Listing 1 - 10 of 67 | << page >> |
Sort by
|
Choose an application
secure computing --- precise computing --- intelligent computing --- software --- algorithms --- applications
Choose an application
Computer architecture. Operating systems --- SSL (secure sockets layer) --- computerbeveiliging --- netwerkbeheer --- computernetwerken
Choose an application
Airline passenger security screening --- Government policy --- Evaluation. --- Secure Flight Program (U.S.) --- United States.
Choose an application
Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these incidents are the result of improper use of existing control mechanisms. For example, improper access control specifications for key system files could open the entire system to unauthorized access. Moreover, many computer systems are delivered with default settings that, if left unchanged, leave the system exposed. This document discusses automated tools for testing computer system vulnerability. By analyzing factors affecting the security of a computer system, a system manager can identify common vulnerabilities stemming from administrative errors. Using automated tools, this process may examine the content and protections of hundreds of files on a multi-user system and identify subtle vulnerabilities. By acting on this information, system administrators can significantly reduce their systems' security exposure. This document examines basic requirements for vulnerability testing tools and describes the different functional classes of tools. Finally, the document offers general recommendations about the selection and distribution of such tools.
Change detection --- Computer security --- Configuration review --- Identification of vulnerabilities --- Secure audit --- Trojan horse detection --- Vulnerability testing
Choose an application
Andaman7 is a mobile application for managing health records, developed by A7 Software company, based in Boncelles. This collaborative app has been designed to allow users to display, edit and exchange medical data, and by these means,to improve the communication between patients and doctors.
This master’s thesis has been conducted as part of the Andaman7 project. The goal consisted in developing mobile services for Andaman7, focusing on the Android version, and more generally, providing new features and solutions to the application.
The goal of the work was reached, as many solutions have been provided. Indeed, different tasks were performed for building or improving the GUI of the Android app: the presentation menu was modified in order to be integrated in a navigation drawer, the handmade toolbar was replaced by an Android built-in Toolbar, the screen rotations and the restoration of the application state were taken in charge, and a splash screen was added. Moreover, the GUI of the rules defining which parts of the patients’ records are shared with other users was re-designed, the languages and translations of the application were integrated. A notification system, based on Google Cloud Messaging, was also implemented. The confidentiality, integrity and origin of the medical data exchanged through the app server with other users was ensured, by integrating some cryptography mechanisms in the app. Finally, an analysis of two possible ways to perform secure backups of the users’ electronic health records was realized.
The present paper reports the choices and implementation details that have been made throughout the thesis, but also presents some alternatives and perspectives for enhancing the provided features in the future.
Android --- notification system --- cryptography --- secure backup --- Andaman7 --- Ingénierie, informatique & technologie > Sciences informatiques
Choose an application
Choose an application
Border security --- Borderlands --- Government policy --- International cooperation. --- Security measures. --- Free and Secure Trade Program (U.S.) --- U.S. Customs and Border Protection --- Evaluation. --- Management --- Auditing.
Choose an application
Choose an application
Borderlands --- Imports --- National security --- Security measures --- Free and Secure Trade Program (U.S.) --- U.S. Customs and Border Protection --- Rules and practice --- Evaluation.
Choose an application
Listing 1 - 10 of 67 | << page >> |
Sort by
|