Search for dissertations about: "computer security dissertations"
Showing result 1 - 5 of 30 swedish dissertations containing the words computer security dissertations.
-
1. Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services
Abstract : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. READ MORE
-
2. Design and Analysis of Self-protection : Adaptive Security for Software Systems
Abstract : Today's software landscape features a high degree of complexity, frequent changes in requirements and stakeholder goals, and uncertainty.Uncertainty and high complexity imply a threat landscape where cybersecurity attacks are a common occurrence while their consequences are often severe. READ MORE
-
3. Usable Security Policies for Runtime Environments
Abstract : The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. READ MORE
-
4. Pre-deployment Analysis of Smart Contracts
Abstract : Smart contracts are programs that reside and execute on top of blockchains. These programs commonly perform financial transactions and contain the backend logic of several blockchain-supported applications. The presence of errors and bugs in smart contracts poses security threats to the applications they support. READ MORE
-
5. Protecting Functional Programs From Low-Level Attackers
Abstract : Software systems are growing ever larger. Early software systems were singular units developed by small teams of programmers writing in the same programming language. Modern software systems, on the other hand, consist of numerous interoperating components written by different teams and in different programming languages. READ MORE