Sökning: "Trusted Applications"

Visar resultat 1 - 5 av 39 uppsatser innehållade orden Trusted Applications.

  1. 1. An Integrated Room Booking and Access Control System for Public Spaces

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Jaffar Kamil; Mohamed Amer; [2023]
    Nyckelord :Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Sammanfattning : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. LÄS MER

  2. 2. Utbytesstudenters digitala PIM-strategier : En kvalitativ studie bland data- och systemvetare vid Uppsala universitet

    Master-uppsats, Uppsala universitet/Institutionen för ABM

    Författare :Klara Mårtens Rodriguez; [2023]
    Nyckelord :Digital environment; Digital preservation; Personal Information Management PIM ; Personal archives; Information behavior; Information experience; Information retrieval; Datalagring; digital miljö; digitalt bevarande; digital organisering; informationsbeteende; Personal Information Management PIM ; personarkiv; informationsupplevelse;

    Sammanfattning : Introduction. The aim of this master thesis is to examine how students at Uppsala university manage, organize, and preserve their study-related information in a digital environment. LÄS MER

  3. 3. Risk Assessment of Digital Assets – Insurance Applications in Cryptocurrencies and NFTs

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Roberto Delgado Ferrezuelo; [2023]
    Nyckelord :Blockchain; NFTs; private key; phishing; floor price; rarity; cold wallet; hot wallet; risk premium; Technology and Engineering;

    Sammanfattning : The aim of the project is to develop a framework for an insurance policy for digital assets. The project comprised several stages, starting with the identification of risks associated with these assets. Policyholders were then categorized into two groups based on a predefined rating factor. LÄS MER

  4. 4. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gatien Ducornaud; [2023]
    Nyckelord :Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Sammanfattning : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. LÄS MER

  5. 5. Automating Deployments of Trusted Execution Environments

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gidófalvy Gordon Zsolt; [2023]
    Nyckelord :hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automation; configuration management; Ansible; scripting; OS dependency management; automation tooling; system tooling; system administration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration;

    Sammanfattning : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. LÄS MER