Organisation
Pumacy
Technologies AG
Comments
These are based on the JWT technology and are implemented by using the Spring
Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.
Data-driven FMECA Mechanisms
Result title
Data-driven FMECA
Mechanisms
Information Processing for Generating Recommendations Ahead of Time in an IoT-Based Environment
Result description
engines listed on this page.Authors: Alexandros Bousdekis, Nikos Papageorgiou, Babis Magoutas, Dimitris Apostolou, Gregoris MentzasJournal title: International Journal of Monitoring and Surveillance
Technologies
Information and communication technologies
Taxon title
Information and communication
technologies
AAA - Access, Authorisation and Authentication
Taxon description
As a result different access
mechanisms needs to be considered, depending on the risk and intended
security levels and controls.
Comments
These are based on the JWT technology and are implemented by using the Spring
Security framework. Currently, JWT is used to ensure a secure log-in; as components are iteratively integrated.