Essays about: "Access Control Lists"
Showing result 1 - 5 of 8 essays containing the words Access Control Lists.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Secure log-management for an Apache Kafka-based data-streaming service
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE
-
3. Digital incursion: Breaching the android lock screen and liberating data
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE
-
4. En katts belåtenhet : djurhållning och krav på katthem och kattpensionat
University essay from SLU/Dept. of Animal Environment and HealthAbstract : The cat (Felis silvestris catus) introduced itself to our society roughly 11 500 – 12 500 years ago in the shape of the African wildcat ( Felis silvestris lybica ). It quickly found a place among us, functioning as pest control, and later on as a pet. Today cats stand as the most common pet in Sweden, residing in over 750 000 Swedish households. READ MORE
-
5. Efficient IPv6 Neighbor Discovery in Wireless Environment
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As the address space of IPv4 is being depleted with the development of IoT (Internet Of Things), there is an increasing need for permanent transition to the IPv6 protocol as soon as possible. Nowadays, many 3GPP (3rd Generation Partnership Project) Networks have implemented or will implement IPv6 in the near future for Internet access. READ MORE