Essays about: "Flow Security"

Showing result 1 - 5 of 128 essays containing the words Flow Security.

  1. 1. ISMS and privacy challenges related to PeHS : A Qualitative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Emelie Mannebäck; [2022]
    Keywords : ISMS; privacy; Personal eHealth Services; PeHS;

    Abstract : The future of healthcare is increasingly digital, which includes a shift towards more personalised services that allow for more patient-centred and transparent patient care. These services are defined as PeHS and although there are great potential benefits of these services, there are also challenges regarding infor[1]mation security and privacy related to providing this type of services. READ MORE

  2. 2. Place, Placelessness, and Sustainable Entrepreneurship

    University essay from Linnéuniversitetet/Institutionen för organisation och entreprenörskap (OE)

    Author : Sirine Karray; Svenja Voß; [2022]
    Keywords : Sustainable entrepreneurship; Sustainable entrepreneur; Place Context; Placelessness; Impact; Embeddedness;

    Abstract : Like every human, the sustainable entrepreneur is impacted by all the places they have inhabited, but even more so since their triple-bottom-line approach leads to a manifestation of their efforts in places. Opposing this concept of place, scholars describe the concept of placelessness as a manifestation of a lack of meaning or lack of physical location. READ MORE

  3. 3. Secure Application Development

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alaa Alwan; [2022]
    Keywords : secure development; application security; static application security testing; SAST;

    Abstract : Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. READ MORE

  4. 4. An Initial Investigation of Neural Decompilation for WebAssembly

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adam Benali; [2022]
    Keywords : Decompilation; WebAssembly; Reverse Engineering; Neural Machine Translation; Décompilation; WebAssembly; Rétro-Ingénierie; Traduction Automatique Neuronale; Dekompilering; WebAssembly; Reverse Engineering; Neural Maskinöversättning;

    Abstract : WebAssembly is a new standard of the World Wide Web that is used as a compilation target and which is meant to enable high-performance applications. As it becomes more popular, the need for corresponding decompilers increases, for security reasons for instance. READ MORE

  5. 5. Automotive Service-Oriented Architectures: a Systematic Mapping Study

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Nemanja Kukulicic; Damjan Samardzic; [2022]
    Keywords : Software architecture; Service-oriented; Automotive software;

    Abstract : Service-oriented architecture is a possible solution to the increasing complexity of automotive software systems. We conduct a systematic mapping study investigating the use of service-oriented architecture in automotive software. READ MORE