National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Data Integration into a CRM System
Pořízek, David ; Bartík, Vladimír (referee) ; Kolář, Dušan (advisor)
Práce se zabývá analýzou firemního CRM systému se zaměřením na integraci externích dat. Na základě výsledků práce je navržena aplikace, která zjednodušuje zpracování dat a zpřístupňuje ji běžným uživatelům z řad zákazníků firmy. Návrh aplikace vychází z existujících omezení a požadavků firmy. Aplikace je následně implementována tak, aby předešla většině chyb, které mohou nastat při přípravě a zpracování zdrojových dat.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Využitie blockchainu pre ověrenie dát v rámci konceptu metaverza
Gono, Andrej
The thesis deals with the design and creation of a solution for data verifi- cation and storage via blockchain. It also discusses how data can be stored and transmitted in a virtual metaverse environment, and whether blockchain can be used in this area. The work includes an extensive analysis of existing solutions and trends in this area. The concept of metaverse is treated rather theoretically in the thesis. The practical part of the thesis deals with the implementation of an application for data storage and verification using blockchain, which mainly focuses on user-friendliness and speed.
Data Integration into a CRM System
Pořízek, David ; Bartík, Vladimír (referee) ; Kolář, Dušan (advisor)
Práce se zabývá analýzou firemního CRM systému se zaměřením na integraci externích dat. Na základě výsledků práce je navržena aplikace, která zjednodušuje zpracování dat a zpřístupňuje ji běžným uživatelům z řad zákazníků firmy. Návrh aplikace vychází z existujících omezení a požadavků firmy. Aplikace je následně implementována tak, aby předešla většině chyb, které mohou nastat při přípravě a zpracování zdrojových dat.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.