Search for dissertations about: "Security design"
Showing result 1 - 5 of 322 swedish dissertations containing the words Security design.
-
1. ”Sketch and Talk”, Drawing lines between incarcerated humans, the interior, and “stuff”. Design methodologies for (well)-being in prisons, youth homes and psychiatric hospitals
Abstract : With increasing global and local incarceration, the demand for prison beds is rapidly growing. The Swedish government’s plans for implementing youth prisons and amending laws regarding young people’s sentences risk increasing the already high numbers of mental health problems. READ MORE
-
2. Same needs but different meanings. A comparison and analysis of the individual assistive mobility transfer device needs of four different categories of users
Abstract : The purpose of this licentiate thesis is to contribute to the knowledge about user needs for individual mobility assistive technology (AT) transfer devices. Two qualitative user studies, which were part of a design project, constitute the empirical data. READ MORE
-
3. Security-Driven Design of Real-Time Embedded Systems
Abstract : Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very common to find them in safety and security critical applications, such as transportation and medical equipment. READ MORE
-
4. Tailoring information security policies : a computerized tool and a design theory
Abstract : Protecting information assets in organizations is a must and one way for doing it is developing information security policy (ISP) to direct employees’ behavior and define acceptable procedures that employees have to comply with on a daily basis. However, compliance with the ISP is a perennial problem. READ MORE
-
5. Design and Security Analysis of TRNGs and PUFs
Abstract : True Random Number Generators (TRNGs) and Physical Unclonable Functions (PUFs) are two important types of cryptographic primitives. TRNGs create a hardware-based, non-deterministic noise that is often used for generating keys, initialization vectors, and nonces for various applications that require cryptographic protection. READ MORE