Essays about: "Permissions"

Showing result 11 - 15 of 57 essays containing the word Permissions.

  1. 11. International Payments, Trade Finance & Blockchain : A qualitative study about the impact of blockchain implementation

    University essay from Umeå universitet/Företagsekonomi

    Author : Amanda Grandin; Maria Eriksson; [2021]
    Keywords : Blockchain; Trade Finance; Supply Chain Finance; International Payments; Efficiency; Transparency;

    Abstract : The digitalization of our world is happening at a rapid pace. In the last few years there has been an avalanche of new technologies that could benefit businesses, such as; artificial intelligence, internet of things and blockchain. READ MORE

  2. 12. Prevention of Privilege Abuse on NoSQL Databases : Analysis on MongoDB access control

    University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)

    Author : Marwah Ishak; [2021]
    Keywords : NoSQL databases; MongoDB; Access control; Privilege abuse; Role-based access control; NoSQL-databaser; MongoDB; Åtkomstkontroll; Missbruk av privilegier;

    Abstract : Database security is vital to retain confidentiality and integrity of data as well as prevent security threats such as privilege abuse. The most common form of privilege abuse is excessive privilege abuse, which entails assigning users with excessive privileges beyond their job function, which can be abused deliberately or inadvertently. READ MORE

  3. 13. Implementation and Evaluation of an Emulated Permission System for VS Code Extensions using Abstract Syntax Trees

    University essay from Linköpings universitet/Programvara och system

    Author : Åström David; [2021]
    Keywords : Visual Studio Code; Extensions; Permissions; Static Analysis; Abstract Syntax Trees;

    Abstract : Permission systems are a common security feature in browser extensions and mobile applications to limit their access to resources outside their own process. IDEs such as Visual Studio Code, however, have no such features implemented, and therefore leave extensions with full user permissions. READ MORE

  4. 14. Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Fredrik Josefsson Ågren; Oscar Järpehult; [2021]
    Keywords : Third Party Authentication; Authentication; Third-party Single Sign On; OpenID; OpenID connect; Oauth; TLS; Web Security; Identity Provider; Relying Party; IDP; RP; Longitudinal Analysis; Web Crawler; Selenium; Google; Facebook; Twitter; Apple;

    Abstract : Third-party authentication services are becoming more common since it eases the login procedure by not forcing users to create a new login for every website thatuses authentication. Even though it simplifies the login procedure the users still have to be conscious about what data is being shared between the identity provider (IDP) and the relying party (RP). READ MORE

  5. 15. FPGA Implementation of an Anonymization Algorithm

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Kjellman; Rehenuma Tarannum; [2020]
    Keywords : FPGA anonymization privacy anonymization filter spacial filter; Technology and Engineering;

    Abstract : With the large amount of surveillance cameras in our public spaces there has been much discussion about their effects on privacy. Axis communications has an algorithm that tries to remedy this by making it hard to see who is in an image but still have it possible for a neural network to detect that there is a person present. READ MORE