Essays about: "Secure introduction"
Showing result 1 - 5 of 46 essays containing the words Secure introduction.
-
1. Industry preferred implementation practices for security in cloud systems : An exploratory and qualitative analysis of implementation practices for cloud security
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Since the introduction of cloud computing as a standard solution for data storage and software hosting, new security measures have been developed, and data laws and compliance regulations have become more stringent. In this thesis, the exploration of compliance and regulatory documents, interviews of industry professionals, and thematic analysis of interview data uncover some industry-preferred implementation practices that will help to ensure compliance and cloud security for applications and data storage on the cloud. READ MORE
-
2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE
-
3. Reflections on the economic strategies of private museums. A comparative study of the private museums in Meteora.
University essay from Lunds universitet/Institutionen för tjänstevetenskapAbstract : The thesis examines the economic strategies which two private museums of Meteora, the Hellenic Culture Museum and the Natural History Museum of Meteora and Mushroom Museum implement, so as to grasp the economic strategies that private museums in Greece adopt. Utilizing Varbanova’s (2013) framework which places specific emphasis not only on the open-system theory as an efficient way to comprehend the macro-level challenges (in particular the economic crisis and Covid-19, which had been plaguing the two museums for a long time) and opportunities (as the ones that can result from the implementation of a particular legal status in the context of a given cultural policy), but also on the stakeholder and resource-dependence theories, which acknowledge the pivotal role that various actors and resources inside and outside an organization play in museums’ prosperity, the thesis analyzes previous literature that demonstrates economic strategies that (public and private) museums adopt, so as to secure their continuation and thriving. READ MORE
-
4. Compression's effect on end-to-end latency in file upload systems that utilize encryption
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Encryption is the process of obfuscating data to restrict access to it while allowing it to be returned to its original non-obfuscated form through decryption. This process is increasingly used within web-based systems to secure data. READ MORE
-
5. Attribute-Based Encryption with dynamic attribute feature applied in Vehicular Ad Hoc Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Vehicular Ad Hoc Network (VANET) is a promising approach for future Intelligent Transportation Systems (ITS) implementation. The data transmission is wireless primarily in the VANET system. The secure data transmission in VANET attracts research attention without any doubt. READ MORE