Search for dissertations about: "DAM POLICY"

Showing result 1 - 5 of 9 swedish dissertations containing the words DAM POLICY.

  1. 1. Inlined Reference Monitors : Certification,Concurrency and Tree Based Monitoring

    Author : Andreas Lundblad; Mads Dam; Gul Agha; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Runtime monitoring; policy enforcement; tree automata; monitor inlining; certification; concurrency;

    Abstract : Reference monitor inlining is a technique for enforcing security policies by injecting security checks into the untrusted software in a style similar to aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), without adding behavior (conservativity) or affecting existing policy compliant behavior (transparency). READ MORE

  2. 2. Logics for Information Flow Security:From Specification to Verification

    Author : Musard Balliu; Mads Dam; David Naumann; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Computer Science; Datalogi;

    Abstract : Software is becoming  increasingly  ubiquitous and today we find software running everywhere. There is software driving our favorite  game  application or  inside the web portal we use to read the morning  news, and   when we book a vacation. READ MORE

  3. 3. Algorithmic Verification Techniques for Mobile Code

    Author : Irem Aktug; Dilian Gurov; Mads Dam; Ulfar Erlingsson; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Verification; Mobile Code Security; Reference Monitoring; Maximal Models; Compositional Verification; Theoretical computer science; Teoretisk datalogi;

    Abstract : Modern computing platforms strive to support mobile code without putting system security at stake. These platforms can be viewed as open systems, as the mobile code adds new components to the running system. Establishing that such platforms function correctly can  be divided into two steps. READ MORE

  4. 4. Towards a Trustworthy Stack: Formal Verification of Low-Level Hardware and Software

    Author : Ning Dong; Roberto Guanciale; Mads Dam; Magnus Myreen; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Formal Verification; Information Flow; Refinement; Interactive Theorem Prover; HOL4; Serial Interface; Pipelined Processor; Microarchitecture; Out-of-order Execution; Formell Verifiering; Informationsflöde; Förfining; Interaktiva Bevisprogrammet; HOL4; Seriellt Gränssnitt; Pipelined Processor; Mikroarkitektur; Omordnad Exekvering; Datalogi; Computer Science;

    Abstract : Computer systems, consisting of hardware and software, have gained significant importance in the digitalised world. These computer systems rely on critical components to provide core functionalities and handle sensitive data. READ MORE

  5. 5. Civil Resistance in the Shadow of War : Explaining popular mobilization against dams in Myanmar

    Author : Kyungmee Kim; Ashok Swain; Jonathan Hall; Dan Banik; Uppsala universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Civil resistance; social movement; mobilization; armed conflict; hydropower; dam; identity; indigenous communities; Myanmar; Kachin; Karen; Ta’ang; Statskunskap; Political Science;

    Abstract : Why do some conflict-affected communities collectively resist dam-building while others do not? State-backed development projects such as hydropower dams have been the subject of societal resistance in countries around the world. In armed conflict areas, local populations who organize nonviolent resistance through collective action against these high-impact projects face additional challenges, such as being targeted for violence and coercion by the authorities. READ MORE