• Security in SOA-Based Healthcare Systems 

      Sassoon, Richard (Master thesis, 2009)
      Healthcare organizations need to handle many kinds of information and integrate different support systems, which may be accessed from external corporations. Service Oriented Architecture (SOA) provides the means to achieve ...
    • Security in the MIDAS Middleware 

      Pronstad, Thomas; Westerlund, Vegar (Master thesis, 2008)
      Security in Mobile ad-hoc networks (MANETs) is difficult because of its operating environment and its lack of a central control unit, making classical security measures inapplicable. MIDAS is a project funded by the European ...
    • Security Incident Handling and Organisational Models 

      Karun, Hossein Hayati (Master thesis, 2006)
      This master thesis focuses on calculating the efficiency in handling security incidents and is of main interest for personnel dealing with security organisation, security management and security policies. The results ...
    • Security Incident handling and reporting - a study of the difference between theory and practice 

      Orderløkken, Tore Larsen (Master thesis, 2005)
      NORSK: Private bedrifter og offentlige institusjoner er i stadig sterkere grad avhengig av pålitelige og sikre Informasjon og Kommunikasjons Teknologi (IKT) løsninger. Økning i ”business to business” samt ”business to ...
    • Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017 

      Gkioulos, Vasileios; Wolthusen, Stephen (Chapter, 2017)
      The requirement for enabling network centric warfare through the accommodation of network-enabled capabilities, promoted the use of service oriented architectures (SOA) within military networks. The initial response of the ...
    • Security issues in eyeOS 

      Obadya, Samaneh (Master thesis, 2012)
      Cloud computing nowadays, is a hot topic in Information Technology. Itbrings about the fundamental paradigm shift in IT systems realm. Cloudcomputing claims and aims to bring along improvements to the IT services.Improved ...
    • Security Issues in OpenStack 

      Slipetskyy, Rostyslav (Master thesis, 2011)
      Security Issues in OpenStack
    • Security Issues with Content Management Systems (CMSs) on the Cloud 

      Østdahl, Thomas (Master thesis, 2011)
      Although cloud computing is the major hype nowadays, it is actually a relatively old concept which can be dated back to the 1950s. Then, AT&T was developing a centralized infrastructure and storage space, where their ...
    • Security Knowledge Management in Open Source Software Communities 

      Wen, Shao-Fang; Kianpour, Mazaher; Katt, Basel (Chapter, 2019)
      Open source software (OSS) communities are groups of individuals, technical or non-technical, interacting with collaborating peers in online communities of practices to develop OSS, solve particular software problems and ...
    • Security Modeling with SeaMonster:: A survey of information sources used when modeling threats and attacks 

      Baadshaug, Egil Trygve (Master thesis, 2009)
      Software security is becoming increasingly important during software development. One reason for this is that attackers have evolved from being teenagers trying to improve their skills to people involved in organized crime ...
    • Security notions for cloud storage and deduplication 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen (Journal article; Peer reviewed, 2018)
      Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required ...
    • Security of 5G-Enabled Next Generation Emergency Communication in Norway 

      Sigrid Andersen Syverud (Master thesis, 2020)
      Nødetatene er helt avhengige av radiokommunikasjon for å samarbeide når de er på utrykningsoppdrag. Den nåværende løsningen for slik kommunikasjon i Norge heter Nødnett, og er et landsdekkende mobilt nettverk basert på ...
    • Security of dark net overlay networks 

      Fallang, Fredrik (Master thesis, 2022)
      I denne masteroppgaen blir det presentert en metode for å opprette desentraliserte likemannsnettverk. Ved å benytte Tor rutere på en ny måte vi kan bygge et nettverk ovenpå eksisterende infrastruktur. Systeme blir testet ...
    • Security of Domestic Products in the IoT 

      Chiem, Henriette Victoria (Master thesis, 2015)
      In the last few years, the idea of connecting existing computing devices through wireless communication has given place to the concept of the Internet of Things (IoT). Many products are already available for the domestic ...
    • Security of Internet of Things Protocol Stacks 

      Andersen, Øystein Løvdal (Master thesis, 2016)
      Internet of Things has become one of the big buzzwords in the IT market in recent years, and it is predicted to continue its rapid growth in the coming years. In order to talk about the Internet of Things, this thesis ...
    • Security of Microsoft OneDrive 

      Lonsky, Rafael (Master thesis, 2018)
      Cloud storage allows users to access and manage their data from any place in the world. One of the biggest cloud storage providers is Microsoft with its product OneDrive, which serves millions of users around the globe. ...
    • Security of QKD-systems with detector efficiency mismatch 

      Lydersen, Lars Vincent van De Wiel (Master thesis, 2008)
      The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is called quantum key distribution (QKD). In theory the key exchange can be made completely secure. Real QKD implementations ...
    • Security of QR Codes 

      Kapsalis, Ioannis (Master thesis, 2013)
      The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their popularity as they appear in more places in theurban environment. QR Codes can be considered as physical hyper-linksthat give the ability ...
    • Security of quantum key distribution source 

      Simonsen, Eivind Sjøtun (Master thesis, 2010)
      Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses, which may be exploited in the future, either by development in mathematics, or by quantum ...
    • Security of quantum key distribution with bit and basis dependent detector flaws 

      Lydersen, Lars; Skaar, Johannes (Journal article; Peer reviewed, 2010)
      We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), in the presence of bit and basis dependent detector flaws. We suggest a powerful attack that can be used in systems ...