Essays about: "data security mechanism"

Showing result 6 - 10 of 65 essays containing the words data security mechanism.

  1. 6. Attribute-Based Encryption with dynamic attribute feature applied in Vehicular Ad Hoc Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zijian Huang; [2022]
    Keywords : Ciphertext-Policy Attribute-based encryption; Dynamic Attributes; Network Security; Vehicular Ad Hoc Networks; Ciphertext-Policy Attributbaserad kryptering; dynamiska attribut; nätverkssäkerhet; fordonsbaserade ad hoc-nätverk;

    Abstract : The Vehicular Ad Hoc Network (VANET) is a promising approach for future Intelligent Transportation Systems (ITS) implementation. The data transmission is wireless primarily in the VANET system. The secure data transmission in VANET attracts research attention without any doubt. READ MORE

  2. 7. iOS vs Android: Security of Inter-App Communication

    University essay from Mittuniversitetet/Institutionen för data- och systemvetenskap

    Author : Albin Holmberg; [2022]
    Keywords : iOS Security; Android Security; URL-scheme Hijack; Intent Hijack; Swish;

    Abstract : Android and iOS are the world leading mobile operating systems in today’s growing market of handheld devices. Third-party applications are an important aspect of these systems but can also provide an attack-vector for exploiting other installed applications. READ MORE

  3. 8. Secure Application Development

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Alaa Alwan; [2022]
    Keywords : secure development; application security; static application security testing; SAST;

    Abstract : Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. READ MORE

  4. 9. PET-Exchange: A Privacy Enhanced Trading Framework : A Framework for Limit-Order Matching using Homomorphic Encryption in Trading

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jacob Wahlman; [2022]
    Keywords : Homomorphic Encryption; Privacy; Securities Exchange; Privacy Enhancing Technologies;

    Abstract : Over the recent decades, an increasing amount of new traders has entered the securities markets in order to trade securities such as stocks and bonds on electronic and physical exchanges. This increase in trader activity can largely be attributed to a simpler trading process including the growth of the electronic securities exchanges allowing for more dynamic and global trading platforms. READ MORE

  5. 10. Information Asset Accountability in practice: information owner’s perspective : A qualitative case study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Elaheh Aalinejad; [2022]
    Keywords : sense of accountability; information asset accountability; information owner; accountability theory;

    Abstract : Information plays an essential role in supporting an organization's business; this information encounters any business's technology, people, and process aspects. In contrast, each aspect can risk an organization's information assets. READ MORE