Essays about: "secure application framework"

Showing result 1 - 5 of 32 essays containing the words secure application framework.

  1. 1. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mille af Rolén; Niloofar Rahmani; [2023]
    Keywords : Meta Attack Language; Domain Specific Language; OWASP; Attack Simulations; Cyber Attacks; Threat Modelling; OWASP Juice Shop; Broken Access Control; Meta Attack Language; Domän Specifikt Språk; OWASP; Attack Simuleringar; Cyber Attacker; Hotmodellering; OWASP Juice Shop; Broken Access Control;

    Abstract : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. READ MORE

  2. 2. DATA MINING IN PRACTICE : An application of the CRISP-DM framework in healthcare

    University essay from Umeå universitet/Institutionen för informatik

    Author : Emma Lind; Sofi Glas; [2022]
    Keywords : Data governance; Data mining methodology; The CRISP-DM Framework; Data mining in healthcare;

    Abstract : With extensive data available in today's organizations, it has become increasingly important to secure valuable insights through data. As a result, the management of data to support decision-making processes is receiving increasing attention in organizations' IT strategies. The healthcare sector is no exception. READ MORE

  3. 3. Data-Driven Operator Behavior Visualization : Developing a Prototype for Wheel Loader

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Huahua Tian; [2022]
    Keywords : Data-driven concept design; Data-visualization; User research; Decision-making; Digital twin; Datadriven konceptdesign; Data-visualisering; Användarforskning; Beslutsfattande; Digital twin;

    Abstract : To realize key business capabilities and secure long-term growth, Volvo Construction Equipment (Volvo CE) set out to define a vision for digital transformation. The latest trends in AI-powered smart electronics open up endless opportunities to help Volvo CE's operators use Wheel Loaders – Construction machines to increase productivity. READ MORE

  4. 4. A system of weightlessness – Applying the EU general principle of proportionality to secure fundamental rights protection under contemporary EU investment agreements

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Pontus Andersson; [2022]
    Keywords : international investment law; public international law; EU law; comparative law; fundamental rights; proportionality; CETA; fair and equitable treatment; right to regulate; Law and Political Science;

    Abstract : At the heart of modern investment law it has since long resided a conflict between extensive investment protection norms and public policy interests of host states. After receiving exclusive competence to conclude international investment agreements governing this interrelation, the EU has tried to cater for those latter objectives through the design of these agreements. READ MORE

  5. 5. A framework to unify application security testing in DevOps environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Duc Quang Le; [2021]
    Keywords : Application security testing; software security; security in DevOps DevSec- Ops ; microservice framework; Testning; applikationssäkerhet; programvarusäkerhet; DevOps; mikrotjänst -arkitektur;

    Abstract : In recent years, companies and organizations have increasingly integrated software security testing into the software development life cycle using DevOps practices. The current integration approach introduces multiple challenges in an information technology environment that consists of a large number of software development projects and multiple software security testing tools. READ MORE