Sökning: "Linux server security"

Visar resultat 1 - 5 av 14 uppsatser innehållade orden Linux server security.

  1. 1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    Uppsats för yrkesexamina på grundnivå, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Krister Georges; Per Jahnstedt; [2023]
    Nyckelord :NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Sammanfattning : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. LÄS MER

  2. 2. Enclave Host Interface for Security

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Anmol Sinha; [2022]
    Nyckelord :Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code; Trusted Execution Environment; Enclave; Trusted Applications; SDK; Visual Studio Code;

    Sammanfattning : Secure enclave technology has during the last decade emerged as an important hardware security primitive in server computer cores, and increasingly also in chips intended for consumer devices like mobile phones and PCs. The Linux Confidential Compute Consortium has taken a leading role in defining the host APIs for enclave access (e.g. LÄS MER

  3. 3. Confidential Computing in Public Clouds : Confidential Data Translations in hardware-based TEEs: Intel SGX with Occlum support

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Sri Yulianti; [2021]
    Nyckelord :TEEs; Intel SGX; Library OS; Occlum; Confidential Computing; Confidential Machine Learning; TEEs; Intel SGX; Library OS; Occlum; Konfidentiell databehandling; konfidentiellt maskininlärning;

    Sammanfattning : As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalable, and secure marketplace for collaborative data creation, analysis, and exchange among enterprises. Security is a prominent research challenge in this context, with a specific question on how two mutually distrusting data owners can share their data. LÄS MER

  4. 4. Automatisk kontroll av status för switch-portar

    Kandidat-uppsats, Mälardalens högskola/Akademin för innovation, design och teknik

    Författare :Östergren Dan; [2020]
    Nyckelord :switch; switchport; activity; last; used; SNMP; SSH; MIB; switch; switchport; switch-port; senast; använd; aktivitet; SNMP; SSH; MIB;

    Sammanfattning : I stora nätverksmiljöer kan det idag vara svårt att få en komplett sammanställning av hur många switch-portar som är i bruk. Den lösning som vanligtvis används är manuell inloggning till aktuell switch för kontroll, ett moment med tidsåtgång och som ofta utförs vid enstaka tillfällen. LÄS MER

  5. 5. LATENCY AND THROUGHPUT COMPARISON BETWEEN IPTABLES AND NFTABLES AT DIFFERENT FRAME AND RULE-SET SIZES

    Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologi

    Författare :Tomas Jonsson; [2018]
    Nyckelord :Firewall; Iptables; Nftables; Latency; Throughput; Performance; Brandvägg; Iptables; Nftables; Latens; Genomströmning; Prestanda;

    Sammanfattning : Firewalls are one of the most common security tools used in computer networks. Its purpose is to prevent unwanted traffic from coming in to or out of a computer network. LÄS MER