Essays about: "data security mechanism"

Showing result 1 - 5 of 36 essays containing the words data security mechanism.

  1. 1. The Grey Shade of Local Peacebuilding : A Qualitative Study of an Informal Local Peace Committee in the Midst of Violence. Laikipia, Northern Kenya.

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Philip Martinsson; [2018]
    Keywords : Kenya; Laikipia; Peace Formation; Local Peace Committee; Peacebuilding; Peace Infrastructure; Non-State Actors;

    Abstract : Previous research shows that there is a demand of enhancing our understanding about the local actor as a mechanism for peacebuilding, suggesting a need for further investigation about the phenomena amid the growing complexity and decentralization of scenes in conflict. The research in this study draws together empirical data on an informal local peace committee (LPC) conducted in Laikipia, northern Kenya; a county which have experienced a multitude of conflict dynamics recently involving state and non-state actors, to know more about their role as local peacebuilders. READ MORE

  2. 2. New authentication mechanism using certificates for big data analytic tools

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Paul Velthuis; [2017]
    Keywords : Cloud Access Management; certificate on demand; Apache Spark; Apache Flink; Kerberos; transport security layer TLS ; Authentication; Multi Factor Authentication; Authentication for data analytic tools; certificate based Spark authentication; public key encryption; distributed authentication; short valid authentication;

    Abstract : Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. READ MORE

  3. 3. End-to-end Security Enhancement of an IoT Platform Using Object Security

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Tjäder; [2017]
    Keywords : Object security; COSE; IoT security; End-to-end security; CoAP; LWM2M; Bluetooth Low Energy; BLE security;

    Abstract : The Internet of Things (IoT) is seen as one of the next Internet revolutions. In a near future the majority of all connected devices to the Internet will be IoT devices. These devices will connect previously offline constrained systems, thus it is essential to ensure end-to-end security for such devices. READ MORE

  4. 4. The Implementation of the Frequency-Time Encoded Decoy-State Protocol with the Slow-Light Effect for Quantum Memories

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Atomfysik

    Author : Koray Dinçer; [2017]
    Keywords : QKD; Decoy-State; Frequency-Time; Slow-light; Quantum Repeater; Quantum Memory; Physics and Astronomy;

    Abstract : Quantum key distribution (QKD) is a secure encryption key generation process to be used by two users in the presence of an eavesdropper. The no-cloning theorem allows the sender "Alice" to securely send qubits with single photons to the receiver "Bob". READ MORE

  5. 5. Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Arun Tej Seethamraju; [2017]
    Keywords : Attribute Based Encryption; Electronic Health Records; Cloud Computing; Privacy;

    Abstract : Cloud Computing today, is an evolving technology which features large Data Storage and ready-to-access from any device. The Healthcare Industry stores large Databases of patient’s records, considering the advantages of Cloud Computing it is looking forward to moving on from the traditional, proprietary Database Management Model into an Open Source Cloud DBMS Model. READ MORE