Sökning: "Fine-grained access control"
Visar resultat 1 - 5 av 9 uppsatser innehållade orden Fine-grained access control.
1. Profile Based Access Control Model Using JSON Web Tokens
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. LÄS MER
2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
Master-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskapSammanfattning : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. LÄS MER
3. User access control platform based on simple IoT household devices
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The Internet of Things (IoT) industry has been thriving for the past few years, especially in the household field. The proposal of smart homes has enabled a increasing number of IoT products to enter people’s daily lives. However, the access control in smart homes has gradually grown up to be a prominent problem. LÄS MER
4. Authorization Aspects of the Distributed Dataflow-oriented IoT Framework Calvin
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : The evolution into a networked society, where a wide variety of devices are connected to the Internet, opens up many new opportunities for creating smart products and applications that dynamically adapt to the current environment. A common scenario will be that applications require or benefit from using several devices at the same time for the execution. LÄS MER
5. Evaluation of Security in Hadoop
Master-uppsats, KTH/KommunikationsnätSammanfattning : There are different ways to store and process large amount of data. Hadoop iswidely used, one of the most popular platforms to store huge amount of dataand process them in parallel. While storing sensitive data, security plays animportant role to keep it safe. Security was not that much considered whenHadoop was initially designed. LÄS MER