Essays about: "database integrity"

Showing result 1 - 5 of 24 essays containing the words database integrity.

  1. 1. Improved Modelling For Oxidation Of Zircalloy Fuel Cladding Tubes In PWRs

    University essay from KTH/Fysik

    Author : Rafaël Bellachia; [2023]
    Keywords : Nuclear Engineering; Corrosion; Zircalloy; PWR; Nuclear Fuel; Kärnteknik; Korrosion; Zircalloy; PWR; Kärnbränsle;

    Abstract : The fuel cladding is an essential component in the defence-in-depth strategy for nuclear safety. Its integrity and durability are therefore critical for maintaining acceptable safety conditions. However, the integrity of the cladding can be compromised during normal operation due to corrosion and hydriding. READ MORE

  2. 2. Applicability and Performance of Cross-Blockchain Communications Protocol in Distributed Resource Marketplaces

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alivelu Laxmi Mani Harika Badam; Isaya Ntilema; [2023]
    Keywords : Blockchain; Performance; Inter-Blockchain Communication; Packet; Relayer;

    Abstract : Blockchain is a distributed and decentralized database that provides transparencyand immutability of the stored data. Blockchain technology is currently being used inmany different areas due to its powerful features which provide integrity, authenticity,and confidentiality of the data it stores. READ MORE

  3. 3. Analysis of the recent uptake andimpact of NoSQL databases incompanies : The practices, concept and challenges of NoSQL

    University essay from Blekinge Tekniska Högskola

    Author : Linnea Gullmak; [2022]
    Keywords : considerations; NoSQL; uptake; companies;

    Abstract : Context: Data is at the heart of any information system. Choosing the appropriate database and its operation is a major decision for any company and choosing from the pool of different options can can feel overwhelming. In this thesis we take a look at the main factors to consider when making your decision, to help you with the whole process. READ MORE

  4. 4. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  5. 5. Prevention of Privilege Abuse on NoSQL Databases : Analysis on MongoDB access control

    University essay from KTH/Skolan för kemi, bioteknologi och hälsa (CBH)

    Author : Marwah Ishak; [2021]
    Keywords : NoSQL databases; MongoDB; Access control; Privilege abuse; Role-based access control; NoSQL-databaser; MongoDB; Åtkomstkontroll; Missbruk av privilegier;

    Abstract : Database security is vital to retain confidentiality and integrity of data as well as prevent security threats such as privilege abuse. The most common form of privilege abuse is excessive privilege abuse, which entails assigning users with excessive privileges beyond their job function, which can be abused deliberately or inadvertently. READ MORE