Essays about: "non-repudiation"

Showing result 1 - 5 of 14 essays containing the word non-repudiation.

  1. 1. Privacy threat analysis and evaluation of Privacy Enhancing Technologies for the integration of 3D Scene Graphs in smart buildings

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alejandra Mugica Trapaga; [2023]
    Keywords : 3DSG; DFD; Hydra; IoT; LINDDUN; PETs; Privacy; Threat modeling.; Technology and Engineering;

    Abstract : The recent advent of 3DSG in the computer vision domain has brought powerful high-level representations of 3D environments. These representations strive to mimic human perception and facilitate the extraction of meaningful insight from visual data. READ MORE

  2. 2. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : John Augustsson; Johan Carlsson; [2021]
    Keywords : GraphQL; Threat modeling; Open-Source Software; Ethical hacking; DevOps; GraphQL; Hotmodellering; Öppen källkod; Etisk hackning; DevOps;

    Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE

  3. 3. Non-repudiation mechanisms for IoT applications : A systematic literature review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Workneh Y. Ayele; [2021]
    Keywords : ;

    Abstract : .... READ MORE

  4. 4. Security Culture in Sweden with Focus on Digital Certificate Culture in Organizations

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Haneen Mohialdeen; Johannes Draaijer; [2020]
    Keywords : Security Culture; Organisational Culture; X.509 Digital Certificates; Digital Certificate Security Culture;

    Abstract : Digital certificates lie at the heart of security where effective security culture enables digital certificates to be widely and properly deployed in organizations. Digital certificates provide a way to secure websites and bank transactions, digitally sign documents and emails, enable secure access to remote locations on the internet through VPNs by providing a means for authentication, authorization, confidentiality, integrity, and non-repudiation. READ MORE

  5. 5. Efficient, Scalable and Secure Vehicular Communication System : An Experimental Study

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shubhanker Singh; [2020]
    Keywords : Vehicular Public-Key Infrastructure VPKI ; Vehicular Communication VC ; Beacon; Pseudonymous Certificate PC ; TESLA; Signature Verification; Cooperative Verification; Fordonsinfrastruktur med allmän nyckel; Fordonskommunikation; Beacon; Pseudonymt Certifikat PC ; TESLA; Signatur Verifiering; Kooperativ Verifiering;

    Abstract : Awareness of vehicles’ surrounding conditions is important in today’s intelligent transportation system. A wide range of effort has been put in to deploy Vehicular Communication (VC) systems to make driving conditions safer and more efficient. Vehicles are aware of their surroundings with the help of authenticated safety beacons in VC systems. READ MORE