Avancerad sökning

Visar resultat 1 - 5 av 23 uppsatser som matchar ovanstående sökkriterier.

  1. 1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ossian Dillner; [2023]
    Nyckelord :Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Sammanfattning : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. LÄS MER

  2. 2. Sociala robotar inom vården: tekniska förutsättningar, fördelar, utmaningar och etiska överväganden

    Kandidat-uppsats, Malmö universitet/Institutionen för datavetenskap och medieteknik (DVMT)

    Författare :Mohanad Oweidat; Qassem Aburas; [2023]
    Nyckelord :Sociala robotar; Vården; Fördelar; Utmaningar; Etiska överväganden; Paro; Pepper;

    Sammanfattning : Denna studie undersöker fördelarna, utmaningarna och etiska konsekvenserna av att använda sociala robotar i vården, som uppfattas av vårdpersonal och allmänheten. Syftet är att utvärdera acceptansen och integrationen av sociala robotar genom att ta itu med båda intressenternas problem och krav. LÄS MER

  3. 3. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Nyckelord :Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Sammanfattning : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. LÄS MER

  4. 4. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :John Augustsson; Johan Carlsson; [2021]
    Nyckelord :GraphQL; Threat modeling; Open-Source Software; Ethical hacking; DevOps; GraphQL; Hotmodellering; Öppen källkod; Etisk hackning; DevOps;

    Sammanfattning : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. LÄS MER

  5. 5. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Michael Henriksson; [2020]
    Nyckelord :Sensor network; Key distribution center; Zigbee; CHAP; Device authentication; Sensornätverk; Key distribution center; Zigbee; CHAP; Autentisering;

    Sammanfattning : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. LÄS MER