Sökning: "Access-control"

Visar resultat 1 - 5 av 194 uppsatser innehållade ordet Access-control.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Nithya Sree Muddychetty; [2024]
    Nyckelord :Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Sammanfattning : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. LÄS MER

  2. 2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Victor Pero; Linus Ekman; [2023]
    Nyckelord :Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Sammanfattning : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. LÄS MER

  3. 3. An Integrated Room Booking and Access Control System for Public Spaces

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Jaffar Kamil; Mohamed Amer; [2023]
    Nyckelord :Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Sammanfattning : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. LÄS MER

  4. 4. Profile Based Access Control Model Using JSON Web Tokens

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Mustafa Albayati; Aslan Murjan; [2023]
    Nyckelord :access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Sammanfattning : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. LÄS MER

  5. 5. Residents’ perception of safety in a vulnerable neighborhood : A case study from Andersberg, Gävle, Sweden

    Kandidat-uppsats, Högskolan i Gävle/Samhällsbyggnad

    Författare :Afnan Askar; Ayysha Badra; [2023]
    Nyckelord :Perceived safety; physical environment; Andersberg; million housing program; CPTED principles; safety walk; Upplevd trygghet; fysisk miljö; Andersberg; miljonprogram; CPTED-principer; trygghetsvandring;

    Sammanfattning : Feeling safe is important for residents in their neighborhoods, but how do residents living in an area rumored to be unsafe perceive safety? This case study examined the perceived safety in a vulnerable area (Swedish: Utsatt område) in Gävle, Sweden. These vulnerable neighborhoods fall under the Swedish million housing program that consist of residential areas with large and high resident buildings that are often densified. LÄS MER