Essays about: "Säker åtkomst"
Showing result 1 - 5 of 13 essays containing the words Säker åtkomst.
-
1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE
-
2. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability
University essay from KTH/Hälsoinformatik och logistikAbstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE
-
3. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE
-
4. Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the increasing popularity of Internet of Things (IoT), network connected devices and sensors, to easier collect data is security an aspect that must not be forgotten. When sensitive data, such as personal or private data, is sent over the network without protection can it easier be obtained by anyone who want to get their hands on it. READ MORE
-
5. Continual imitation learning: Enhancing safe data set aggregation with elastic weight consolidation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The field of machine learning currently draws massive attention due to ad- vancements and successful applications announced in the last few years. One of these applications is self-driving vehicles. A machine learning model can learn to drive through behavior cloning. Behavior cloning uses an expert’s behavioral traces as training data. READ MORE