Essays about: "tpm"
Showing result 11 - 15 of 36 essays containing the word tpm.
-
11. Improving smartphone security with remote attestation
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Smartphones are becoming increasingly powerful and useful in a work environment. This has led to their adoption at the workplace. Many companies hand out smartphones to their employees and allow employees to bring their own devices to work. There are multiple potential vulnerabilities with such a situation. READ MORE
-
12. Use of Secure Device Identifiers inVirtualised Industrial Applications
University essay from KTH/KommunikationsnätAbstract : Industrial Control Systems (ICS) running in a virtualised environment are be-coming a common practice, however, there is not any standard or specification detailing authentication methods for industrial environments.Considering the current standards and specifications designed to provide au-thentication, we present the design and implementation of several approaches that enable trusted computing in virtualised environments. READ MORE
-
13. Determining CMMS needs in an industrial group
University essay from Lunds universitet/Teknisk logistikAbstract : Background: In order for manufacturing companies to stay competitive today, it is important to continuously strive towards eliminating any sources of waste. One of the tools to address waste elimination is to work with Total Productive Maintenance (TPM), which essentially is a structured way of improving the company’s machine reliability and production effectiveness through enhancing the sites maintenance operations. READ MORE
-
14. Setup time reduction by using lean and maintenance tools
University essay from KTH/Industriell produktionAbstract : In today’s society it is increasingly important for production companies to reduce waste during production to gain as much profit as possible. This leads to companies implementing techniques such as Total Productive Maintenance (TPM) and lean to various degrees. READ MORE
-
15. Emulation of TPM on Raspberry Pi
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The Trusted Platform Module (TPM) is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into the non-volatile memory of the module. TPM is specified by the Trusted Computing Group (TCG). TCG is an initiative started in 2003 by several multinational semiconductor and IT-companies. READ MORE