Essays about: "Attribute-Based Access Control"

Showing result 1 - 5 of 9 essays containing the words Attribute-Based Access Control.

  1. 1. Tenant Separation on a multi-tenant microservice platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Axel Sandqvist; [2023]
    Keywords : multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Abstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE

  2. 2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  3. 3. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  4. 4. Access Management in Organizations : A Comprehensive Study and Scenario-based Analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Anna Bergström; Emily Berghäll; [2023]
    Keywords : access management; access control; access control models; role-based access control; attribute-based access control; ACM; access rights; organization; organization-based; scenario-based; evaluation;

    Abstract : Access management is an important part of the security of an organization as it limits access to sensitive material such as code and files. Therefore, access management can be a vital part of preventing leaks of information in regard to company-sensitive information or information about employees or users. READ MORE

  5. 5. Increasing Efficiency and Scalability in AWS IAM by Leveraging an Entity-centric Attribute- & Role-based Access Control (EARBAC) Model

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Rasmus Karlsson; Pontus Jönrup; [2023]
    Keywords : Cloud; Authorisation; Security; AWS; Amazon; RBAC; ABAC; EARBAC; Access Control; Access Control Model; Access Control Models; Principle of Least Privilege;

    Abstract : Cloud computing is becoming increasingly popular among all types of companies due to its inherent benefits. However, because of its infrastructure, it might be difficult to manage access rights between users and resources. READ MORE