Sökning: "Identity Access Management"

Visar resultat 1 - 5 av 55 uppsatser innehållade orden Identity Access Management.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Nithya Sree Muddychetty; [2024]
    Nyckelord :Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Sammanfattning : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. LÄS MER

  2. 2. Drivande faktorer inom identitets- och åtkomsthantering i offentliga och privata organisationer

    Kandidat-uppsats, Högskolan i Borås/Akademin för bibliotek, information, pedagogik och IT

    Författare :Matilda Perlerot; Viktoria Vanjhal; [2023]
    Nyckelord :IAM; identity; access; access management; identity management; information security; IAM; identitet; åtkomst; åtkomsthantering; identitetshantering; informationssäkerhet;

    Sammanfattning : Vem ska ha åtkomst och vem skall ha åtkomst till vad? Identitets- och åtkomsthantering (IAM) hjälper organisationer med att hantera systemanvändare under deras livscykel till systemen inom verksamheten. Det finns flera olika faktorer som är den drivande faktorn till varför de har IAM-lösningar. LÄS MER

  3. 3. The Devil Wears (New) Prada

    Magister-uppsats, Lunds universitet/Företagsekonomiska institutionen

    Författare :Hanna Björkman; Elsa Spenninge; [2023]
    Nyckelord :identity projects; self-presentation; luxury fashion rental; Consumer Culture Theory; access-based consumption; luxury fashion; Impression Management; Social Distinction; the extended self; Business and Economics;

    Sammanfattning : In contemporary society, it is emphasised that ownership of clothing plays a crucial role in construction- and presentation of personal identities. With the rise of sustainable consumerism and the sharing economy, access-based consumption has emerged as a notable trend, offering individuals temporary access to non-exclusively owned clothing. LÄS MER

  4. 4. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Victor Pero; Linus Ekman; [2023]
    Nyckelord :Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Sammanfattning : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. LÄS MER

  5. 5. Transformative Gender Justice : Constructions of Justice, Violence, and Reparations for Survivors of Conflict-Related Sexual Violence in Northeastern Nigeria

    Master-uppsats, Lunds universitet/Institutionen för kulturgeografi och ekonomisk geografi; Lunds universitet/LUMID International Master programme in applied International Development and Management

    Författare :Grayden Mills Tilley Prince; [2023]
    Nyckelord :Transformative Justice; Violence; Reparations; CRSV; Nigeria; GBV; Sexual Violence; Agency; Power; Gender; Social Sciences;

    Sammanfattning : Alongside global acknowledgements of the gendered nature of conflict, the academic field of transitional justice is shifting towards the newly emerging concept of transformative justice. Within this, reparations are particularly seen as the most agent-centric tool for structural transformation. LÄS MER