Sökning: "Trusted Applications"
Visar resultat 1 - 5 av 39 uppsatser innehållade orden Trusted Applications.
1. An Integrated Room Booking and Access Control System for Public Spaces
Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. LÄS MER
2. Utbytesstudenters digitala PIM-strategier : En kvalitativ studie bland data- och systemvetare vid Uppsala universitet
Master-uppsats, Uppsala universitet/Institutionen för ABMSammanfattning : Introduction. The aim of this master thesis is to examine how students at Uppsala university manage, organize, and preserve their study-related information in a digital environment. LÄS MER
3. Risk Assessment of Digital Assets – Insurance Applications in Cryptocurrencies and NFTs
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : The aim of the project is to develop a framework for an insurance policy for digital assets. The project comprised several stages, starting with the identification of risks associated with these assets. Policyholders were then categorized into two groups based on a predefined rating factor. LÄS MER
4. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. LÄS MER
5. Automating Deployments of Trusted Execution Environments
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. LÄS MER