Essays about: "Information technology Data security Law"

Showing result 6 - 9 of 9 essays containing the words Information technology Data security Law.

  1. 6. Cloud Computing and Sensitive Data : A Case of Beneficial Co-Existence or Mutual Exclusiveness?

    University essay from KTH/Hållbarhet och industriell dynamik

    Author : Daria Vaskovich; [2015]
    Keywords : Cloud computing; public Cloud; private Cloud; delivery models; sensitive data; Personal Data Act; PuL; adaption.; Cloud computing; publikt moln; privat moln; leveranssätt; molntjänster; känslig data; personuppgifter; PuL; tillämpning av molntjänster.;

    Abstract : I dag anses molntjänster vara ett omtalat ämne som har ändrat hur IT-tjänster levereras och som skapat nya affärsmodeller. Några av molntjänsternas mest frekvent nämnda fördelar är flexibilitet och skalbarhet. Molntjänster är i dagsläget extensivt använda av privatpersoner genom tjänster så som Google Drive och Dropbox. READ MORE

  2. 7. Security for Cloud Based Services

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Sabrina Ali Tandra; S.M. Sarwarul Islam Rizvi; [2014]
    Keywords : cloud computing; security; risk; vulnerability; performance; Molntjänster; säkerhet; risk; sårbarhet; utförande;

    Abstract : Cloud computing is a new buzzword in the modern information technology world. Today cloud computing can be considered as a service, similar to the way that electricity is considered a service in urban areas. A cloud user can utilize different computing resources (e.g. READ MORE

  3. 8. Protect Data Privacy in E-Healthcare in Sweden

    University essay from Matematiska och systemtekniska institutionen

    Author : Nan An; [2007]
    Keywords : Data privacy; health care; Sweden;

    Abstract : Sweden healthcare adopted much ICT (information and communication technology). It is a highly information intensive place. READ MORE

  4. 9. Security Architecture and Technologies for the Electronic Document Exchange with SOAP as Communication Protocol

    University essay from Institutionen för systemteknik

    Author : Marcus Dahlén; [2005]
    Keywords : Informationsteknik; SOAP; XML; Web Service; J2EE; security; SSL; MTOM; Risk Assessment; XML Digital Signature; XML Encryption; XKMS; Informationsteknik;

    Abstract : In many industries the tracking and tracing of products within the supply chain is required by law. Companies in the metal working industry exchange so-called material test reports, which specify the product’s properties, the customer’s requirements, and serve as an assurance between the supplier and the customer. READ MORE