Essays about: "Säker åtkomst"

Showing result 1 - 5 of 13 essays containing the words Säker åtkomst.

  1. 1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  2. 2. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  3. 3. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : John Augustsson; Johan Carlsson; [2021]
    Keywords : GraphQL; Threat modeling; Open-Source Software; Ethical hacking; DevOps; GraphQL; Hotmodellering; Öppen källkod; Etisk hackning; DevOps;

    Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE

  4. 4. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Michael Henriksson; [2020]
    Keywords : Sensor network; Key distribution center; Zigbee; CHAP; Device authentication; Sensornätverk; Key distribution center; Zigbee; CHAP; Autentisering;

    Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE

  5. 5. Continual imitation learning: Enhancing safe data set aggregation with elastic weight consolidation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreas Elers; [2019]
    Keywords : Elasticweight consolidation; SafeDAGGER; DAGGER; Rehearsal buffer; Self-driving vehicle; Continual learning; Elastisk viktkonsolidering; SafeDAGGER; DAGGER; Repeteringsbuffert; Självkörande fordon; Stegvis inlärning;

    Abstract : The field of machine learning currently draws massive attention due to ad- vancements and successful applications announced in the last few years. One of these applications is self-driving vehicles. A machine learning model can learn to drive through behavior cloning. Behavior cloning uses an expert’s behavioral traces as training data. READ MORE