Essays about: "Secure programming"

Showing result 1 - 5 of 26 essays containing the words Secure programming.

  1. 1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  2. 2. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Luca Staboli; [2022]
    Keywords : Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface; Trusted Execution Environment; Cloud Computing; Virtual Machine; Application Programming Interface;

    Abstract : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. READ MORE

  3. 3. Intelligence Orchestration in IoT and Cyber-Physical Systems

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Maheswaran Jayagopan; Ananthu Saseendran; [2022]
    Keywords : IoT; Cyber-physical systems; SSL; protocols; Workflow; Route mapping; MQTT; Lwm2m; HTTP; HTTPS; Intelligence Orchestration; Distributed systems;

    Abstract : The number of IoT and cyber-physical systems will be growing in the comingfuture. According to estimates, more than 21 billion IoT devices are expectedto exist by 2025. The adoption of Digital Twins and AI-enhanced IoTapplications is projected to fuel the expected increase in IoT spending.It is essential to accelerate the development. READ MORE

  4. 4. Securing cloud-hosted IoT Workflows with Intel SGX

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adnan Jamil Ahsan; [2022]
    Keywords : IoT; Node-RED; Azure; SGX; Gramine; Trusted Execution Environment; Security; STRIDE;

    Abstract : The rapid increase in the number of IoT devices and their widespread applications demands secure and scalable solutions for managing and executing IoT workflows. This thesis investigates the security of IoT workflows created in Node-RED, an open-source visual programming tool, and deployed on untrusted hosts managed by a major cloud service provider, Azure. READ MORE

  5. 5. CONSTRUCTING A DECENTRALIZED COMMUNICATION SYSTEM COMPLIANT WITH THE ISO 20022 FINANCIAL INDUSTRY MESSAGE SCHEME

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Emilio Haataja; William Stackenäs; [2021]
    Keywords : communication system; payment system; TLS; HTTPS; ISO 20022; SWIFT; financial institutions; decentralization; kommunikationssystem; betalningssystem; TLS; HTTPS; ISO 20022; SWIFT; finansiella institutioner; decentralisering;

    Abstract : Finansiella institut behöver en säker och tillförlitlig infrastruktur för att utföra transaktioner mellan varandra. I dagsläget finns det en rad olika lösningar för detta, som SWIFT och SEPA. Dessa lösningar har dock problem. READ MORE