Essays about: "Network Access Control"
Showing result 1 - 5 of 189 essays containing the words Network Access Control.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. The Cost of Convenience: An Exploration of the Privacy Aspects in Period-Tracking Applications : A mixed-method study of perceived privacy by users in period-tracking applications
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : The increasing demand for female-centred services and devices in the digital era has challenged traditional notions of privacy. This thesis explores how users perceive privacy issues in period- tracking applications provided by various developers. READ MORE
-
3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE
-
4. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE
-
5. Designing Diverse Features to Reduce the Filter Bubble Effect on Social Media
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The filter bubble effect has been an active area of research that has been explored in various contexts within social media. Research on recommender system designs within filter bubbles has received a lot of attention, mainly due to its impact on the phenomena. READ MORE