Search for dissertations about: "Unauthorized access"

Showing result 1 - 5 of 11 swedish dissertations containing the words Unauthorized access.

  1. 1. Privacy-aware Use of Accountability Evidence

    Author : Jenni Reuben; Simone Fischer-Hübner; Siani Pearson; Karlstads universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Privacy; accountability; audit; evidence; system traces; provenance; access control; privacy compliance; security; Computer Science; Datavetenskap;

    Abstract : This thesis deals with the evidence that enable accountability, the privacy risks involved in using them and a privacy-aware solution to the problem of unauthorized evidence disclosure. Legal means to protect privacy of an individual is anchored on the data protection perspective i.e., on the responsible collection and use of personal data. READ MORE

  2. 2. Query authentication and data confidentiality in wireless sensor networks

    Author : Ioana Rodhe; Christian Rohner; Per Gunningberg; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Datavetenskap med inriktning mot datorkommunikation; Computer Science with specialization in Computer Communication;

    Abstract : In this thesis we consider different aspects of security in sensor networks, in particular query authentication and confidential data aggregation. Authenticating the queries is important so attackers cannot modify existing queries because this would lead to wrong readings; or insert new queries into the network because this would lead to waste of energy. READ MORE

  3. 3. Struggles over conservation space : Social justice in the iSimangaliso Wetland Park, South Africa

    Author : Melissa Hansen; LUCSUS; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Agency; capabilities; human development; the politics of sustainability; the production of space; protected areas; rights and resistance; South Africa; struggles;

    Abstract : In the past several decades under a growing influence of ecological modernisation, various assumed ‘win-win’ approaches to protected area conservation and poverty alleviation have been introduced all over the world, especially in resource-rich developing countries. Yet protected area conservation is an inherently political process, and the goals are often not achieved. READ MORE

  4. 4. On Secure and Sequential Source Coding

    Author : Hamid Ghourchian; Mikael Skoglund; Tobias J. Oechtering; Michèle Wigger; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Secure source coding is an important research area in recent years as it deals with the problem of transmitting sensitive information over insecure channels while protecting it from unauthorized access. This is particularly relevant in the context of modern communication systems where the data transmitted is often sensitive in nature and the threat of eavesdropping or data breaches is high. READ MORE

  5. 5. Secure and Privacy-Aware Data Collection in Wireless Sensor Networks

    Author : Ioana Rodhe; Christian Rohner; Per Gunningberg; Roberto Di Pietro; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Secure Data Collection; Key Distribution; Location Privacy; Quality of Information; Wireless Sensor Networks; Datavetenskap med inriktning mot datorkommunikation; Computer Science with specialization in Computer Communication;

    Abstract : A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it. READ MORE