Search for dissertations about: "Information Security java"

Showing result 1 - 5 of 17 swedish dissertations containing the words Information Security java.

  1. 1. Usable Security Policies for Runtime Environments

    Author : Almut Herzog; Nahid Shahmehri; Steven Furnell; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Information security; Usability; Java; Resource control; Virtual machine; Computer science; Datavetenskap;

    Abstract : The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. READ MORE

  2. 2. Secure execution environment for Java electronic services

    Author : Almut Herzog; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Java; security; Residential Gateway; threads; resource control; Computer science; Datavetenskap;

    Abstract : Private homes are becoming increasingly connected to the Internet in fast and reliable ways. These connections pave the way for networked services, i.e. services that gain their value through their connectivity. READ MORE

  3. 3. Towards Development of Safe and Secure Java Card Applets

    Author : Wojciech Mostowski; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; formal methods; Java; formal specification; object-oriented development; formal verification; Dynamic Logic; UML; OCL; Java Card;

    Abstract : This thesis is concerned with different aspects of Java Card application development and use of formal methods in the Java Card world. Java Card is a technology that provides means to program smart (chip) cards with (a subset of) the Java language. READ MORE

  4. 4. Tracking Information Flows in Interactive and Object-Oriented Programs

    Author : Willard Thor Rafnsson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; information security; privacy; static analysis; information flow; program analysis; confidentiality; dependency analysis;

    Abstract : This thesis improves the current state of the art on information-flow control of interactive and object-oriented programs, respectively. Given a policy which specifies which information flows are permitted in a program, the objective here is to ensure that only flows satisfying the policy can occur. READ MORE

  5. 5. Debloating Java Dependencies

    Author : César Soto Valero; Benoit Baudry; Martin Monperrus; Diomidis Spinellis; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Software debloating; software dependencies; Java bytecode; package manager; static program analysis; dynamic program analysis; Datalogi; Computer Science;

    Abstract : Software systems have a natural tendency to grow in size and complexity. A part of this growth comes with the addition of new features or bug fixes, while another part is due to useless code that accumulates over time. READ MORE