Essays about: "file security"

Showing result 1 - 5 of 59 essays containing the words file security.

  1. 1. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jódís Gunnlaugsdóttir; [2023]
    Keywords : Kompact; Component-Actor hybrid framework; Transmission Control Protocol; User Datagram Protocol; Aeron; Quic;

    Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE

  2. 2. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Victor Massy; [2023]
    Keywords : Multiparty computation; Trusted execution envrionment; Web advertising; Private attribution reporting; Flerpartsberäkning; Pålitlig exekveringsmiljö; Webannonsering; Privat attributionsrapportering;

    Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE

  3. 3. Runtime of WebAssembly : A study into WebAssembly runtime

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Adam Eriksson; [2023]
    Keywords : WebAssembly; Runtime; Native; JavaScript; Compilation; Execution;

    Abstract : WebAssembly is Assembly-like code that is created by compiling other languages into Wasm. The Wasm file can then be run on the web at near native speed. The objective of this study is to find how WebAssemblys runtime compares to JavaScript and native. The study will also see if different browsers impact WebAssembly runtime. READ MORE

  4. 4. Are Children Safe with Smart Watches? : Security Analysis and Ethical Hacking on Children’s Smart Watches

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yaqi Tian; [2023]
    Keywords : Security analysis; Penetration testing; Smart watches; Mobile Applications; Säkerhetsanalys; Penetrationstestning; Smarta klockor; Mobilapplikationer;

    Abstract : There are more and more parents that are considering to purchase smart watches for their kids. The children’s smart watches on the market are usually equipped with many practical functions like the GPS positioning, the camera and the messaging. READ MORE

  5. 5. An evaluation of edge deployment models for Kubernetes

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Robin Sörensen; [2023]
    Keywords : ;

    Abstract : With organisations moving away from in-house servers but still requiring love latency, high security and stability, edge nodes make their appearance as the best alternative. However, it is unclear which deploymen tmethod to use on those systems. This study explored the benefits and disadvantages of the multi-cluster and remote worker approach. READ MORE