Advanced search

Showing result 1 - 5 of 74 essays matching the above criteria.

  1. 1. Secure IPC To Enable Highly Sensitive Communication In A Smartphone Environment With A BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  2. 2. Automated Cross-Border Mutual Legal Assistance in Digital Forensics (AUTOMLA) : A global realized Enterprise Architecture

    University essay from Högskolan i Halmstad

    Author : Jonas Henriksson; [2021]
    Keywords : Digital Forensic; Mutual Legal Assistance; Enterprise Architecture; System of Systems; Incident Command System; Fusion Center; Semantic Network; GraphQL; React; Cloud; Graph Database; Apollo; REST; Security;

    Abstract : Organized cybercrime has no borders in cyberspace. This paper suggests a state-of-the-art architected solution for a global Automated cross-border mutual legal assistance system within Digital Forensic (AUTOMLA). The Enterprise framework with technical viewpoint enables international collaboration between sovereign countries Fusion Centers. READ MORE

  3. 3. Business Model Generation for a Start Up Enterprise Within the Transport Infrastructure Industry

    University essay from Lunds universitet/Innovationsteknik

    Author : Sara Lundberg; [2021]
    Keywords : Keywords: Transport infrastructure; Business model innovation; Start-up enterprise; Business model canvas; Business model generation; Technology and Engineering;

    Abstract : Transports, and transport infrastructures enable and deliver vital societal functions in today’s society. At the same time, as sustainability becomes more and more important these sectors fail to enable the rate of change that international and national policies calls for. READ MORE

  4. 4. Secure IPC to Enable Highly Sensitive Communication in a Smartphone Environment with a BYOD Setup

    University essay from Linköpings universitet/Informationskodning

    Author : Daniel Holmberg; [2021]
    Keywords : ;

    Abstract : The constantly increasing amount of shared data worldwide demands a continuously improved understanding of current smartphone security vulnerabilities and limitations to ensure secure communication. Securing sensitive enterprise data on a Bring Your Own Device (BYOD) setup can be quite challenging. READ MORE

  5. 5. Safe Configurable Multitenant SaaS

    University essay from Linköpings universitet/Programvara och system

    Author : Adam Leijonhufvud; Filip Håkansson; [2020]
    Keywords : multitenant; SaaS; compiling; code;

    Abstract : Cloud computing is a significant step forward in computer science. It enables customers to use applications on devices such as telephones, tablets, and computers over the internet. However, in the case of some applications, moving to the cloud can be challenging. Enterprise Resource Planning (ERP) is one example of such an application. READ MORE