Search for dissertations about: "control financial security"

Showing result 1 - 5 of 11 swedish dissertations containing the words control financial security.

  1. 1. Security Allocation in Networked Control Systems

    Author : Anh Tung Nguyen; André Teixeira; Emma Tegling; Uppsala universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Elektroteknik med inriktning mot reglerteknik; Electrical Engineering with specialization in Automatic Control;

    Abstract : Sustained use of critical infrastructure, such as electrical power and water distribution networks, requires efficient management and control. Facilitated by the advancements in computational devices and non-proprietary communication technology, such as the Internet, the efficient operation of critical infrastructure relies on network decomposition into interconnected subsystems, thus forming networked control systems. READ MORE

  2. 2. Information and control in financial markets

    Author : Samuel Lee; Handelshögskolan i Stockholm; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES;

    Abstract : Market Liquidity, Active Investment, and Markets for Information. This paper studies a financial market in which investors choose among investment strategies that exploit information about different fundamentals. On the one hand, the presence of other informed investors generates illiquidity. READ MORE

  3. 3. Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Chris Mitchell; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Cloud Security; Trusted Computing; Trustworthy Clouds; Cloud Audits; Security Automation; SCAP; Virtual Machine; Computer Science; datavetenskap;

    Abstract : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. READ MORE

  4. 4. Generating Optimized and Secure Binary Code

    Author : Rodothea Myrsini Tsoupidi; Elena Troubitsyna; Panagiotis Papadimitratos; Fernando Magno Quintão Pereira; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; constraint programming; code optimization; secure compilation; side-channel attacks; code-reuse attacks; software security; villkorsprogrammering; kodoptimering; säker kompilering; sidokanalsattacker; kodåteranvändningsattacker; mjukvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. READ MORE

  5. 5. Initial Trust Establishment for Heterogeneous Industrial Communication Networks

    Author : Apala Ray; Mats Björkman; Christian Rohner; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Computer Science; datavetenskap;

    Abstract : The severity of cyber threats towards existing and future industrial systems has resulted in an increase of security awareness in the industrial automation domain. Compared to traditional information security, industrial communication systems have different performance and reliability requirements. READ MORE