Essays about: "identity and access management"
Showing result 6 - 10 of 40 essays containing the words identity and access management.
-
6. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE
-
7. Increasing Efficiency and Scalability in AWS IAM by Leveraging an Entity-centric Attribute- & Role-based Access Control (EARBAC) Model
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Cloud computing is becoming increasingly popular among all types of companies due to its inherent benefits. However, because of its infrastructure, it might be difficult to manage access rights between users and resources. READ MORE
-
8. Won't Somebody Think of the Children-A Critical Analysis of the Swedish National Guidelines for Treatment of Young People with Gender Dysphoria
University essay from Göteborgs universitet/Institutionen för kulturvetenskaperAbstract : This thesis critically analyses Sweden’s National Guidelines for Treatment of Young People with Gender Dysphoria, with the aim of providing recommendations for amending the guidelines to provide better access to gender affirming treatment for young non-binary people. Using Critical Discourse Analysis, supplemented with a group dialogue with three non-binary persons, the National Guidelines are analysed through the theoretical lens of performativity, Dean Spade’s theories on the population-management mode of power, and critical age studies. READ MORE
-
9. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE
-
10. Developing saddleback and emperor tamarin SNP set for in situ genotyping
University essay from Uppsala universitet/Institutionen för ekologi och genetik; Uppsala universitet/Institutionen för biologisk grundutbildningAbstract : Many countries in the global south - which harbour the majority of the world’s biodiversity - face serious resource limitations and a lack of access to affordable sequencing services. Furthermore, biodiversity research and monitoring of non-model, threatened and/or cryptic species often relies on low-quality non-invasive genetic samples. READ MORE