Sökning: "Authentication Service"

Visar resultat 1 - 5 av 108 uppsatser innehållade orden Authentication Service.

  1. 1. Tenant Separation on a multi-tenant microservice platform

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Axel Sandqvist; [2023]
    Nyckelord :multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Sammanfattning : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. LÄS MER

  2. 2. Insider Threat For Service Account in Google Cloud Platform

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Ravikiran Talekar; [2023]
    Nyckelord :;

    Sammanfattning : As most software industry is migrating from traditional servers and depending more on Cloud-based services, we are encountering new problems hitherto unknown to us. Due to the variousadvantages offered by Cloud services and the numerous problems whose solutions are providedby Cloud technologies, cloud-based services have become very popular. LÄS MER

  3. 3. Secure log-management for an Apache Kafka-based data-streaming service

    Uppsats för yrkesexamina på grundnivå, Mälardalens universitet/Akademin för innovation, design och teknik

    Författare :Hjalmar Kull; Mirza Hujic; [2023]
    Nyckelord :Apache Kafka;

    Sammanfattning : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. LÄS MER

  4. 4. Hur VPN-tjänster matchar användarens förväntningar och problem kopplat till VPN-lösningar

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Anton Hallbäck; Oskar Stevens; [2023]
    Nyckelord :VPN; users; weaknesses; vulnerabilities; security; risk; VPN; användare; svagheter; sårbarheter; säkerhet; risker;

    Sammanfattning : VPN-teknologin är känd för att skydda användarens personliga integritet och säkerhet online. Genom att etablera en krypterad tunnel mellan användare och VPN-tjänstens server möjliggörs flera funktioner. LÄS MER

  5. 5. Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce

    Magister-uppsats, Lunds universitet/Företagsekonomiska institutionen

    Författare :Katie Fajer; Lisa Alm; Amanda Gerth; [2023]
    Nyckelord :Second-hand luxury e-commerce; Blockchain technology; Authentication; Perceived Risk; Theory of Planned Behaviour; Consumer Behaviour.; Business and Economics;

    Sammanfattning : Title: Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce Date of the Seminar: 2nd of June, 2023 Course: BUSN39: Degree Project in Global Marketing Authors: Lisa Alm, Amanda Gerth & Katie Fajer Supervisor: Burak Tunca Keywords: Second-hand luxury e-commerce, Blockchain technology, Authentication, Perceived Risk, Theory of Planned Behaviour, Consumer Behaviour. Thesis Purpose: To explore consumer perspectives towards the implementation blockchain technology as a service offered within the authentication of second-hand vintage luxury e-commerce Methodology: This quantitative research study utilises an independent sample t-test to compare Perceived Risk, Attitudes, Perceived Behavioural Control, Subjective Norms, and Purchase Intention in regard to authentication method surveyed. LÄS MER