Essays about: "secrecy"
Showing result 6 - 10 of 81 essays containing the word secrecy.
-
6. Mission impossible : A case study on how to manage the tension between openness and secrecy in the defense industry
University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utveckling; Linköpings universitet/Filosofiska fakultetenAbstract : Title: Mission Impossible? A case study on how to manage the tension between openness and secrecy in the defense industry. Background: This thesis is built upon a unique case exhibiting open innovation within the defense industry. READ MORE
-
7. Research and Analysis of Suspension Dynamics of an Autonomous Bidirectional Road Vehicle
University essay from KTH/Väg- och spårfordon samt konceptuell fordonsdesignAbstract : The bidirectionality of road vehicles is a novel research area, which is directly connected with autonomy, efficiency, flexibility and sustainability of transportation. The research in this area is mostly performed with stringent restrictions in corporate secrecy. This fact makes the area publicly unexplored, moreover highly future oriented. READ MORE
-
8. Secure log-management for an Apache Kafka-based data-streaming service
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis aims to investigate the prospect of using Apache Kafka to manage data streams based on secrecy/classification level and separate these data streams in order to meet the requirement set by the secrecy/classification levels. Basalt AB has the responsibility of managing classified data for private and state actors, including the Swedish Armed Forces and other organizations. READ MORE
-
9. E-Health data risks & protection for public cloud : An elderly healthcare usecase for Swedish municipality
University essay fromAbstract : Organizations are increasingly adopting the cloud to meet their business goals more cost-effectively. Cloud benefits like scalability, broad access, high availability, and cost-effectiveness provide a great incentive for organizations to move their applications to the cloud. READ MORE
-
10. Secrecy Capacity of Cooperative Transmission with Opportunistic Relaying Scheme
University essay fromAbstract : The usage of wireless communication has increased over the past few years. Most wired communications are replaced by wireless communication for ease of use. Wireless communication transfers confidential information like personal information and credentials between two entities. READ MORE