_version_ 1800740342929031168
annif_keywords_txtF_mv authentication Internet of things evaluation authenticity environment
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p24130 http://www.yso.fi/onto/yso/p27206 http://www.yso.fi/onto/yso/p7413 http://www.yso.fi/onto/yso/p11872 http://www.yso.fi/onto/yso/p6033
author Poikolainen, Janne
author2 Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601
author_facet Poikolainen, Janne Faculty of Information Technology Informaatioteknologian tiedekunta Tietojenkäsittelytieteiden laitos Department of Computer Science and Information Systems University of Jyväskylä Jyväskylän yliopisto Information Systems Science Tietojärjestelmätiede 601 Poikolainen, Janne
author_sort Poikolainen, Janne
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
department_txtF Informaatioteknologia
faculty_txtF Informaatioteknologian tiedekunta
first_indexed 2023-03-22T10:01:14Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Authorized authentication evaluation framework for constrained environments</title><creator>Poikolainen, Janne</creator><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="laitos" lang="fi">Tietojenk&#xE4;sittelytieteiden laitos</contributor><contributor type="laitos" lang="en">Department of Computer Science and Information Systems</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="oppiaine" lang="en">Information Systems Science</contributor><contributor type="oppiaine" lang="fi">Tietoj&#xE4;rjestelm&#xE4;tiede</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">rajoitetut ymp&#xE4;rist&#xF6;t</subject><subject type="other">Access control</subject><subject type="other">Internet of Things</subject><subject type="other">Constrained Environments</subject><subject type="other">Authorized Authentication</subject><subject type="yso">esineiden internet</subject><subject type="yso">todentaminen</subject><available>2016-08-08T11:53:41Z</available><issued>2016</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="other">oai:jykdok.linneanet.fi:1566965</identifier><identifier type="uri">https://jyx.jyu.fi/handle/123456789/50914</identifier><identifier type="urn">URN:NBN:fi:jyu-201608083731</identifier><language type="iso">eng</language><rights lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><rights lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="accesslevel" lang="fi">openAccess</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-201608083731</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/50914/1/URN%3aNBN%3afi%3ajyu-201608083731.pdf" name="URN:NBN:fi:jyu-201608083731.pdf" type="application/pdf" length="947827" sequence="1"/><recordID>123456789_50914</recordID></qualifieddc>
id jyx.123456789_50914
language eng
last_indexed 2024-05-24T20:00:41Z
main_date 2016-01-01T00:00:00Z
main_date_str 2016
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/50914\/1\/URN%3aNBN%3afi%3ajyu-201608083731.pdf","text":"URN:NBN:fi:jyu-201608083731.pdf","source":"jyx","mediaType":"application\/pdf"}
oppiainekoodi_txtF 601
publication_first_indexed 2016-03-22T10:01:14Z
publishDate 2016
record_format qdc
source_str_mv jyx
spellingShingle Poikolainen, Janne Authorized authentication evaluation framework for constrained environments rajoitetut ympäristöt Access control Internet of Things Constrained Environments Authorized Authentication esineiden internet todentaminen
subject_txtF Kognitiotiede
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_50914&index=0&size=large
title Authorized authentication evaluation framework for constrained environments
title_full Authorized authentication evaluation framework for constrained environments
title_fullStr Authorized authentication evaluation framework for constrained environments Authorized authentication evaluation framework for constrained environments
title_full_unstemmed Authorized authentication evaluation framework for constrained environments Authorized authentication evaluation framework for constrained environments
title_short Authorized authentication evaluation framework for constrained environments
title_sort authorized authentication evaluation framework for constrained environments
title_txtP Authorized authentication evaluation framework for constrained environments
topic rajoitetut ympäristöt Access control Internet of Things Constrained Environments Authorized Authentication esineiden internet todentaminen
topic_facet Access control Authorized Authentication Constrained Environments Internet of Things esineiden internet rajoitetut ympäristöt todentaminen
url https://jyx.jyu.fi/handle/123456789/50914 http://www.urn.fi/URN:NBN:fi:jyu-201608083731
work_keys_str_mv AT poikolainenjanne authorizedauthenticationevaluationframeworkforconstrainedenvironments