Essays about: "software security model"

Showing result 21 - 25 of 133 essays containing the words software security model.

  1. 21. The impact of expiration date tracking software in grocery stores : A task-technology fit review of information systems used for date-checking in grocery stores

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Anna Enstam; [2022]
    Keywords : expiration date tracking software; food waste; information system; task- technology fit; case study;

    Abstract : Each year, 1.3 billion tons of food produced for human consumption are lost or go to waste globally throughout the food supply chain (FSC). Increasing the efficiency of the entire FSC is an essential action in achieving food security for the global population, which includes reducing the amount of food lost and wasted. READ MORE

  2. 22. Denial-of-service attacks against the Parrot ANAFI drone

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jesse Feng; Joakim Tornert; [2021]
    Keywords : Penetration testing; cyber security; drone; denial-of-service attacks; Wi-Fi IEEE 802.11.;

    Abstract : As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. READ MORE

  3. 23. Validating Side Channel models in RISC-V using Model-Based Testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Viktor Vitek; [2021]
    Keywords : Observational model · Side-channel analysis and countermeasures · Embedded systems security · Model-based Testing; Observationsmodell · Sidokanal analys och motåtgärder · Inbyggda system säkerhet · Model-Baserad Testning;

    Abstract : Microarchitecture’s optimizations have increased the performance but lowered the security. Speculative execution is one of the optimizations that was thought to be secure, but it is exploitable to leak information. READ MORE

  4. 24. RTIC - A Zero-Cost Abstraction for Memory Safe Concurrency

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Henrik Tjäder; [2021]
    Keywords : Embedded systems; real-time; concurrency; RTIC; RTFM; Real-Time For the Masses; Real-Time Interrupt-driven Concurrency;

    Abstract : Embedded systems are commonplace, often with real-time requirements, limited resources and increasingly complex workloads with high demands on security and reliability. The complexity of these systems calls for extensive developer experience and many tools has been created to aid in the development of the software running on such devices. READ MORE

  5. 25. SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abel Tariku Sintaro; Yemi Emmanuel Komolafe; [2021]
    Keywords : Zero-Trust security model; Perimeter-based security model; Software- defined perimeter; IPSec VPN; performance evaluation; comparative study;

    Abstract : Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. READ MORE