Essays about: "SaaS security"
Showing result 1 - 5 of 31 essays containing the words SaaS security.
-
1. Communicating compliance : A qualitative research of safety information within blue collar industries in Sweden and Norway and an onboarding design proposal of a regulatory compliance app
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Which solutions exist within the blue collar industries in Sweden and Norway today for conveying safety information to its employees? How may one re-design an understandable onboarding process to a digital app for Swedish-speaking blue collar workers? This study set out to research these questions, collaborating with Inphiz Technologies AB, a SaaS company in Stockholm, Sweden who has created a digital service to manage and automate legislative and regulatory compliance data in blue collar industries. The objective of the study was to answer the research questions and to create a design proposal for the users first steps into the Inphiz app through an onboarding process. READ MORE
-
2. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE
-
3. Up in the Cloud : Exploring small and medium-sized enterprises cloud computing adoption factors
University essay from Jönköping University/Internationella HandelshögskolanAbstract : Background: The intense growth of data that is continuously expanding has resulted in SMEs using cloud computing to store, process and analyze data. Thus, a critical element is for SMEs to understand the value of cloud computing and the factors influencing the adoption decision. READ MORE
-
4. Project based multi-tenant managed RStudio on Kubernetes for Hopsworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In order to fully benefit from cloud computing, services are designed following the “multi-tenant” architectural model which is aimed at maximizing resource sharing among users. However, multi-tenancy introduces challenges of security, performance isolation, scaling and customization. READ MORE
-
5. Threat Modeling and Penetration Testing of a Yanzi IoT-system : A Survey on the Security of the system’s RF communication
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Internet of Thing (IoT) products have in recent years become increasingly popular with both industries and private consumers, and it has been forecasted that the number of connected devices around the world will be roughly 14 billion in the year 2022. One particular field that the booming of IoT solutions continues to create endless possibilities for is smart offices. READ MORE