Essays about: "security-related"

Showing result 16 - 20 of 46 essays containing the word security-related.

  1. 16. Rebel Whispers : An issue-based approach to peace agreement success and civil war resolution

    University essay from Uppsala universitet/Institutionen för freds- och konfliktforskning

    Author : Tania Melissa Estrada Corpeño; [2020]
    Keywords : Issues; Peace Agreements; Civil war; Grievances; Sierra Leone; Liberia; Colombia;

    Abstract : While issues remain under-researched, peace agreement success has been linked primarily to the proper treatment of the parties’ security-related concerns. This study explores why some peace agreements succeed while others fail by using an issue-based approach arguing that issues are an expression of underlying grievances, which have caused the rebel groups to engage in armed conflict. READ MORE

  2. 17. Transaction synchronization and privacy aspect in blockchain decentralized applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Patarawan Ongkasuwan; [2020]
    Keywords : Blockchain; distributed database; distributed ledger; digital ledgers; centralized database; decentralized database; Ethereum; Blockchain synchronization; security-related; cryptocurrency; digital currency; transaction; user experience; privacy strategy; smart contract; risk; Blockchain; distribuerad storbok; digital ledbok; centraliserad databas; decentraliserad databas; Ethereum; Blockchain-synkronisering; säkerhetsrelaterad; cryptocurrency; digital valuta; transaktion; användarupplevelse; sekretessstrategi; smart kontrakt; risk;

    Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE

  3. 18. Towards Automating a Risk-First Threat Analysis Technique

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Karanveer Singh; Margit Saal; Andrius Sakalas; [2019-11-18]
    Keywords : ;

    Abstract : During the past decade, secure software design techniques have found their way into the software development lifecycle. In this context, threat modeling (or analysis) methodologies are used to systematically identify threats in the design phase of software development. READ MORE

  4. 19. Cross Continental Access of Information and the Boarder Gateway Protocol

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Johan Frisk; [2019]
    Keywords : BGP; Boarder gateway protocol;

    Abstract : The usage of technical equipment and the interconnection of all these devices has become essential to our every day life and to provide as good service as possible for the internet of today. However, many have the opportunity to inspect the data as it is being rushed across the globe to provide users with information at the press of a button. READ MORE

  5. 20. Säkerhet vid kreditgivning : hur banker bedömer säkerhet vid kreditgivning till jordbruk och skogsbruk

    University essay from SLU/Dept. of Economics

    Author : Oscar Klofsten; Wilhelm Jarnvall; [2019]
    Keywords : kreditgivning; säkerhet; risk; skogsbruk; jordbruk;

    Abstract : Jordbruk och skogsbruk är två branscher som kännetecknas av betydande kapital men med ett relativt svagt resultat. I teorin borde detta innebära en risk för bankerna, då ett svagt kassaflöde försämrar återbetalningsförmågan. Dock ses jordbruk och skogsbruk som attraktiva placeringar för kreditgivare. READ MORE