Essays about: "secure access"

Showing result 1 - 5 of 308 essays containing the words secure access.

  1. 1. Cultivating connections: exploring the impact of community garden on social cohesion : in a socio-economic disadvantaged neighbourhood in Sweden

    University essay from SLU/Dept. of Urban and Rural Development

    Author : Reham Ghallab; [2024]
    Keywords : Social cohesion; social capital; community garden; socio-economic neighbourhoods; segregation;

    Abstract : The study delves into the interplay between the social dynamics of the community garden space and broader socio-political forces, exploring how these factors mold practices and interactions within the community garden, thereby influencing social cohesion. Despite the apparent segregation, Tensta Garden serves as a catalyst, inspiring residents to construct relationships, actively participate, and cultivate connections and shared experiences. READ MORE

  2. 2. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  3. 3. Swedish Settler-Colonialism in the Forest : Forest Samis's Rights and Land Disposal

    University essay from Enskilda Högskolan Stockholm/Avdelningen för mänskliga rättigheter och demokrati

    Author : Sara Lind; [2023]
    Keywords : Forest Samis; Reindeer Herding; Settler-Colonialism; Indigenous land rights; Forestry Management;

    Abstract : This paper delves into the significance of land disposal to indigenous rights and Settler-Colonies. Specifically, it examines land use regulations for forestry management and Forest Sami villages. READ MORE

  4. 4. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  5. 5. An Integrated Room Booking and Access Control System for Public Spaces

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jaffar Kamil; Mohamed Amer; [2023]
    Keywords : Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Abstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE