Search for dissertations about: "multi level security"

Showing result 1 - 5 of 33 swedish dissertations containing the words multi level security.

  1. 1. Parks, Policies and People : Nature Conservation Governance in Post-Socialist EU Countries

    Author : Natalya Yakusheva; Björn Hassler; Magnus Boström; Annica Kronsell; Stacy Vandeveer; Södertörns högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; national parks; Carpathians; Poland; Slovakia; Europeanization; Central Eastern Europe; multi-level governance; Environmental Studies; Miljövetenskapliga studier; Östersjö- och Östeuropaforskning; Baltic and East European studies;

    Abstract : The national parks in the Carpathian Mountains along the Polish and Slovak border represent encompassing policy agendas that strive to balance biodiversity conservation and social welfare tasks. These countries have, during the last 25 years, undergone rapid transformation from socialist regimes to liberal democracies, and this transformation has affected the political, social and economic spheres. READ MORE

  2. 2. Societal risk and safety management : Policy diffusion, management structures and perspectives at the municipal level in Sweden

    Author : Anna Johansson; Inge Svedung; Ragnar Andersson; Diana Stark-Ekman; Karlstads universitet; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; societal risk and safety management; risk management; safety management; safety work; risk governance; policy implementation; planning; injury; accident; risk; safety; security; health; public health; prevention; promotion.; Public Health Science; Folkhälsovetenskap;

    Abstract : This compilation thesis investigates risk and safety management at the Swedish local governmentallevel. It sets special focus on municipal implementation of overall international and nationalstrategies and objectives regarding holistic, cross-sectorial and multi-strategic risk and safetywork, and the prevention of accidents and injuries. READ MORE

  3. 3. Applying Simulation to the Problem of Detecting Financial Fraud

    Author : Edgar Alonso Lopez-Rojas; Stefan Axelsson; Thomas Walmann; Blekinge Tekniska Högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security; privacy; anonymisation; multi-agent-based simulation; MABS; ABS; retail store; fraud detection; synthetic data; mobile money;

    Abstract : This thesis introduces a financial simulation model covering two related financial domains: Mobile Payments and Retail Stores systems. The problem we address in these domains is different types of fraud. We limit ourselves to isolated cases of relatively straightforward fraud. READ MORE

  4. 4. Contributions to Web Authentication for Untrusted Computers

    Author : Anna Vapen; Nahid Shahmehri; Simone Fischer-Hübner; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Authentication; security levels; identity management; 2-clickAuth; information security; Computer science; Datalogi;

    Abstract : Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas password-based authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. READ MORE

  5. 5. Realizing Low-Latency Packet Processing on Multi-Hundred-Gigabit-Per-Second Commodity Hardware : Exploit Caching to Improve Performance

    Author : Alireza Farshin; Dejan Kostic; Gerald Q. Maguire Jr.; Mark Silberstein; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Low-Latency Internet Services; Packet Processing; Network Functions Virtualization; Middle Boxes; Commodity Hardware; Multi-Hundred-Gigabit-Per-Second; Low-Level Optimization; Internettjänster med Låg Fördröjning; Paketbearbetning; Virtualisering av Nätverksfunktioner; Mellanutrustning; Tillgänglig Datorhårdvara; Flera-Hundra-Gigabit-Per-Sekund; Lågnivå-Optimering; Datalogi; Computer Science; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : By virtue of the recent technological developments in cloud computing, more applications are deployed in the cloud. Among these modern cloud-based applications, many societal applications require bounded and predictable low-latency responses. READ MORE