Search for dissertations about: "Secure Data Collection"
Showing result 1 - 5 of 28 swedish dissertations containing the words Secure Data Collection.
-
1. Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems
Abstract : Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. READ MORE
-
2. Secure and Privacy-Aware Data Collection in Wireless Sensor Networks
Abstract : A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it. READ MORE
-
3. Developing Secure Software : in an Agile Process
Abstract : Background: Software developers are facing increased pressure to lower development time, release new software versions more frequent to customers and to adapt to a faster market. This new environment forces developers and companies to move from a plan based waterfall development process to a flexible agile process. READ MORE
-
4. Engineering Privacy for Mobile Health Data Collection Systems in the Primary Care
Abstract : Mobile health (mHealth) systems empower Community Health Workers (CHWs) around the world, by supporting the provisioning of Community-Based Primary Health Care (CBPHC) – primary care outside the health facility into people’s homes. In particular, Mobile Health Data Collection Systems (MDCSs) are used by CHWs to collect health-related data about the families that they treat, replacing paper-based approaches for health surveys. READ MORE
-
5. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings
Abstract : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. READ MORE