Essays about: "project on information security"

Showing result 1 - 5 of 163 essays containing the words project on information security.

  1. 1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  2. 2. Health Data Exchange during Transfer of Multi-morbid Elderly

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Hanan Hadi; [2023]
    Keywords : Ageing; Multi-morbidity; Health data; Health Information Exchange; Cooperation between region and municipality; Äldre; Multisjuka; Hälsodata; Utbyte av hälsoinformation; Samarbete mellan region och kommun;

    Abstract : This project aimed to enhance communication and collaboration among care providers in Stockholm Region and Stockholm Municipality by analyzing health data in various medical record systems and identifying the data that needs to be shared to support elderly individuals with multi-morbidity. Interviews with health experts, caregivers, and policymakers, as well as a literature review, were conducted to gather data. READ MORE

  3. 3. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Juan Basaez Serey; [2023]
    Keywords : DRIP; Drone Remote ID; Hyperledger-Fabric; IPFS;

    Abstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE

  4. 4. PTZ Handover: Tracking an object across multiple surveillance cameras

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Alexander Persson; [2023]
    Keywords : Technology and Engineering;

    Abstract : Tracking objects in a scene is a crucial task in accomplishing surveillance that enhances security and provides valuable information about the events happening at the site. For this task, the PTZ (pan-tilt-zoom) cameras can be utilized to achieve fluid tracking as they provide all-around surveillance with zoom capabilities. READ MORE

  5. 5. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE