Dissertations / Theses on the topic 'Säkerhet för Öppen Källkod'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 dissertations / theses for your research on the topic 'Säkerhet för Öppen Källkod.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nilsson, Anton. "Massövervakningens påverkan på intresset för öppen källkod." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-24088.
Full textThe year 2013 presented the largest disclosure of clandestine documents to date. These documents entailed information regarding global surveillance programs and their operation by intelligence-agencies such as the U.S NSA (National Security Agency) and locally in Sweden by NSAs counterpart the FRA (National Defense Radio Establishment). Furthermore, intelligence-disclosures revealed that large IT-companies participated in these surveillance-actions and actively shared user-data with the NSA. As a result of the disclosures there was an especially noticeable outcry from supporters of open source software who spoke out against these surveillance-programs as a gross violation of civil liberties. As a result of this a study felt appropriate to reveal if an interest towards open source has changed or become more representable within Swedish businesses. The aim of this study is to evaluate if companies within the IT-sector consider global surveillance as affecting their business, as well to ascertain if open source is being used within the business-model, or if it has become a more representable option since global surveillance was disclosed. An empirical study was conducted to answer these questions from a business and organizational standpoint by the use of interviews by randomly selected respondents. An evaluating questioners-guide was designed to promote candidness in the respondents’ answers and opinions as well as to encourage discussions. The result indicates that Swedish companies and businesses in general haven’t implemented any major changes to their system architecture. They have instead opted to focus on revising their IT-security policies as well as adopting a new approach towards how management of sensitive files are to be stored and shared in a safe manner. The adoption of open source within businesses has grown in scale, and it is now considered a more acceptable alternative as well as a god basis to build applications and softwareupon. Companies with a very distinctive Microsoft-strategy however have shown some resistance in the adoption of open source, mainly because of high deployment costs, while maintain and asserting confidence towards their IT-suppliers. The essence of it all dictates that there may be a connection between global surveillance and an interest towards open source within the IT-sector, but that this is still somewhat premature to comment on as major changes in infrastructure take time to implement and that companies don’t yet know how global surveillance will affect them in the future.
Derenius, Fredrik. "Framställandet av en säker LiveCD för distansarbetare : Ett projekt baserat på öppen källkod." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-5990.
Full textDomar, Bolmstam Sebastian, and Siavash Hanifi. "Security Guidelines for the Usage of Open Source Software." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280085.
Full textMjukvara med öppen källkod (open-source software) används i genomsnitti mer än 65% av applikationerna för mjukvara till företag, detaljoch e-imageimageimageimagehandel, cybersäkerhet och sakernas internet (Synopsys, 2019). Den frekventa användningen av öppen källkod ger upphov till säkerhetsrisker som behöver motverkas. Dessa risker inkluderar bland annat; skadlig kod och säkerhetsbrister som inte åtgärdas (Schryen, 2011). Säkerhetsriktlinjer har blivit definierade av ett flertal organisationer med målet att effektivisera säkerhetshanteringen av öppen källkod och på så sätt minska risken för attacker. Dessa riktlinjer täcker ofta många olika delar av en organisations hierarki och saknar ofta information som är nödvändig för att göra dem begripliga, pålitliga och användbara för de personer som använder dem. Syftet med denna studieär att bidra till enökad säkerhet vid användan-det av öppen källkod genom att dels öka kunskapen om ämnet, och genom att definiera en samling förbättrade säkerhetsriktlinjer som både beskriver vad som ska göras för att minska säkerhetsrisker och hur det ska göras. De förbättrade riktlinjerna ska baseras på befintliga säkerhetsriktlinjer för användning av öppen källkod. Ämnet studerades genom en forskningsprocess med fokus på att besvara frågan om huruvida befintliga säkerhetsriktlinjer kan förbättras, där information samlades in genom en kvalitativ forskningstyp baserad på dokumentanalys. Forskningsdesignen var av utforskande karaktär, där huvudfokuset låg i att utforska ämnet genom att försöka besvara forskningsfrågan.Genom att undersöka kvalitén av befintliga säkerhetsriktlinjer som hittats i litteraturen och utvärdera dessa med stöd av en stor samling önskvärda egenskaper hos riktlinjer av hög kvalitet, blev det uppenbart att befintliga riktlinjer kan förbättras. Däför genomfördes ett försök att vidareutveckla befintliga riktlinjer för att förbättra dem genom att lösa de problem som hittats genom utvärderingen. Försöket att förbättra existerande riktlinjer resulterade i en ny uppsättning riktlinjer med tillagd information och omformuleringar. Dessa förändringar kan dock inte sägas representera konklusiva eller objectiva förbättringar. Istället representerar de förbättrade riktlinjerna ett förslag på hur riktlinjer skulle kunna förbättras.
Persson, Anna. "Integrationsmöjligheter för modelleringsverktyg baserade på öppen källkod." Thesis, University of Skövde, School of Humanities and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-895.
Full textI en mjukvaruutvecklingsprocess ingår vanligtvis att ta fram modeller över den mjukvara som ska konstrueras. Detta är inte sällan ett omfattande arbete som kräver ett samarbete mellan flera personer i en gemensam modelleringsmiljö. I sådana modelleringsmiljöer används vanligtvis modelleringsverktyg som stöd i arbetet. Dessa modelleringsverktyg utgör tillsammans en verktygsmiljö. I denna studie undersöks möjligheter för företag och professionella organisationer att i sådana verktygsmiljöer använda modelleringsverktyg som baseras på öppen källkod.
Tre modelleringsverktyg baserade på öppen källkod har analyserats i studien; ArgoUML, Fujaba och Umbrello UML Modeller. Studien har fokuserats på att undersöka tre viktiga egenskaper hos dessa verktyg som är avgörande för deras tillämpning i verktygsmiljöer hos företag och professionella organisationer. Dessa egenskaper är integrationsförmåga, potential att vid integration hantera komplexitet hos modeller samt supportmöjligheter. Resultaten av studien visar att det i dagsläget inte finns något modelleringsverktyg baserat på öppen källkod för UML-modellering som tillgodoser de krav som ställs i en verktygsmiljö hos företag och professionella organisationer där XMI används för verktygsintegration.
FONSECA, GALAN ALEXSANDRA. "Identifiering av kritiska processmått för en öppen källkod community." Thesis, KTH, Tillämpad maskinteknik (KTH Södertälje), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-172328.
Full textDeshayes, Dan, and Simon Sedvallsson. "Nätverksoptimering med öppen källkod : En studie om nätverksoptimering för sjöfarten." Thesis, Linnéuniversitetet, Sjöfartshögskolan (SJÖ), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43379.
Full textThe thesis describes how network traffic transmitted via a satellite link can be optimized in order to reduce loading times and transmitted data. The purpose with this study has been to determine what methods are available to control and reduce the amount of data transmitted through a network and how this data is affected. By applying the practice of DNS caching, web caching and ad blocking with the use of pfSense as a platform the study has performed experiments targeting different web sites and measured the loading times and amount of transmitted data. The results showed good possibilities to optimize the network traffic and the measured values indicated a reduction of the network traffic of up to 94% and loading times with 67%.
Taysun, Necirvan, and Tony Vennberg. "Öppen källkod GIS-ramverk för mobil fältinmätning offline : Analys av lämpliga GIS-ramverk för skogsindustrin." Thesis, Högskolan Dalarna, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:du-28174.
Full textToday, there’s no effective way for field data collection and its associated map objects when planning construction of new roads. The forest industry wishes to be able to do this with a mobile device with or without an internet connection, with the help of an open-source geographical information system-framework. We have therefore conducted a case study. We needed to know what the requirements were. The requirements needed was forwarded during an interview with one person from our partner organization that had contact with a forest company. We identified eight frameworks, whereas five were left after the screening. The screening was done by discarding the frameworks that didn’t fulfill the main requirements that we got from the interview. The five remaining frameworks were analyzed by identifying the pros and cons that were based on how well the frameworks fulfilled the evaluation criterias. The evaluation criterias were based on the requirements we got from the interview as well as the additional criterias that we considered important when working with open-source frameworks. E.g. the quality of the documentation, when the framework was last updated, the eventual cost etc. The framework we finally recommended was “Mapbox”. This framework did not have the highest coverage of requirements. However we decided that it was the most well-suited choice based on the open-source criteria’s we put forward.
Adugna, Leykun, and Goran Laic. "Kan projekt med öppen källkod användas delvis eller helt för at tuppfylla behoven för routing-applikationer?" Thesis, KTH, Medicinteknik och hälsosystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272732.
Full textCompanies are looking into the open source community in the hope of finding a better alternative software to replace their existing software suit. They are looking for software that has the necessary properties required to run their business and possibly help them avoid unnecessary costs and save time. This thesis has examined the needs of routing application for companies and presented a suggestion by using self-developed testbed. The testbed can be used by companies to decide the beneficial of implementing the desired routing application software. The routing application that gave the best result in this study is FRRouting (Free Range Routing). The solution proposed by the study has been proven to be effective through a pilot project where open source program has been successful by retaining the expected quality, functionality in a cost-effective way.
Hedbrant, Joel, and Marcus Gustavsson. "Automatiserad mjukvarusandlåda : En prototyp för automatisk installation och testning av öppna programvarors anslutningar i en dedikerad miljö." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19524.
Full textAlm, Anton, and Joakim Björling. "Prestandautvärdering av firmwares baserade på öppen källkod för routrar/brandväggar på MIPS-arkitektur : Jämförelse mellan Open-WRT, DD-WRT och Tomato firmware." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-36007.
Full textThis investigation compares the performance of three different open-source firmwares. DD-WRT, Open-WRT and Tomato Firmware with MIPS architecture. The test follows two RFC that describes the process of how to perform a performance analysis of network interconnected devices. The summarized results show a winner which has generally performed better throughout all the tests and this was Tomato firmware. These results are gathered from three different tests, which is throughput, latency and concurrent sessions test. The survey also shows that the performance in general is very equal across all firmwares in the various tests. An important aspect is that there are no outstanding winner, which depends on for example how consistent the results have been. This also concerns a possible conclusion where the firmwares perform various well depending on the type of task involved. As further work on this investigation we recommend a performance and function analysis of the tools that the firmware contains. Although a survey of the interface for each firmware would be interesting.
Bergstrand, Fredrik, Kimberley French, Michaeli Rebecka Geijer, Eric Henziger, Oscar Johansson, Robert Kumpulainen, Erik Rönmark, Kristoffer Tennivaara, and Victor Tranell. "Interaktiv programmiljö för kryptoanalys." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-130788.
Full textBaiao, Manuel Mazanga. "Open Source Verktyg Stöd för Centrala Egenskaper hos Business Process Management (BPM) System." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15662.
Full textAbstract In a world of developing complex information technologies, companies and organizations need flexible and updated business systems that and match these technological developments. For this reason, commercial BPMS (Business Process Management System) tools have become popular because of their high ability to quickly integrate with business systems in new work environments. An alternative to commercial BPMS tools are the OSS-based (Open Source Software) open source BPMS tools that are available for the public to develop. Since the OSS-based BPMS tools are often new on the market and need further development, the purpose of this paper was to conduct an analysis of open source-based BPMS tools with respect to their various features. Such an analysis increases the understanding of the tools’ functionality and therefore facilitates further development of them. Based on an established analysis model by Delgado et al. (2015), a thematic option for some companies, depending on the characteristics and functionalities that are prioritized within the company. Content analysis was conducted to compare the characteristics of these tools. More specifically, collected documents were analyzed describing the properties of BPMS tools. That way, 6 different BPMS tools were compared based on 13 properties. The analysis showed that Bonitasoft, jBPM and JBPM5 were the most well-developed BPMS tools that supported most of the features. In addition, the analysis demonstrated that tools with fewer features could still be a good option for some companies, depending on the characteristics and functionalities that are prioritized within the company.
Nej
Olsson, Fredrik, and Johan Rickardsson. "Kartstöd och open source desktop-GIS för Tullverket." Thesis, Karlstads universitet, Avdelningen för geografi och turism, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-32994.
Full textBaiao, Manuel Mazanga. "Open source verktygs stöd för centrala egenskaper hos Business Process Management (BPM) system." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15732.
Full textIn a world of developing complex information technologies, companies and organizations need flexible and updated business systems that and match these technological developments. For this reason, commercial BPMS (Business Process Management System) tools have become popular because of their high ability to quickly integrate with business systems in new work environments. An alternative to commercial BPMS tools are the OSS-based (Open Source Software) open source BPMS tools that are available for the public to develop. Since the OSS-based BPMS tools are often new on the market and need further development, the purpose of this paper was to conduct an analysis of open source-based BPMS tools with respect to their various features. Such an analysis increases the understanding of the tools’ functionality and therefore facilitates further development of them. Based on an established analysis model by Delgado et al. (2015), a thematic option for some companies, depending on the characteristics and functionalities that are prioritized within the company. Content analysis was conducted to compare the characteristics of these tools. More specifically, collected documents were analyzed describing the properties of BPMS tools. That way, 6 different BPMS tools were compared based on 13 properties. The analysis showed that Bonitasoft, jBPM and JBPM5 were the most well-developed BPMS tools that supported most of the features. In addition, the analysis demonstrated that tools with fewer features could still be a good option for some companies, depending on the characteristics and functionalities that are prioritized within the company.
Potros, Bashar. "Framställning av mätmetod för att upptäcka defekta luftmunstycken : Framställa en säker och tillförlitlig mätmetod för att mäta mängd vatten i 50 provrör." Thesis, Högskolan i Skövde, Institutionen för ingenjörsvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-14965.
Full textTo detect defective air nozzles, Ecco Finishing AB in Skara has developed a new test equip-ment to replace an unreliable and uncertain existing test machine. Ecco Finishing AB wants to find a reliable and safe measurement method that will measure the amount of water in 50 test tubes. The overall goal of the thesis is to find a precise and repeatable measurement method for level measurement of fluid in the test tubes. Two measurement methods were evaluated that are most suitable for level measurement, vision systems and measurement by weighing. The reason for the choice of these two measurement methods is the test tubes of the test equipment, and that there are many measuring points and because of the small test tubes. Twenty experiments for vision systems and twenty experiments for weighingmethodwere made to evaluate and describe pros and cons. The experiments of vision systems and weighing were first made in the laboratory phase and then tested on the company's existing test equipment. The results of measurements were saved in an Excel sheet used to evaluate collected data. The evaluations were compared to set goals, reliability, accuracy, repeatabil-ity, automatic reporting of results and time of measurement. Vision systems are recom-mended for continued work and implementation on the existing test equipment