Essays about: "thesis in database security"

Showing result 6 - 10 of 74 essays containing the words thesis in database security.

  1. 6. Securing Sweden’s Digital Assets

    University essay from Lunds universitet/Institutionen för informatik

    Author : Per Hafström Fremlin; Daniel Tomic Lindvall; [2023]
    Keywords : Database Security in Sweden; Database Threats; History of Database Security; Database Security Best Practices; Business and Economics;

    Abstract : This thesis addresses the gap in literature and research surrounding the historical context of database security in Sweden. Through extensive research and in-depth interviews with Swedish cybersecurity experts, it highlights the underrepresented “story” of database security and emphasizes the need for a more holistic approach to this highly specialized field. READ MORE

  2. 7. Application of anonymization techniques (k-anonymity, generalization, and suppression) on an employee database: Use case – Swedish municipality

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Babatunde Oyedele; [2023]
    Keywords : anonymization; anonymization techniques; k-anonymity; generalization; suppression; ARX tool;

    Abstract : This thesis explores data anonymization techniques within the context of a Swedish municipality with a focus on safeguarding data privacy, enhancement of decision-making, and assessing re-identification risks. The investigation, grounded in a literature review and an experimental study, employed the ARX anonymization tool on a sample municipality employee database. READ MORE

  3. 8. Facial recognition techniques comparison for in-field applications : Database setup and environmental influence of the access control

    University essay from Uppsala universitet/Avdelningen för visuell information och interaktion

    Author : Gustav Norvik; [2022]
    Keywords : facial recognition; deep learning; machine learning; computer vision; image processing; artificial intelligence;

    Abstract : A currently ongoing project at Stanley Security is to develop a facial recognition system as access control system to prevent theft of heavy vehicles for terrorist purposes. As of today, there are several providers of facial recognition techniques and the spectrum ranges from multi dollar licenses to easy access open source. READ MORE

  4. 9. ISMS and privacy challenges related to PeHS : A Qualitative study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Emelie Mannebäck; [2022]
    Keywords : ISMS; privacy; Personal eHealth Services; PeHS;

    Abstract : The future of healthcare is increasingly digital, which includes a shift towards more personalised services that allow for more patient-centred and transparent patient care. These services are defined as PeHS and although there are great potential benefits of these services, there are also challenges regarding infor[1]mation security and privacy related to providing this type of services. READ MORE

  5. 10. Analysis of the recent uptake andimpact of NoSQL databases incompanies : The practices, concept and challenges of NoSQL

    University essay from Blekinge Tekniska Högskola

    Author : Linnea Gullmak; [2022]
    Keywords : considerations; NoSQL; uptake; companies;

    Abstract : Context: Data is at the heart of any information system. Choosing the appropriate database and its operation is a major decision for any company and choosing from the pool of different options can can feel overwhelming. In this thesis we take a look at the main factors to consider when making your decision, to help you with the whole process. READ MORE