutionen för kulturgeografi och ekonomisk geografi; Lunds universitet/LUMID International Master programme in applied International Development and Management

    Author : Mariia Medvedeva; [2024]
    Keywords : Bilingual Schools; Education in Ethnic Conflict; Identity; Israel; Politics of Belonging; Social Sciences;

    Abstract : In the reality of Israel’s educational system, it is highly unlikely that Arab and Jewish students will ever meet at school. Within this state-segregated context, bilingual multicultural education, while having the potential to act as a catalyst for change and promote intercultural dialogue, remains on the brim of academic interests. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. Designing a Trustworthy EU Digital Identity Wallet : A study of user needs and preferences

    University essay from Uppsala universitet/Datorteknik

    Author : Madeleine Sjöholm; [2023]
    Keywords : eIDAS; trust; digital identity; EU digital identity wallet; regulation; usability;

    Abstract : The digitalization has become increasingly central in today’s society and digital identities are one of the tangible changes that has quickly become integrated into our society. However, increased integration in societies also creates new challenges and responsibilities. READ MORE

  5. 5. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE