Now showing items 21-40 of 43

    • Privacy preserving pattern matching : implementation issues 

      Hidayat, Risanuri (Master thesis, 2002)
      The growing of the Internet has the potential to erode personal privacies. One can monitor a private data through the Internet without data owner knowledge. The project is to implement technique that allow pattern ...
    • Privacy protection in a mobile biomedical information collection service 

      Børthus, Øyvind; Engh, Thomas Mikael (Master thesis, 2006)
      This report presents a model in a mobile health care environment and uses a combination of existing technologies to build a privacy protection scheme. This work covers security issues in both the wireless and wired network, ...
    • Real time integrity control of operating systems 

      Mellem, Erik; Olsen, Frode (Master thesis, 2004)
      It can be critical if an intruder gains access to an operating system and modify files. To prevent this Norwegian Defence Research Establishment has proposed a thesis that it is possible to ...
    • Role-based access control for wireless information systems 

      Brekka, Bjørnar; Kramer, Flemming (Master thesis, 2004)
      Role Based Access Control (RBAC) is an effective access control method for protecting information and resources in large information systems. It is used as a basis for security in medium and ...
    • Security and privacy for wireless ad-hoc networks 

      Pettersen, Audun; Åsen, Frode (Master thesis, 2006)
      The common belief of that mobile network makes security and privacy more difficult to establish is not always correct. Also the fact that several types of wireless technology make nodes vulnerable to monitoring and ...
    • Security in GPRS 

      Bjåen, Geir Stian; Kaasin, Erling (Master thesis, 2001)
      GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents ...
    • Security in the Wireless Application Protocol : post-graduate thesis in information and communication technology 

      Storfjord, Monica (Master thesis, 2000)
      The necessity of being online wherever you are and at any time, have brought foreword the WAP technology. Solution based on banking, industry, and sale among others, is services and application that are on the market to ...
    • Security issues in epassports : ICAO standard and national implementations as part of the US visa-waiver program 

      Bjelkåsen, Eili; Olsen, Linda Walbeck (Master thesis, 2006)
      After the 9/11 terror attacks against the US there have been concerns about how to positively identify every individual entering a country. As a direct result ePassports are now being issued in several countries all over ...
    • Sikkerhet i Blåtann 

      Hartviksen, Stian (Master thesis, 2000)
      Denne diplomoppgaven tar for seg sikkerhetsaspekter til trådløs kommunikasjon ved bruk av Blåtann. Sikkerhet består av tre hoveddeler; autentisering, autorisering og kryptering. Autentisering er det å bekrefte ektheten ...
    • Sikkerhet og sårbarhet i IP-basert infrastruktur 

      Brådland, Ivar; Hodøl, Per Øyvind (Master thesis, 2006)
      Etter hvert som Internett har utviklet seg til å bli en bærer for samfunnskritiske tjenester, er det interessant å se helhetlig på robustheten til disse tjenestene ifra et teknologisk og samfunnsmessig perspektiv. De ...
    • Sikkerhet, trusler og mulige tiltak ved bruk av PDA i organisasjoner 

      Sønderland, Svein Aslak (Master thesis, 2001)
      Oppgaven omhandler en generell oversikt over hva en Personal Digital Assistent (PDA) er, hva som finnes på markedet, nye bruksområder, sikkerhetsmekanismer og trusler som man kan forvente kommer i den nærmeste fremtid. ...
    • Sikkerhetsovervåking av nettverk med Network Flight Recorder : deteksjon av den trojanske hesten Netbus 

      Johnsen, Per Kristian (Master thesis, 1999)
      Stadig flere bedrifter og organisasjoner er i dag avhengige av datasystemer. Sett i sammenheng med at disse systemene i større grad er blitt en del av Internett, har det blitt stadig viktigere å kunne beskytte seg mot ...
    • Sikkert valgsystem over Internett 

      Hopland, Magne; Jensen, Rune (Master thesis, 2001)
      Det har i de siste årene vært en økende interesse for å utvikle sikre valgsystem over Internett. Allerede i 1869 fikk Thomas Edison patent på et elektronisk valg apparat, men det var derimot ingen den gang som ville kjøpe ...
    • Sikring av IP-basert managementtrafikk : sammenlikning av SNMPv3, IPSec og TLS 

      Valsgård, Ole Richard (Master thesis, 2003)
      Denne hovedoppgaven tar for seg ulike måter å sikre IP-basert nettverksmanagement trafikk. De mest vanlige metodene for nettverksmanagement, Simple Network Management Protocol (SNMP) og telnet, ble i sin tid utviklet uten ...
    • SIP based IP-telephony network security analysis 

      Valsgård, Dag Ove (Master thesis, 2004)
      This thesis evaluates the SIP Protocol implementation used in the Voice over IP (VoIP) solution at the fibre/DSL network of Èlla Kommunikasjon AS. The evaluation focuses on security in the telephony service, and is ...
    • Smartkort og Windows 2000 

      Landa, Terje (Master thesis, 2000)
      Sikkerhet er et viktig tema innenfor alle datasystemer, ikke minst i forbindelse med Internett. Internett åpner nye muligheter, men medfører også at datasystemene blir mer sårbare. Utfordringen for dagens datasystemer ...
    • Study of aspects in electronic patient journal relevant to the medical office agreement 

      Øysæd, Halvard; Kleiv, Roy Otto (Master thesis, 2003)
      Keeping track of the condition of a patient is and always will be important in order for a doctor to give the best diagnosis and keeping the patient as healthy as possible. Earlier the patient journals were stored at the ...
    • System archetypes and dynamic stories on information security risks in the transition to integrated operations in the oil and gas industry 

      Nordmo, Tor Ivar J. (Master thesis, 2006)
      From a situation where the drilling and production platforms were solely run on site (offshore), the industry is now working on establishing land based control systems to decrease production costs, and consequently ...
    • Threat to information security : the system vulnerability and denial of service attacks 

      Braathen, Kjetil Eiklid; Salte, Silje (Master thesis, 2004)
      The use of the Internet has increased drastically the last few years. This trend has led to a constant increase in attacks toward computer systems and networks, and the methods for attacking are becoming more and more ...
    • UMTS authentication and key agreement : a comprehensive illustration of AKA procedures within theUMTS system 

      Dohmen, Jon Robert; Olaussen, Lars Sømo (Master thesis, 2001)
      This report will give information on the 3rd generation mobile communication system, UMTS, its Authentication and Key Agreement (AKA) procedures and security aspects. It will also describe the ‘UMTS AKA Illustrator’ which ...