Essays about: "data security mechanism"

Showing result 31 - 35 of 65 essays containing the words data security mechanism.

  1. 31. New authentication mechanism using certificates for big data analytic tools

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Paul Velthuis; [2017]
    Keywords : Cloud Access Management; certificate on demand; Apache Spark; Apache Flink; Kerberos; transport security layer TLS ; Authentication; Multi Factor Authentication; Authentication for data analytic tools; certificate based Spark authentication; public key encryption; distributed authentication; short valid authentication;

    Abstract : Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. READ MORE

  2. 32. Strategies for Provision of Secondary Reserve Capacity to Balance Short-Term Fluctuations of Variable Renewable Energy

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : David-Constantin RADU; [2017]
    Keywords : ;

    Abstract : Recent trends and projections show a massive shift in power generation towards variable renewable energy (VRE), especially wind and solar PV. Renewable energy technologies are expected, in the upcoming decades, to become the primary source of electricity production and this will attract inherent design and operational challenges of power systems. READ MORE

  3. 33. End-to-end Security Enhancement of an IoT Platform Using Object Security

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Tjäder; [2017]
    Keywords : Object security; COSE; IoT security; End-to-end security; CoAP; LWM2M; Bluetooth Low Energy; BLE security;

    Abstract : The Internet of Things (IoT) is seen as one of the next Internet revolutions. In a near future the majority of all connected devices to the Internet will be IoT devices. These devices will connect previously offline constrained systems, thus it is essential to ensure end-to-end security for such devices. READ MORE

  4. 34. The Implementation of the Frequency-Time Encoded Decoy-State Protocol with the Slow-Light Effect for Quantum Memories

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Atomfysik

    Author : Koray Dinçer; [2017]
    Keywords : QKD; Decoy-State; Frequency-Time; Slow-light; Quantum Repeater; Quantum Memory; Physics and Astronomy;

    Abstract : Quantum key distribution (QKD) is a secure encryption key generation process to be used by two users in the presence of an eavesdropper. The no-cloning theorem allows the sender "Alice" to securely send qubits with single photons to the receiver "Bob". READ MORE

  5. 35. Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Arun Tej Seethamraju; [2017]
    Keywords : Attribute Based Encryption; Electronic Health Records; Cloud Computing; Privacy;

    Abstract : Cloud Computing today, is an evolving technology which features large Data Storage and ready-to-access from any device. The Healthcare Industry stores large Databases of patient’s records, considering the advantages of Cloud Computing it is looking forward to moving on from the traditional, proprietary Database Management Model into an Open Source Cloud DBMS Model. READ MORE