Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på emneord "Telematikk"
Viser treff 1-20 av 204
-
4G Nett: En teknisk og økonomisk analyse
(Master thesis, 2011)Denne masteroppgaven har tatt for seg ulik tematikk tilknyttet fjerde generasjons (4G) nettverk. Temaene som har blitt behandlet er både av teknisk og økonomisk art. I starten av oppgaven har de tidligere nettverkene, fra ... -
A Constructive Approach to Support the Design of State Machines
(Master thesis, 2006)The components of telecommunication systems can be described by state machines that communicate by sending messages asynchronously. It is difficult to keep a component consistent with the other components it is connected ... -
A Control System Providing a Dynamic Overview of Emergency Situations at Oil and Gas Processing Plants
(Master thesis, 2009)Oil and gas processing plants handle very large volumes of gases and liquids, many of which are both flammable and poisonous. Combined with the high pressures often involved as part of the processing, an accident has the ... -
A Demonstration on Service Compositions based on Natural Language Request and User Contexts
(Master thesis, 2008)The significant growth in mobile markets exposes business niches. A number of heterogeneous services have been offered to end users by several service providers. The end users can fully benefit from wide varieties of ... -
A Pattern-Based Approach for the Consistent Design of Interaction Interfaces
(Master thesis, 2006)We depend more and more on networked systems in our every day lives. The functionality and correctness of such systems are thus becoming increasingly important both for individuals and the society as a whole. At the same ... -
A Routing Protocol for MANETs
(Master thesis, 2007)In this master thesis there has been a description of what MANETs are and why they are so interesting. Because of its characteristics, the tradicional routing protocols for wired networks are not advisable for them. A ... -
A Semantic Web-driven Approach to Self-Configurating Computer Systems
(Master thesis, 2006)The explosive growth, in both the size and complexity, of communication and computing systems has made it increasingly difficult to manage and configure these. In today s ever-changing environments, systems frequently need ... -
A study of user authentication using mobile phone
(Master thesis, 2007)The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentication scheme is based on usernames and passwords ... -
A Study of Wi-Fi RFID Tags in Citywide Wireless Networks: How well do Wi-Fi RFID tags work in outdoor Wi-Fi networks and is it possible to build commercial services based on Wi-Fi RFID tags in citywide wireless networks?
(Master thesis, 2007)Active Radio Frequency Identification (RFID) tags that comply with IEEE 802.11 standards are currently used within indoor Real-Time Location Systems (RTLS) in several niche markets. With the rapid deployment of citywide ... -
Access Control in Home Network Systems
(Master thesis, 2009)In this thesis we examine the possibility to create an Access Control Service, offering Authentication, authorization and confidentiality to support users with remote access to a Home network system. We study different ... -
Access Control in Multi-Thousand-Machine Datacenters
(Master thesis, 2008)Large data centers are used for large-scale high-performance tasks that often includes processing and handling sensitive information. It is therefore important to have access control systems that are able to function in ... -
Adding Security to Web Services: An Automatic, Verifiable, and Centralized Mechanism for Web Services Input Validation
(Master thesis, 2006)Accepting unvalidated input is considered today's greatest web security threat. This master's thesis addresses that threat by proposing an automatic and centralized mechanism for validating web services input. By building ... -
Aksesssikkerhet i Trådløse Trondheim
(Master thesis, 2006)Sammendrag Økonomiske og administrative fordeler har gjort trådløse nettverk (WLAN) et foretrukket teknisk alternativ til vanlige nettverk (LAN). Mange bedrifter har sett på WLAN som fremtidens investering og antall nye ... -
An Evaluation of Mashup Technology
(Master thesis, 2010)Mashups are web applications developed using contents and services available on the web. Mashups provide a flexible and "easy-to-use" way for service composition on the Web. In this thesis we share the result of an evaluation ... -
Analyse av en musikktjeneste til mobiltelefoner
(Master thesis, 2009)I de siste årene har det kommet flere tjenester på internett som lar en bruker streame musikk, fra et stort musikkbibliotek, til datamaskinen. Jeg har i denne rapporten sett på muligheten for å overføre slike tjenester til ... -
Analyse av franchisemodeller for åpne FTTH-nett
(Master thesis, 2008)I det norske markedet har regionale kraftselskaper vært de dominerende aktørene innen fiberbasert bredbåndsaksess til privatkunder, også kalt fiber til hjemmet eller FTTH. Ettersom kraftselskaper har utbygging og drift av ... -
Analyse av innføring av eResept hos allmennlegen: Kvalitative og kvantitative undersøkelser blant allmennleger i Trondheim
(Master thesis, 2006)Overgangen fra papirbaserte til elektroniske systemer i helsevesenet er en sentral helsepolitisk målsetning. Denne oppgaven analyserer overgangen fra papirbasert til elektronisk kommunikasjon av reseptinformasjon, kalt ... -
Analysing Malicious Code:: Dynamic Techniques
(Master thesis, 2007)This report starts out discussing a framework for building an API monitoring system. In such a system, malicious code can be run, and its actions can be taken notice of. I look into different analysis tools for stuctural ... -
Analyzing Malware through the use of the Epsilon-Gamma-Pi model
(Master thesis, 2009)In this master thesis the Epsilon-Gamma-Pi model is presented. We analyze this model, with respect to advantages and disadvantages, it provides when applied to malware. The purpose of the model is to describe different ... -
Authentic Mobilization Orders: Design of an Entrepreneurial Message Authentication System That Provides Authentic Mobilization Orders in the Case of a Military Invasion
(Master thesis, 2006)This Master s thesis proposes a solution to a problem that countries with mobilization-based militaries face. In the event of a sudden invasion from an attacking enemy these militaries will issue and distribute mobilization ...