Search for dissertations about: "Security Monitor"

Showing result 1 - 5 of 43 swedish dissertations containing the words Security Monitor.

  1. 1. Tracking Dependencies for Security and Privacy

    Author : Arnar Birgisson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Programming Languages; Software Security; Web Security;

    Abstract : Information Flow Control is a well established field of research, providing asuite of theoretical and practical results. However, adoption to real worldsystems has yet to catch up. This thesis seeks to expand the boundaries ofthis field, in particular with the aim of making Information Flow Control moreapplicable to real world scenarios. READ MORE

  2. 2. A framework and theory for cyber security assessments

    Author : Teodor Sommestad; Mathias Ekstedt; Ruth Breu; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; cyber security; security assessment; vulnerability assessment; architecture modeling; enterprise architecture;

    Abstract : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. READ MORE

  3. 3. Security and Privacy of Sensitive Data in Cloud Computing

    Author : Ali Gholami; Erwin Laure; Seif Haridi; Schahram Dustdar; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cloud Computing; Security; Privacy; Trust; Opertaing System; Computer Science; Datalogi;

    Abstract : Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. READ MORE

  4. 4. Secure System Virtualization : End-to-End Verification of Memory Isolation

    Author : Hamed Nemati; Mads Dam; Gustavo Betarte; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Platform Security; Hypervisor; Formal Verification; Theorem Proving; HOL4; Cache attack; Security Monitor; Information Flow; Computer Science; Datalogi;

    Abstract : Over the last years, security-kernels have played a promising role in reshaping the landscape of platform security on embedded devices. Security-kernels, such as separation kernels, enable constructing high-assurance mixed-criticality execution platforms on a small TCB, which enforces isolation between components. READ MORE

  5. 5. Lightweight Inlined Reference Monitors for Securing Extensible and Open Systems

    Author : Phu Phung; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Security; Inlined Reference Monitors; JavaScript; Vehicle Software Security;

    Abstract : This thesis studies an alternative implementation of asecurity reference monitor in the contexts of extensible and opensystems. A security reference monitor is a classic approach to imposing asecurity policy on an otherwise untrusted system by using a trusted componentwhich intercepts security-relevant resource requests and applies a securitypolicy to decide whether to grant such requests. READ MORE