Search for dissertations about: "confidential"

Showing result 1 - 5 of 31 swedish dissertations containing the word confidential.

  1. 1. High-level Programming on Low-level Platforms: Two Domain-specific Languages based on Haskell

    Author : Robert Krook; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Embedded Domain-specific Languages; Haskell; Confidential Computing; TEE;

    Abstract : In this thesis, we describe our research on how to program low-level platforms with high-level languages. As an example, consider applications that run on microcontrollers. Such applications may need to specify precise temporal behavior, carefully manage power usage, and handle cryptographic keys. READ MORE

  2. 2. Secrecy for mobile implementations of security protocols

    Author : Pablo Giambiagi; KTH; []
    Keywords : ;

    Abstract : Mobile code technology offers interesting possibilities tothe practitioner, but also raises strong concerns aboutsecurity. One aspect of security is secrecy, the preservationof confidential information. READ MORE

  3. 3. Securing Interactive Systems

    Author : Willard Thor Rafnsson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; program analysis; concurrency; multi-threading; covert channels; semantics-based security; language-based security; information-flow security; runtime enforcement; parallelism; scheduling; program transformation; information-flow control; fairness;

    Abstract : This thesis provides means to achieve end-to-end information-flow security in interactive systems. The elusiveness of this problem stems from the fact that interaction patterns, primitives, synchronous communication and nondeterminism combine in ways where seemingly innocuous systems compromise security in unexpected ways under interaction. READ MORE

  4. 4. An Efficient Access Control Method for Resource Constrained Embedded Systems

    Author : Pablo Punal; Panos Papadimitratos; Luleå tekniska universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Industriell elektronik; Industrial Electronics;

    Abstract : The way to communicate and distribute the information in Wireless Sensor Networks (WSN) is constantly under evolution; at beginning the networks sent the information using proprietary protocols; but today, using IP protocol has become widely used to improve the interoperability and to standardize. These nodes often are constrained re- source devices and are not able to use the same mechanisms that a normal computer uses, because the processing performance and memory capacity are smaller than a nor- mal computer. READ MORE

  5. 5. Open book accounting and resource interdependencies : The case of capital equipment sales

    Author : Christoph Schneider; Handelshögskolan i Stockholm; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES;

    Abstract : Over the past few decades, firms have arguably become more dependent on each other. On average, purchased products and services account for more than 50 % of the total cost of large firms. In addition, they have become more complex, requiring closer co-operations between buyers and suppliers. READ MORE