Essays about: "security in cloud"

Showing result 21 - 25 of 259 essays containing the words security in cloud.

  1. 21. DevOps: Assessing the Factors Influencing the Adoption of Infrastructure as Code, and the Selection of Infrastructure as Code Tools : A Case Study with Atlas Copco

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : David Ljunggren; [2023]
    Keywords : DevOps; Infrastructure as Code; Automation; DevOps; Infrastruktur som kod; Automation;

    Abstract : This research initiative, which takes the shape of an interpretive qualitative case study, intends to investigate the key considerations for organizations that are to adopt IaC and select an IaC tool. Interviews with operations specialists with varying experience with Infrastructure as Code were conducted for data collection, which was then followed by thematic data analysis. READ MORE

  2. 22. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Álvaro Revuelta Martinez; [2023]
    Keywords : ;

    Abstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE

  3. 23. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  4. 24. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 25. Digital security monitoring of cloud services - SLA Analyser- Availability Monitoring tool for DB Cloud Services

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sneha Gupta; Mosammath Nazifa Anjum Islam Anika; [2023]
    Keywords : SLAs; Availability; Cloud service monitoring;

    Abstract : Cloud computing is in current demand and widely used for businesses because of its scalability and flexibility. An agreement is signed between cloud providers and customers to guarantee the level of services are available as promised, it is called Service Level Agreement (SLA). READ MORE