Essays about: "third party access"

Showing result 1 - 5 of 64 essays containing the words third party access.

  1. 1. How do Social Enterprises transform Education Inequality in Developing Countries?

    University essay from Göteborgs universitet/Graduate School

    Author : Marko Golac; [2023-07-19]
    Keywords : ;

    Abstract : Education inequality continues to be a barrier to social progress and reinforces the cycle of poverty. That is best visible in developing countries- where resources dedicated to education are not optimal and traditional approaches to reduce education inequality have proven to be ineffective, if there are any at all, due to resource limitations, bureaucratic barriers, and systemic complexities. READ MORE

  2. 2. Open standards and interoperability within the automotive domain and smart cities

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Amanda Lind Jonsson; Elin Högman Möller; [2023-02-01]
    Keywords : Automotive domain; smart cities; urban IoT; interoperability; open standards; knowledge graphs;

    Abstract : Vehicle signals are today in highly heterogeneous formats which leads to difficulties for third-party developers to access, understand and integrate with these signals. Thus, the automotive domain needs to find a way to describe its vehicle signals to the outside world. READ MORE

  3. 3. Vulnerability Management of Open-Source Libraries

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Lokesh kumar Mekala; Sai krishna Kandukuri; [2023]
    Keywords : vulnerability management; software security; open-source software.;

    Abstract : Background: The proliferation of using open-source libraries in software development has brought numerous benefits, including access to a wide range of reusable code and collaborating with a global community of developers. However, this increased reliance on third-party code also introduces new security risks in the form of vulnerabilities that malicious actors can exploit. READ MORE

  4. 4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 5. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry

    University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakulteten

    Author : Adam Fager; [2023]
    Keywords : Cloud-Based Shadow IT; Shadow IT; Swedish Tech Sector; Data Privacy; Managers; Employees; End User Computation; Workaround; Personal IT; Third-Party Access;

    Abstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE