Essays about: "Trusted Applications"

Showing result 1 - 5 of 38 essays containing the words Trusted Applications.

  1. 1. An Integrated Room Booking and Access Control System for Public Spaces

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jaffar Kamil; Mohamed Amer; [2023]
    Keywords : Integrated Systems; Room Booking System; Access Control System; Bank ID; Mobile Applications;

    Abstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE

  2. 2. Risk Assessment of Digital Assets – Insurance Applications in Cryptocurrencies and NFTs

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Roberto Delgado Ferrezuelo; [2023]
    Keywords : Blockchain; NFTs; private key; phishing; floor price; rarity; cold wallet; hot wallet; risk premium; Technology and Engineering;

    Abstract : The aim of the project is to develop a framework for an insurance policy for digital assets. The project comprised several stages, starting with the identification of risks associated with these assets. Policyholders were then categorized into two groups based on a predefined rating factor. READ MORE

  3. 3. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gatien Ducornaud; [2023]
    Keywords : Role Based Access Control RBAC ; Cybersecurity; Smart Grid; Substation; Desktop Applications; Contrôle d’accès basé sur les rôles RBAC ; Cybersécurité; Réseau électrique intelligent; Sous-Station; Application Desktop; Rollbaserad åtkomstkontroll RBAC ; Cybersäkerhet; Smarta nät; Transformatorstation; datorapplikation;

    Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE

  4. 4. Automating Deployments of Trusted Execution Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gidófalvy Gordon Zsolt; [2023]
    Keywords : hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automation; configuration management; Ansible; scripting; OS dependency management; automation tooling; system tooling; system administration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration;

    Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE

  5. 5. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE