Sökning: "Säker åtkomst"
Visar resultat 1 - 5 av 23 uppsatser innehållade orden Säker åtkomst.
1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. LÄS MER
2. Sociala robotar inom vården: tekniska förutsättningar, fördelar, utmaningar och etiska överväganden
Kandidat-uppsats, Malmö universitet/Institutionen för datavetenskap och medieteknik (DVMT)Sammanfattning : Denna studie undersöker fördelarna, utmaningarna och etiska konsekvenserna av att använda sociala robotar i vården, som uppfattas av vårdpersonal och allmänheten. Syftet är att utvärdera acceptansen och integrationen av sociala robotar genom att ta itu med båda intressenternas problem och krav. LÄS MER
3. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability
M1-uppsats, KTH/Hälsoinformatik och logistikSammanfattning : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. LÄS MER
4. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. LÄS MER
5. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. LÄS MER