Essays about: "extensible"

Showing result 1 - 5 of 100 essays containing the word extensible.

  1. 1. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  2. 2. Sortase A coupling of the recombinant partial silk proteins 4Rep-Srt and G-/G5-CT to understand the structure of silk fiber

    University essay from KTH/Proteinvetenskap

    Author : Ellen Adlerz; [2023]
    Keywords : 4RepCT; 4Rep-Srt; G- G5-CT; Sortase A coupling; recombinant silk protein; 4RepCT; 4Rep-Srt; G- G5-CT; Sortase A-koppling; rekombinant silkesprotein;

    Abstract : Spindelsilke är ett intressant material på grund av dess biokompatibilitet och därav användning som biomaterial. Det är jämförbart med konstgjorda material när det gäller styrka och elasticitet, och i kombination med biokompatibiliteten, är spindelsilke eftertraktat inom det medicinska området. READ MORE

  3. 3. Balancing Interoperability and Data Sensitivity: A Design Science approach to building a zero-knowledge API for Healthcare Data

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Suranga Ruwan Sampath Gunawardana; [2023]
    Keywords : Design Science Research Methodology DSRM ; Application Programming Interfaces API ; Interoperability; Platform; Health care Context;

    Abstract : The aim of the study was to develop a platform to monitor and evaluate care homes using heterogeneous data sources for a French startup company. The study found that there was no current system to supervise healthcare resources in these facilities with live data. READ MORE

  4. 4. Adopting Observability-Driven Development for Cloud-Native Applications : Designing End-to-end Observability Pipeline using Open-source Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chujie Ni; [2023]
    Keywords : Observability-driven Development; End-to-end observability; Open-source pipeline; OpenTelemetry; Kubernetes; Observerbarhetsdriven utveckling; observerbarhet från slut till slut; pipeline med öppen källkod; OpenTelemetry; Kubernetes;

    Abstract : As cloud-native applications become more distributed, complex, and unpredictable with the adoption of microservices and other new architectural components, traditional monitoring solutions are inadequate in providing end-to-end visibility and proactively identifying deviations from expected behaviour before they become disruptive to services. In response to these challenges, observability-driven development (ODD) is proposed as a new methodology that leverages tools and practices to observe the state and detect the behaviour of systems. READ MORE

  5. 5. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE