Search for dissertations about: "thesis in security database"
Showing result 1 - 5 of 20 swedish dissertations containing the words thesis in security database.
-
1. Innovative Security Business : Innovation, Standardization, and Industry Dynamics in the Swedish Security Sector, 1992–2012
Abstract : The overall aim of this dissertation is to generate new knowledge on innovation output and standardization in industries where innovation output typically is considered sparse. This is done through the longitudinal study of the Swedish security guard industry and security sector 1992-2012. READ MORE
-
2. CryptoNET : Generic Security Framework for Cloud Computing Environments
Abstract : The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. READ MORE
-
3. Security of Electricity Supply in Power Systems : Establishing a Global Framework for Assessing Power System Health and Analyzing Outage Statistics in Sweden
Abstract : The primary objective of this thesis is to enhance the security of electricity supply by providing a holistic perspective and introducing a comprehensive framework for assessing power system health. This novel approach aims for a thorough evaluation of the system’s overall performance and well-being, using the physical dimensions of the security of supply as the foundation for a power system health index. READ MORE
-
4. Architecting Smart Home Environments for Healthcare : A Database-Centric Approach
Abstract : The development of system architectures and applications for smart homes and ambient assisted living has been the main activity of a number of academic and industrial research projects around the world. Existing system architectures for smart environments usually employ different architectural styles in a multi-layer logical architecture to support the integration and interoperation of heterogeneous hardware and software technologies, which are subsequently used to provide two major functionalities: monitoring and assistance. READ MORE
-
5. Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation
Abstract : The first part of this thesis describes the results of applying dependability methods to the security area. A uniform taxonomy for security, expected to contain all characteristic attributes, is presented. This taxonomy will hopefully increase the understanding of security issues. READ MORE