Essays about: "confidentiality"
Showing result 21 - 25 of 242 essays containing the word confidentiality.
-
21. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE
-
22. The importance of databases during pandemics: A study of GISAID during the COVID-19 pandemic
University essay from KTH/DatavetenskapAbstract : The GISAID database has swiftly become the world’s largest genome sequence database. As of May 2022, there is currently over 10 million genome sequence submissions to GISAID compared to 25 thousand in early 2020. This paper has the scientific goal in examining how integral the GISAID database has been in the COVID-19 response. READ MORE
-
23. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE
-
24. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE
-
25. Drone Use Within Critical Infrastructure - A Security Perspective
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The use of drones is increasing not just for private use, but also for companieswithin different sectors including critical infrastructures, such as the energysector. This due to the many benefits that drones can bring in terms of loweredcosts, increased safety for people, better accessibility, and more, whenconducting varies activities such as inspections and looking for errors. READ MORE