Aineistot 1-10 / 37
OpenID Connect Provider Certification
The thesis looks into authentication and authorization theory and reviews some protocols used for identity management. The most important protocols in the thesis are OAuth 2.0 and OpenID Connect. The method of research ...
Supplier’s guide for communication in software projects
In the modern age of digitalization an increasing number of companies is stepping into the world of software development. This also means companies of various technical skills levels. To create successful software systems, ...
Tool for journalists to edit the text generation logic of an automated journalist
Automated journalism means writing fact-based articles based on structured data using algorithms or software. The advantages of automated journalism are scalability, speed and lower costs. The limitations of it are fluency, ...
Developing Best Practices for Securing VoIP Communication for a non-profit Organization
Voice over Internet Protocol (VoIP) is the most widely used service around the world. The proficiency of it utilizing the web has increased awesome ubiquity in the current years. With this notoriety, there is expanding ...
Interaktiivisen tarinankerronnan hyöty lisätyn todellisuuden oppaissa
Tutkimus käsittelee pilottisovelluskokeilua interaktiivisen tarinankerronnan hyödyistä todellisuus oppaissa. Tutkimuksessa käydään lisätyn todellisuuden teoriaa ja miten se eroaa virtuaalitodellisuudesta. Lisätty ...
Access Control Process for a SaaS Provider
Access control is a process of limiting access to systems and services. It is a way by which the users are granted access and privileges to information and resources of an organization. The process involves controlling, ...
Applying Augmented Reality to Outdoors Industrial Use
(Turun yliopisto, 2016-05-30)
Augmented Reality (AR) is currently gaining popularity in multiple different fields. However, the technology for AR still requires development in both hardware and software when considering industrial use. In order to ...
Success of IT Outsourcing from Viewpoit of Information Resource Management - Case Aker Yards, Finland
(Turun yliopisto, 2008-06-27)
Project Management Tools in Agile Embedded Systems Development
(Turun yliopisto, 2014-06-18)
Agile methods have become increasingly popular in the field of software engineering. While agile methods are now generally considered applicable to software projects of many different kinds, they have not been widely adopted ...
Experimental Penetration Testing Teaching and Learning for High School Students Using Cloud Computing
The need for high school students trained in ICT to developing cybersecurity skills implies the understanding of threats on security. Considering that the aim of hacking is to circumvent restrictions, the goal of this ...