Essays about: "Dataintegritet"

Showing result 16 - 20 of 20 essays containing the word Dataintegritet.

  1. 16. The User Experience Perspective of Internet of Things Development

    University essay from Lunds universitet/Ergonomi och aerosolteknologi

    Author : Johanna Bergman; Isabelle Johansson; [2017]
    Keywords : User Experience; Internet of Things; data-driven; development process; Technology and Engineering;

    Abstract : In current research of Internet of Things (IoT), there is limited research on the user perspective and even less on how companies operating in the field consider User Experience (UX) when developing for IoT. The aim of this thesis is to investigate how UX is considered during the development process of IoT. READ MORE

  2. 17. Mobile traffic dataset comparisons throughcluster analysis of radio network event sequences

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : BJÖRN LÖFROTH; [2014]
    Keywords : ;

    Abstract : Ericsson regularly collects traffic datasets from different radio networks around the world. These data sets can be used for several research purposes, ranging from general statistics to more specific studies such as system troubleshooting and buffer-level analysis. READ MORE

  3. 18. Security in Smart Object Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mohit Sethi; [2012]
    Keywords : IoT; smart objects; security; CoAP; asymmetric cryptography; integrity; authenticity; mirroring mechanism; IoT; smarta objekt; säkerhet; CoAP; asymmetrisk kryptografi; integritet; autenticitet; återspeglingsmekanism;

    Abstract : Internet of Things (IoT) refers to an inter-connected world where physical devices are seamlessly integrated into the Internet and become active participants of business, information and social processes. This involves the inter-connection of a large number of heterogeneous networked entities and networks. READ MORE

  4. 19. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers

    University essay from KTH/Kommunikationssystem, CoS

    Author : Mussie Tesfaye; [2012]
    Keywords : SCADA; PLC; SCADA security; SCADA networks; PLC security; Trusted computing; TCM; TPM; Embedded security; Digital security; SCADA; PLC; SCADA säkerhet; SCADA-nätverk; PLC säkerhet; pålitlig datoranvändning; TCM; TPM; inbäddad säkerhetlösningar; datasäkerhet;

    Abstract : This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. READ MORE

  5. 20. Jämförelse av standarder för interaktivitet mellan distribuerade objekt

    University essay from Institutionen för datavetenskap

    Author : Peter Kjellgren; [1998]
    Keywords : ;

    Abstract : Mycket tyder på att utveckling av framtida informationssystem i huvudsak kommer att utgöras av montering av mjukvarukomponenter. Med mjukvarukomponenter avses suveräna objekt som utför en viss operation på inmatad data och/eller erbjuder operationer som manipulerar lagrad data. READ MORE