Essays about: "Access network"

Showing result 6 - 10 of 933 essays containing the words Access network.

  1. 6. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  2. 7. Evaluation of the ERA5-Land dataset for estimation of soil moisture in the permafrost region

    University essay from Stockholms universitet/Institutionen för naturgeografi

    Author : Alberta van Gent; [2023]
    Keywords : Soil moisture; ERA5-Land; International Soil Moisture Network ISMN ; permafrost region;

    Abstract : The permafrost region covers a vast area of land surface on the northern hemisphere,storing large amounts of carbon. Unfortunately, climate warming leads to permafrostthaw altering the hydrothermal state of permafrost soils. Due to the remoteness of thepermafrost region, access to field measurements is restricted. READ MORE

  3. 8. Assessing The Relationship Between Social Networks And Integration In The Labour Market In Sweden: A Case Study Of Somali And Bosnian Second-Generation Immigrants In Växjö

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Bahati George; [2023]
    Keywords : integration; immigrants; social networks; social capital;

    Abstract : The integration of immigrants has been a significant area of research, focusing on aspects such as employment, housing, and education for newly arrived community members. In recent years, scholarly attention has increasingly turned toward social networks and their influence on immigrant integration into the labor market of the host country. READ MORE

  4. 9. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  5. 10. Using Synthetic Data to ModelMobile User Interface Interactions

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Laoa Jalal; [2023]
    Keywords : Time Series Data; Generative Adversarial Networks; Synthetic Data Generator; Usability Testing; Machine Learning;

    Abstract : Usability testing within User Interface (UI) is a central part of assuring high-quality UIdesign that provides good user-experiences across multiple user-groups. The processof usability testing often times requires extensive collection of user feedback, preferablyacross multiple user groups, to ensure an unbiased observation of the potential designflaws within the UI design. READ MORE