Essays about: "Säker uppdatering"

Found 3 essays containing the words Säker uppdatering.

  1. 1. Efficient Privacy Preserving Key Management for Public Cloud Networks

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Anitha Kathirvel; Siddharth Madan; [2014]
    Keywords : Cloud storage; Secure Storage; Key Management scheme; access level security; Cloud Storage; säker förvaring; nyckelhantering schema; åtkomstnivå säkerhet;

    Abstract : Most applications and documents are stored in a public cloud for storage and management purposes in a cloud computing environment. The major advantages of storing applications and documents in public cloud are lower cost through use of shared computing resources and no upfront infrastructure costs. READ MORE

  2. 2. Performance evaluation of security mechanisms in Cloud Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Anand Kannan; [2012]
    Keywords : Cloud Networks; Key management; mobile agent; telco cloud; open flow; Intrusion Detection System IDS ; Genetic Algorithm GA ; Fuzzy Support Vector Machine FSVM ; tenfold cross validation;

    Abstract : Infrastructure as a Service (IaaS) is a cloud service provisioning model which largely focuses on data centre provisioning of computing and storage facilities. The networking aspects of IaaS beyond the data centre are a limiting factor preventing communication services that are sensitive to network characteristics from adopting this approach. READ MORE

  3. 3. Security Enhanced Firmware Update Procedures in Embedded Systems

    University essay from Institutionen för datavetenskap

    Author : David Abrahamsson; [2008]
    Keywords : Secure firmware update; threat analysis; embedded security; embedded systems; Säker uppdatering; hotanalys; säkerhet; inbyggda system; firmware; mjukvara;

    Abstract : Many embedded systems are complex, and it is often required that the firmware in these systems are updatable by the end-user. For economical and confidentiality reasons, it is important that these systems only accept firmware approved by the firmware producer. READ MORE