Aineistot 1-10 / 64
OpenID Connect Provider Certification
The thesis looks into authentication and authorization theory and reviews some protocols used for identity management. The most important protocols in the thesis are OAuth 2.0 and OpenID Connect. The method of research ...
Design of the phonocardiography appliance for coronary artery disease diagnosing and monitoring : business perspectives analysis of innovative medical technologies for cardiovascular diseases in Finland
The topic of this study is the application of modern medical technology to cardiovascular conditions. The main purpose of that research is to evaluate myocardium disorders from the versatile perspectives and propose the ...
Supplier’s guide for communication in software projects
In the modern age of digitalization an increasing number of companies is stepping into the world of software development. This also means companies of various technical skills levels. To create successful software systems, ...
Tool for journalists to edit the text generation logic of an automated journalist
Automated journalism means writing fact-based articles based on structured data using algorithms or software. The advantages of automated journalism are scalability, speed and lower costs. The limitations of it are fluency, ...
Developing Best Practices for Securing VoIP Communication for a non-profit Organization
Voice over Internet Protocol (VoIP) is the most widely used service around the world. The proficiency of it utilizing the web has increased awesome ubiquity in the current years. With this notoriety, there is expanding ...
Interaktiivisen tarinankerronnan hyöty lisätyn todellisuuden oppaissa
Tutkimus käsittelee pilottisovelluskokeilua interaktiivisen tarinankerronnan hyödyistä todellisuus oppaissa. Tutkimuksessa käydään lisätyn todellisuuden teoriaa ja miten se eroaa virtuaalitodellisuudesta. Lisätty ...
Access Control Process for a SaaS Provider
Access control is a process of limiting access to systems and services. It is a way by which the users are granted access and privileges to information and resources of an organization. The process involves controlling, ...
Implementation of a Secure Multiparty Computation Protocol
(Turun yliopisto, 2018-01-29)
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private inputs such that, they learn only the output of the function, and the correctness of the output is guaranteed even when ...
Applying Augmented Reality to Outdoors Industrial Use
(Turun yliopisto, 2016-05-30)
Augmented Reality (AR) is currently gaining popularity in multiple different fields. However, the technology for AR still requires development in both hardware and software when considering industrial use. In order to ...
Success of IT Outsourcing from Viewpoit of Information Resource Management - Case Aker Yards, Finland
(Turun yliopisto, 2008-06-27)