Essays about: "MOBILE SYSTEM ARCHITECTURE SECURITY"

Showing result 1 - 5 of 21 essays containing the words MOBILE SYSTEM ARCHITECTURE SECURITY.

  1. 1. Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jiahao Wang; [2022]
    Keywords : Wi-Fi Aware; Secure Service Discovery; Bloom Filter; TESLA; Client Puzzle; Wi-Fi Aware; Säker Serviceupptäckt; Bloom Filter; TESLA; Klient Pussel;

    Abstract : In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. READ MORE

  2. 2. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Crone; [2021]
    Keywords : trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks; trusted execution environment; remote attestation; sel4; microkernel; arm trustzone; intel sgx; side-channels; transient execution attacks;

    Abstract : In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing devices to protect security-critical software from run-time attacks and provide isolation from an untrustworthy operating system (OS). A trusted party verifies the software that runs in a TEE using remote attestation procedures. READ MORE

  3. 3. State-Of-The-Art on eHealth@home System Architectures

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Benjamin Heravi; [2019]
    Keywords : EHealth; Wireless; eHealth security; cloud services;

    Abstract : With growing life expectancy and decreasing of fertility rates, demands of additional healthcare services is increasing day by day. This results in a rising need for additional healthcare services which leads to more medical care costs. Modern technology can play an important role to reduce the healthcare costs. READ MORE

  4. 4. Trusted Execution Environments for Open vSwitch : A security enabler for the 5G mobile network

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Khalid Elbashir; [2017]
    Keywords : Open vSwitch; SDN; Trusted Execution Environment; SGX; Cloud Computing; Open vSwitch; SDN; mjukvarudefinierade nätverk; SGX; molntjänster;

    Abstract : The advent of virtualization introduced the need for virtual switches to interconnect virtual machines deployed in a cloud infrastructure. With Software Defined Networking (SDN), a central controller can configure these virtual switches. Virtual switches execute on commodity operating systems. READ MORE

  5. 5. Evaluating Domain-Driven Architectural Designs and Non-Functional Architectural Attributes for Windows Phone 8 Mobile Applications

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Mozhan Soltani; Retta Shiferaw Siyoum; [2015-03-25]
    Keywords : Windows Phone 8; Domain-Driven Architecture; Model View View-Model Architecture; MVVM;

    Abstract : Most IT companies are interested in investigating new mo- bile technologies as mobile devices are noticeably prevalent these days. In this study, we collaborated with Volvo IT to identify the extent of conformance to domain-driven archi- tectures when developing Windows Phone 8 (WP8) applica- tions, as well as to nd out what non-functional attributes can be applied to these applications. READ MORE