Essays about: "säkerhetskrav"

Showing result 31 - 35 of 36 essays containing the word säkerhetskrav.

  1. 31. Security of NFC applications

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Thi Van Anh Pham; [2013]
    Keywords : NFC; security protocol; DESFire; Java card; card emulation; restaurant; vending machine; class attendance; security guard; NFC; säkerhetsprotokoll; DESFire; Java kort; kort emulering; restaurang; varuautomat; säkerhetsvakt;

    Abstract : Near Field Communication (NFC) refers to a communication technology that enables an effortless connection and data transfers between two devices by putting them in a close proximity. Besides contactless payment and ticketing applications, which were the original key drivers of this technology, a large number of novel use cases can benefit from this rapidly developing technology, as has been illustrated in various NFC-enabled application proposals and pilot trials. READ MORE

  2. 32. Design av persistensramverkför säker DB-access

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Pelle Säfström; [2013]
    Keywords : ;

    Abstract : Försvarsmakten har en säkerhetsplattform benämnd ”Secure Desktop” som tillhandahåller funktioner för autentisering, behörighetskontroll samt säkerhetsloggning för administrativa system. ”Secure Desktop” är dimensionerad för de krav som ställs på system som hanterar information med en sekretessklassning upp till och med Hemlig/Top Secret. READ MORE

  3. 33. Design, Measurement and Verification of Scania’s Platform Software Architecture for Safety Related Embedded Systems

    University essay from KTH/Maskinkonstruktion (Inst.)

    Author : Martin Härberg; Roberto Chiarito; [2013]
    Keywords : ;

    Abstract : The platform software architecture for the safety related embedded systems developed by Scania has become increasingly more complex. High complexity raises both the risk of failures and the time consumed by software developers to understand and debug the source code. READ MORE

  4. 34. A Framework for Security Requirements : Security Requirements Categorization and Misuse Cases

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Helen Yeshiwas Bogale; Zohaib Ahmed; [2011]
    Keywords : Misuse Case; Security Requirements; Categorization; Elicitation; Specification;

    Abstract : Context: Security Requirements engineering is necessary to achieve secure software systems. Many techniques and approaches have been proposed to elicit security requirements in the initial phases of development. READ MORE

  5. 35. Security Critical Systems in Software

    University essay from Informationskodning

    Author : Jonas Frid; [2010]
    Keywords : Computer Security; Cryptography; Separation kernel; MILS; Software evaluation; Common Criteria;

    Abstract : Sectra Communications is today developing cryptographic products for high assurance environments with rigorous requirements on separation between encrypted and un-encrypted data. This separation has traditionally been achieved through the use of physically distinct hardware components, leading to larger products which require more power and cost more to produce compared to systems where lower assurance is required. READ MORE