Essays about: "distributed web service"

Showing result 1 - 5 of 50 essays containing the words distributed web service.

  1. 1. Continuous Integration for Embedded Software with Modular Firmware Architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabian Segatz; [2023]
    Keywords : Continuous integration; Embedded software development; Modular firmware architecture; Jenkins; Software quality; Kontinuerlig integration; Inbyggd programvaruutveckling; Modulär fastvara arkitektur; Jenkins; Programvarukvalitet;

    Abstract : Continuous Integration (CI) techniques are widely adopted in web and application development but have received limited attention in the embedded software domain. This thesis investigates the application of CI techniques in embedded software development through a case study at Cobolt AB, a company specializing in optoelectronics. READ MORE

  2. 2. Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Katie Fajer; Lisa Alm; Amanda Gerth; [2023]
    Keywords : Second-hand luxury e-commerce; Blockchain technology; Authentication; Perceived Risk; Theory of Planned Behaviour; Consumer Behaviour.; Business and Economics;

    Abstract : Title: Building Blocks for a Better Buyer Experience: Consumer Perceptions of Blockchain Authentication Methods in Second-Hand Luxury E-Commerce Date of the Seminar: 2nd of June, 2023 Course: BUSN39: Degree Project in Global Marketing Authors: Lisa Alm, Amanda Gerth & Katie Fajer Supervisor: Burak Tunca Keywords: Second-hand luxury e-commerce, Blockchain technology, Authentication, Perceived Risk, Theory of Planned Behaviour, Consumer Behaviour. Thesis Purpose: To explore consumer perspectives towards the implementation blockchain technology as a service offered within the authentication of second-hand vintage luxury e-commerce Methodology: This quantitative research study utilises an independent sample t-test to compare Perceived Risk, Attitudes, Perceived Behavioural Control, Subjective Norms, and Purchase Intention in regard to authentication method surveyed. READ MORE

  3. 3. Mitigating HTTP Denial-of-Service Attacks on Self-Hosted Web Applications

    University essay from KTH/Datavetenskap

    Author : William Berg; Gustav Henningsson; [2022]
    Keywords : ;

    Abstract : Denial-of-service (DoS) attacks are a common threat to any resource on the internet, making knowledge regarding how to prevent them increasingly valuable. In this paper we have investigated different HTTP DoS attacks, how they affect web servers, and what steps one might take to protect a self-hosted web application from such attacks. READ MORE

  4. 4. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    University essay from Linköpings universitet/Programvara och system

    Author : Ludvig Thor; [2022]
    Keywords : OIDC; Single sign-on; Security;

    Abstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE

  5. 5. Analysis of 5G Edge Computing solutions and APIs from an E2E perspective addressing the developer experience

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jitendra Manocha; [2021]
    Keywords : Edge Computing; MEC; 5G; Latency; URLLC; APIs; Network Exposure Function; ETSI MEC ISG; 3GPP SA6; Hyper-scale; OSBA; Open Service Broker API; Edge Computing; MEC; 5G; Latency; URLLC; APIs; Network Exposure Function; ETSI MEC ISG; 3GPP SA6; Web skala; Hyper-scale; OSBA; Open Service Broker API;

    Abstract : Edge Computing is considered one of the key capabilities in next generation (5G) networks, which will enable inundation of latency, throughput, and data sensitive edge-native applications. Edge application developers require infrastructure at the edge to host the application workload and network connectivity procedures to connect the application users to the nearest edge where the application workload is hosted. READ MORE