Search for dissertations about: "computing security"

Showing result 1 - 5 of 87 swedish dissertations containing the words computing security.

  1. 1. CryptoNET : Generic Security Framework for Cloud Computing Environments

    Author : Abdul Ghafoor Abbasi; Sead Muftic; Antonio F. Gómez Skarmeta; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Generic Security Object; CryptoNET; Security; Framework; Information technology; Informationsteknologi; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. READ MORE

  2. 2. Security and Privacy of Sensitive Data in Cloud Computing

    Author : Ali Gholami; Erwin Laure; Seif Haridi; Schahram Dustdar; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cloud Computing; Security; Privacy; Trust; Opertaing System; Computer Science; Datalogi;

    Abstract : Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. READ MORE

  3. 3. Modeling and Tuning Security from a Quality of Service Perspective

    Author : Stefan Lindskog; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; network security; quality of service QoS ; tunable security; dependability; security service; data protection; security evaluation; Datavetenskap; Computer Science;

    Abstract : Security has traditionally been thought of as a system or network attribute that was the result of the joint endeavors of the designer, maintainer and user, among others. Even though security can never reach a level of 100%, the aim has been to provide as much security as possible, given the boundary conditions in question. With the advent of, e.g. READ MORE

  4. 4. Secure Service Provisioning in a Public Cloud

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Ben Smeets; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; VM migration; trusted platforms; cloud security; IaaS; TPM; Security; Trusted Computing; Virtualization; Cloud Computing; trust; Computer Science; datavetenskap;

    Abstract : The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. READ MORE

  5. 5. Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Chris Mitchell; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Cloud Security; Trusted Computing; Trustworthy Clouds; Cloud Audits; Security Automation; SCAP; Virtual Machine; Computer Science; datavetenskap;

    Abstract : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. READ MORE