Essays about: "data security mechanism"

Showing result 1 - 5 of 39 essays containing the words data security mechanism.

  1. 1. State-Of-The-Art on [email protected] System Architectures

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Benjamin Heravi; [2019]
    Keywords : EHealth; Wireless; eHealth security; cloud services;

    Abstract : With growing life expectancy and decreasing of fertility rates, demands of additional healthcare services is increasing day by day. This results in a rising need for additional healthcare services which leads to more medical care costs. Modern technology can play an important role to reduce the healthcare costs. READ MORE

  2. 2. Why do some civilian lives matter more than others? Exploring how the quality, timeliness and consistency of data on civilian harm affects the conduct of hostilities for civilians caught in conflict.

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Amra Lee; [2019]
    Keywords : civilian harm; civilian casualties; missingness; protection of civilians; conduct of hostilities; armed conflict; Afghanistan; Iraq; Syria; Yemen; Middle East; Asia;

    Abstract : Normatively, protecting civilians from the conduct of hostilities is grounded in the Geneva Conventions and the UN Security Council protection of civilian agenda, both of which celebrate their 70 and 20 year anniversaries in 2019. Previous research focusses heavily on protection of civilians through peacekeeping whereas this research focuses on ‘non-armed’ approaches to enhancing civilian protection in conflict. READ MORE

  3. 3. The Grey Shade of Local Peacebuilding : A Qualitative Study of an Informal Local Peace Committee in the Midst of Violence. Laikipia, Northern Kenya.

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Philip Martinsson; [2018]
    Keywords : Kenya; Laikipia; Peace Formation; Local Peace Committee; Peacebuilding; Peace Infrastructure; Non-State Actors;

    Abstract : Previous research shows that there is a demand of enhancing our understanding about the local actor as a mechanism for peacebuilding, suggesting a need for further investigation about the phenomena amid the growing complexity and decentralization of scenes in conflict. The research in this study draws together empirical data on an informal local peace committee (LPC) conducted in Laikipia, northern Kenya; a county which have experienced a multitude of conflict dynamics recently involving state and non-state actors, to know more about their role as local peacebuilders. READ MORE

  4. 4. New authentication mechanism using certificates for big data analytic tools

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Paul Velthuis; [2017]
    Keywords : Cloud Access Management; certificate on demand; Apache Spark; Apache Flink; Kerberos; transport security layer TLS ; Authentication; Multi Factor Authentication; Authentication for data analytic tools; certificate based Spark authentication; public key encryption; distributed authentication; short valid authentication;

    Abstract : Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. READ MORE

  5. 5. End-to-end Security Enhancement of an IoT Platform Using Object Security

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Tjäder; [2017]
    Keywords : Object security; COSE; IoT security; End-to-end security; CoAP; LWM2M; Bluetooth Low Energy; BLE security;

    Abstract : The Internet of Things (IoT) is seen as one of the next Internet revolutions. In a near future the majority of all connected devices to the Internet will be IoT devices. These devices will connect previously offline constrained systems, thus it is essential to ensure end-to-end security for such devices. READ MORE