Essays about: "thesis for NETWORK SECURITY"

Showing result 1 - 5 of 269 essays containing the words thesis for NETWORK SECURITY.

  1. 1. Container Orchestration in Security Demanding Environments at the Swedish Police Authority

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christian Abdelmassih; [2018]
    Keywords : Application Isolation; Container Escape; Kubernetes Network Segmentation; Applikationsisolering; Container Escape; Kubernetes Nätverkssegmentering;

    Abstract : The adoption of containers and container orchestration in cloud computing is motivated by many aspects, from technical and organizational to economic gains. In this climate, even security demanding organizations are interested in such technologies but need reassurance that their requirements can be satisfied. READ MORE

  2. 2. Physical Proximity Verification based on Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marco Spanghero; [2018]
    Keywords : ;

    Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE

  3. 3. Energy Efficiency and Power Consumption Improvement of IR Illumination for Surveillance Cameras

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carlos Tormo Lluch; [2018]
    Keywords : rolling shutter; energy efficiency; IR; stroboscopic illumination; rullande slutare; energieffektivitet; IR; stroboskopisk belysning;

    Abstract : The power and energy optimization of a device can lead to a reduced cost, smaller area, better temperature performance, and higher lifetime. Furthermore, in systems that have limited power budget, it allows running simultaneously more functionalities or using features that require higher power demand. READ MORE

  4. 4. The road to food security : evaluating and improving open-access road data in Tanzania with satellite imagery

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Corey Nicholas Ragosnig; [2018]
    Keywords : Physical Geography and Ecosystem Analysis; Human Geography; Remote Sensing; Road Extraction; Food Security; Open-Access Data; Earth and Environmental Sciences;

    Abstract : Metoderna som används för att göra den globala livsmedelsförsörjningen tryggare har bytt fokus från själva produktionen av jordbruksgrödor till att öka människors tillgänglighet till marknader. Analyser visar att det finns ett samband mellan inkomst, avlägsenhet, och hur stor andel av god jordbruksmark faktiskt används för jordbruk. READ MORE

  5. 5. Assessing blockchain technology for Transport Data Logger

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Björn Johansson; [2018]
    Keywords : blockchain; transport data logger; hyperledger; hyperledger fabric; byzantine fault tolerance; bft; supply chain; transport chain; permissioned; permissionless; documental truth; historical truth; immutability; security; log data; Technology and Engineering;

    Abstract : A proof of concept permissioned blockchain system that holds data from the Transport Data Logger, TDL, was developed. Transport chain actors who hand off TDL-equipped goods between one another use the TDL app to upload a digital handoff containing their identities and log data from and signed by the TDL to a Hyperledger Fabric blockchain network. READ MORE