Essays about: "Permissions"
Showing result 11 - 15 of 57 essays containing the word Permissions.
-
11. International Payments, Trade Finance & Blockchain : A qualitative study about the impact of blockchain implementation
University essay from Umeå universitet/FöretagsekonomiAbstract : The digitalization of our world is happening at a rapid pace. In the last few years there has been an avalanche of new technologies that could benefit businesses, such as; artificial intelligence, internet of things and blockchain. READ MORE
-
12. Prevention of Privilege Abuse on NoSQL Databases : Analysis on MongoDB access control
University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)Abstract : Database security is vital to retain confidentiality and integrity of data as well as prevent security threats such as privilege abuse. The most common form of privilege abuse is excessive privilege abuse, which entails assigning users with excessive privileges beyond their job function, which can be abused deliberately or inadvertently. READ MORE
-
13. Implementation and Evaluation of an Emulated Permission System for VS Code Extensions using Abstract Syntax Trees
University essay from Linköpings universitet/Programvara och systemAbstract : Permission systems are a common security feature in browser extensions and mobile applications to limit their access to resources outside their own process. IDEs such as Visual Studio Code, however, have no such features implemented, and therefore leave extensions with full user permissions. READ MORE
-
14. Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Third-party authentication services are becoming more common since it eases the login procedure by not forcing users to create a new login for every website thatuses authentication. Even though it simplifies the login procedure the users still have to be conscious about what data is being shared between the identity provider (IDP) and the relying party (RP). READ MORE
-
15. FPGA Implementation of an Anonymization Algorithm
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : With the large amount of surveillance cameras in our public spaces there has been much discussion about their effects on privacy. Axis communications has an algorithm that tries to remedy this by making it hard to see who is in an image but still have it possible for a neural network to detect that there is a person present. READ MORE