Essays about: "nyckelhantering"

Showing result 1 - 5 of 10 essays containing the word nyckelhantering.

  1. 1. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maryum Hamid; [2023]
    Keywords : HashiCorp Vault; Key Management System; Kubernetes; HashiCorp Vault; Key Management System; Kubernetes;

    Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE

  2. 2. An Internet of Things Software and Firmware Update Architecture Based on the SUIT Specification

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Simon Carlson; [2019]
    Keywords : IoT; industrial IoT; security; Contiki-NG; embedded systems; software updates; IoT; industriell IoT; säkerhet; Contiki-NG; inbyggda system; mjukvaruuppdateringar;

    Abstract : As society becomes more digitalized, cyberattacks are increasingly common and severe. Security in the Internet of Things (IoT) is essential, and IoT devices must be updated to patch vulnerabilities. READ MORE

  3. 3. Secure handling of encryption keys for small businesses : A comparative study of key management systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Jacob Gustafsson; Adam Törnkvist; [2019]
    Keywords : Key management system; encryption keys; cryptography; comparison; Nyckelhantering; krypteringsnycklar; kryptering; jämförelse;

    Abstract : Background: A recent study shows that key management in the cooperate world is very painful due to, among other reasons, a lack of knowledge and resources. Instead, some companies embed the encryption keys and other software secrets directly in the source code for the application that uses them, introducing the risk of exposing the secrets. READ MORE

  4. 4. Key management with a trusted third party using LoRaWAN protocol : A study case for E2E security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Miora Ralambotiana; [2018]
    Keywords : IoT; LoRaWAN; key management; E2E security; IoT; LoRaWAN; nyckelhantering; end-to-end-säkerhet;

    Abstract : Nowadays, Internet of Things (IoT) applications are gaining more importance in people’s everyday life. Depending of their usage (for long or short distance communications, using low or high power devices, etc.), several standards exist. READ MORE

  5. 5. Efficient Privacy Preserving Key Management for Public Cloud Networks

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Anitha Kathirvel; Siddharth Madan; [2014]
    Keywords : Cloud storage; Secure Storage; Key Management scheme; access level security; Cloud Storage; säker förvaring; nyckelhantering schema; åtkomstnivå säkerhet;

    Abstract : Most applications and documents are stored in a public cloud for storage and management purposes in a cloud computing environment. The major advantages of storing applications and documents in public cloud are lower cost through use of shared computing resources and no upfront infrastructure costs. READ MORE