Search for dissertations about: "computer security dissertations"

Showing result 1 - 5 of 30 swedish dissertations containing the words computer security dissertations.

  1. 1. Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Chris Mitchell; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Cloud Security; Trusted Computing; Trustworthy Clouds; Cloud Audits; Security Automation; SCAP; Virtual Machine; Computer Science; datavetenskap;

    Abstract : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. READ MORE

  2. 2. Design and Analysis of Self-protection : Adaptive Security for Software Systems

    Author : Charilaos Skandylas; Narges Khakpour; Simin Nadjm-Tehrani; Linnéuniversitetet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Security Analysis; Self-Protection; Self-adaptive Systems; Verification; Information Flow Control; Risk Assessment; Computer Science; Datavetenskap;

    Abstract : Today's software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty.Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence while their consequences are often severe. READ MORE

  3. 3. Usable Security Policies for Runtime Environments

    Author : Almut Herzog; Nahid Shahmehri; Steven Furnell; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Information security; Usability; Java; Resource control; Virtual machine; Computer science; Datavetenskap;

    Abstract : The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. READ MORE

  4. 4. Pre-deployment Analysis of Smart Contracts

    Author : Sundas Munir; Walid Taha; Fritz Henglein; Högskolan i Halmstad; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : Smart contracts are programs that reside and execute on top of blockchains. These programs commonly perform financial transactions and contain the backend logic of several blockchain-supported applications. The presence of errors and bugs in smart contracts poses security threats to the applications they support. READ MORE

  5. 5. Protecting Functional Programs From Low-Level Attackers

    Author : Adriaan Larmuseau; Dave Clarke; Julian Rathke; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Security; Functional Programming; Compilation; Interoperation; Bisimulation; Memory Protection; Datavetenskap; Computer Science;

    Abstract : Software systems are growing ever larger. Early software systems were singular units developed by small teams of programmers writing in the same programming language. Modern software systems, on the other hand, consist of numerous interoperating components written by different teams and in different programming languages. READ MORE