Essays about: "säkerhetskrav"

Showing result 26 - 30 of 36 essays containing the word säkerhetskrav.

  1. 26. In pursuit of a perfect system : Balancing usability and security in computer system development

    University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utveckling; Linköpings universitet/Filosofiska fakulteten

    Author : Omolara Matras; [2015]
    Keywords : Computer-systems security; usability; information security; User-Centered System Design UCSD ; balance; synthesis matrix; security breach; design methodology; Carbanak Attack; AEGIS; Octave Allegro.;

    Abstract : Our society is dependent on information and the different technologies and artifacts that gives us access to it. However, the technologies we have come to depend on in different aspects of our lives are imperfect and during the past decade, these imperfections have been the target of identity thieves, cyber criminals and malicious persons within and outside the organization. READ MORE

  2. 27. Simulating Human-Robot Collaboration : - An example from cab assembly

    University essay from KTH/Industriell produktion

    Author : Björn Backman; Carl S:T Clair Renard; [2015]
    Keywords : ;

    Abstract : This is a master thesis report conducted at the Department of Production Engineering at KTH. The master thesis is a part of the ToMM (Collaborative Team of Man and Machine) project which involves Swerea IVF, Volvo Cars, Volvo Group, Scania and Linköping University. READ MORE

  3. 28. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Andreas Broström; [2015]
    Keywords : agile; security; testing; vulnerability scanner; detection;

    Abstract : The number of vulnerabilities discovered in software has been growing fast the last few years. At the same time the Agile method has quickly become one of the most popular methods for software development. READ MORE

  4. 29. Safety requirements for monitoring and communicating operational data for vehicles in Intelligent Transport System

    University essay from KTH/Maskinkonstruktion (Inst.)

    Author : Mathilde Simon; [2014]
    Keywords : ;

    Abstract : In the past few years, wireless technologies performances have been greatly improved to address various kinds of communications. However, in applications requiring the transmission of safety-critical data such as in industrial systems, wired solutions are still preferred to wireless networks. READ MORE

  5. 30. Hardware Security Module Performance Optimization by Using a "Key Pool" : Generating keys when the load is low and saving in the external storage to use when the load is high

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Nima Seyed Saboonchi; [2014]
    Keywords : HSM; Digital Signature; PKI; e-Identification; RSA; SAML; HSM; Digitala signatur; PKI; e-legitimation; RSA; SAML;

    Abstract : This thesis project examines the performance limitations of Hardware Security Module (HSM) devices with respect to fulfilling the needs of security services in a rapidly growing security market in a cost-effective way. In particular, the needs due to the introduction of a new electronic ID system in Sweden (the Federation of Swedish eID) and how signatures are created and managed. READ MORE