National Repository of Grey Literature 30 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Form Processing Platform for Medical Facilities
Šustek, Pavel ; Herout, Adam (referee) ; Szőke, Igor (advisor)
The aim of this thesis is to develop a system for automation and simplification of paper forms processing in cooperation with gerontological facility. The solution is an SaaS system, that provides tools to design paper and digital forms, managing them, fill them online or print it on paper and then automatically process scanned documents via OCR algorithm. It also provides a simple cloud storage and the integration with complex form and survey database Redcap. It is very important to design a user friendly interface and to perform a set of thorough tests with feedback from medical facility. Fundamental used technologies are ASP.NET (MVC) and C\#, Javascript, HTML5, CSS3 and MSSQL. The output of this work should lay the foundations to an ongoing startup.
Proposal of a System Module for Analyzing Visitors
Wawrosz, Tomáš ; Janošík, Petr (referee) ; Luhan, Jan (advisor)
This bachelor thesis propose a prototype of a module, which serves as s tool for a website analysis via heatmaps. The module has been designed on the base of the analysis. The analysis include an analysis of the product itself from both, customer and technical points of view and an analysis of competitors offering similar functionality. This thesis includes proposal of a functional prototype of the module and design of the user interface for the module.
Legal Protection of Cloud Computing
Pecková, Tereza ; Holcová, Irena (advisor) ; Císařová, Zuzana (referee)
Legal Protection of Cloud Computing Abstract The thesis deals with the topic of cloud computing with a particular focus on a contractual regulation of the supply of Software as a Service (SaaS). The aim of this work is to provide an insight into the issue of the obligation arising from the supply of cloud services and the various ways to contractually capture the aspects of the service between provider and user. The first part defines the technology of cloud computing with the focus on one specific model, namely Software as a Service. Furthermore, cloud computing is embedded in the legal framework within the internal legal order and the EU legal order. The second part of the work already analyzes the obligation that arises between the provider and the user of SaaS cloud services which needs to be contractually treated. Attention is paid to the essential requirements concerning contracts, such as the applicable law, liability of the parties, change or termination of the contract, as well as requirements that are specific to the SaaS contracts, such as the issue of incorporating intellectual property rights in SaaS contracts, service level agreement and acceptable use policy. The subject of the third part is an individual topic related to the supply of SaaS services, and that is the issue of data stored on...
Legal Protection of Cloud Computing
Župčanová, Jana ; Holcová, Irena (advisor) ; Dobřichovský, Tomáš (referee)
The aim of the thesis is to examine the areas of cloud computing that presuppose legal regulation and to describe the existing level of this regulation in the Czech Republic. I focus on the issue of copyright and I also deal with the question of whether it is necessary to overcome the common understanding of copyrighted works as unassignable among things in the sense of law. The attention is drawn to two European directives dealing with the provision of digital content, digital content services and the sale of goods with digital elements that lack transposition. Last but not least, I ask whether it is necessary to conclude a license agreement for the provision of software via cloud. I want to contribute with my thesis to raising the legal awareness of SaaS users and providers. At the same time, my work can help students and practicing lawyers interested in the legal regulation of this area. With the chapter on the amendment to the Civil Code I would also like to address the legislative authorities with a contribution to the current discussion on the legal qualification of data. When studying the topic, I relied primarily on the relevant Czech literature, books on the subject of copyright and IT law, annotated legislative acts, academic articles and relevant case law. Using the descriptive method,...
Form Processing Platform for Medical Facilities
Šustek, Pavel ; Herout, Adam (referee) ; Szőke, Igor (advisor)
The aim of this thesis is to develop a system for automation and simplification of paper forms processing in cooperation with gerontological facility. The solution is an SaaS system, that provides tools to design paper and digital forms, managing them, fill them online or print it on paper and then automatically process scanned documents via OCR algorithm. It also provides a simple cloud storage and the integration with complex form and survey database Redcap. It is very important to design a user friendly interface and to perform a set of thorough tests with feedback from medical facility. Fundamental used technologies are ASP.NET (MVC) and C\#, Javascript, HTML5, CSS3 and MSSQL. The output of this work should lay the foundations to an ongoing startup.
Search as a Service
Veselý, Luděk ; Molnár, Zdeněk (advisor) ; Jelínek, Ivan (referee)
This thesis is focused on design and implementation of fulltext searching, which is provided as a servise. The searching itself is focused on the utilization in e-shops. At the beginning, the question of e-commerce is analysed, the related terms are explained and the requirements of searching are identified. Then, the theoretical ways of text searching in this context are described. On the analyse is created a conception of application, which is further implemented in the language Go with the usage of Elasticresearch. Finally, the application is tested, which should examine not only the quality and speed of searching but also the user-friendliness.
Copyright protection of software, software as a servis
Kalabza, Viktor ; Holcová, Irena (advisor) ; Křesťanová, Veronika (referee)
This diploma thesis describes Czech legislation on copyright protection of computer programs in European and international law context. The commentary is mostly focused on current, practical issues, which often aren't clearly and satisfactorily solved, or issues which are subjects of current or recent litigations before European courts. First chapter introduces special characteristics of computer programs in copyright law, shortly mentions other possibilities of their legal protection and outlines some problems connected with massive technology development and international dimension of these questions, which are enlarged in following chapters. It also defines basic terminology used in the thesis. Chapter two, called "Sources of international and European law" mainly focuses on international treaties and EU directives, on which current Czech copyright protection of computer programs is based. Following chapter describes Czech copyright protection of computer programs, respecting, in general, structure of Czech Copyright Act and simultaneously gives deeper look into selected up to date problems. It compares computer programs with traditional copyrighted works, explains i.a. concept of "employee's work" and closely focuses on author's moral and, mainly, economic rights. Special attention is dedicated...
Proposal of a System Module for Analyzing Visitors
Wawrosz, Tomáš ; Janošík, Petr (referee) ; Luhan, Jan (advisor)
This bachelor thesis propose a prototype of a module, which serves as s tool for a website analysis via heatmaps. The module has been designed on the base of the analysis. The analysis include an analysis of the product itself from both, customer and technical points of view and an analysis of competitors offering similar functionality. This thesis includes proposal of a functional prototype of the module and design of the user interface for the module.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.

National Repository of Grey Literature : 30 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.