Advanced search

Showing result 1 - 5 of 6 essays matching the above criteria.

  1. 1. Secure Domain Transition of Calvin Actors

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Jose Maria Roldan Gil; [2016]
    Keywords : internet of things; distributed computing; calvin; domain; crossing; actor; Technology and Engineering;

    Abstract : Calvin, an Ericsson application framework for Internet of Things (IoT), simplifies the development and deployment of applications for IoT systems where many heterogeneous devices are deployed and connected through the Internet. The application engineer just needs to design and codify the application applying Calvin syntax. READ MORE

  2. 2. Emulation of TPM on Raspberry Pi

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Erik Nilsson; Marcus Sundberg; [2015]
    Keywords : TPM; Trusted Computing; Raspberry Pi; Technology and Engineering;

    Abstract : The Trusted Platform Module (TPM) is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into the non-volatile memory of the module. TPM is specified by the Trusted Computing Group (TCG). TCG is an initiative started in 2003 by several multinational semiconductor and IT-companies. READ MORE

  3. 3. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers

    University essay from KTH/Kommunikationssystem, CoS

    Author : Mussie Tesfaye; [2012]
    Keywords : SCADA; PLC; SCADA security; SCADA networks; PLC security; Trusted computing; TCM; TPM; Embedded security; Digital security; SCADA; PLC; SCADA säkerhet; SCADA-nätverk; PLC säkerhet; pålitlig datoranvändning; TCM; TPM; inbäddad säkerhetlösningar; datasäkerhet;

    Abstract : This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. READ MORE

  4. 4. Trusted terminal-based systems

    University essay from Institutionen för systemteknik

    Author : Elias Faxö; [2011]
    Keywords : TPM; Trusted systems; Software attestation; Security; TCB;

    Abstract : Trust is a concept of increasing importance in today’s information systems where information storage and generation to a higher extent is distributed among several entities throughout local or global networks. This trend in information science requires new ways to sustain the information security in the systems. READ MORE

  5. 5. Comparative Study of Network Access Control Technologies

    University essay from Institutionen för datavetenskap

    Author : Hasham Ud Din Qazi; [2007]
    Keywords : NAC; Network Access Control; Trusted Platform Module; Trusted Computing Group; Trusted Network Connect; Network Access Protection; Network Admission Control; 802.1X; root of trust;

    Abstract : This thesis presents a comparative study of four Network Access Control (NAC) technologies; Trusted Network Connect by the Trusted Computing group, Juniper Networks, Inc.’s Unified Access Control, Microsoft Corp.’s Network Access Protection, and Cisco Systems Inc.’s Network Admission Control. READ MORE