Essays about: "application of information security"
Showing result 16 - 20 of 226 essays containing the words application of information security.
-
16. IoT and smart grid : Communication security
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Electrical grids are a part of the critical infrastructure that society is reliant on for the running of everyday operations. The nature of the electrical grids results in them being located in different locations throughout the country to provide their services. READ MORE
-
17. Privacy preserving data access mechanism for health data
University essay from KTH/Hälsoinformatik och logistikAbstract : Due to the rise of digitalization and the growing amount of data, ensuring the integrity and security of patient data has become increasingly vital within the healthcare industry, which has traditionally managed substantial quantities of sensitive patient and personal information. This bachelor's thesis focused on designing and implementing a secure data sharing infrastructure to protect the integrity and confidentiality of patient data. READ MORE
-
18. Testing the Security of a Kubernetes Cluster in a Production Environment
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Enterprise grade Kubernetes solutions which are offered by large corporations like Microsoft have become very popular in the most recent years. To protect the integrity of customer information, which resides on shared resources in the Kubernetes cloud, adequate security measures need to be in place. READ MORE
-
19. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE
-
20. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE