Search for dissertations about: "erasure policies"

Found 5 swedish dissertations containing the words erasure policies.

  1. 1. Information Erasure: An Information-Flow Approach to Semantics and Enforcement

    Author : Filippo Del Tedesco; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; erasure policies; erasure; information flow; enforcement; Python; security;

    Abstract : Many modern online services require sensitive data to complete their tasks. For this reason, guaranteeing security policies in such services is a major concern. The traditional (and well studied) aspects of security, namely confidentiality, integrity, and availability of data, capture many but not all desirable policies involving sensitive-data. READ MORE

  2. 2. An Information Flow Approach to Fault-Tolerant Security and Information Erasure

    Author : Filippo Del Tedesco; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Fault Tolerance; Information Erasure; Information flow security;

    Abstract : Sensitive information is a crucial asset for both individuals and companies. Since it is processed in a largely automated way, it is important that the computational infrastructures are equipped with methods for reasoning about and enforcing security policies. Information flow security has been proposed for this purpose in many contexts. READ MORE

  3. 3. Distributed Coded Caching with Application to Content Delivery in Wireless Networks

    Author : Jesper Pedersen; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; machine learning; erasure correcting codes; optimization; Caching; device-to-device communication; content delivery networks; time-to-live;

    Abstract : The amount of content downloaded to mobile devices, mainly driven by the demand for video content, threatens to completely congest wireless networks and the trend of ever increasing video traffic is expected to continue unabated for many years. A promising solution to this problem is to store popular content closer to end users, effectively trading expensive bandwidth resources for affordable memory, a technique known as caching. READ MORE

  4. 4. The Blurring Politics of Cyber Conflict : A Critical Study of the Digital in Palestine and Beyond

    Author : Fabio Cristiano; Statsvetenskapliga institutionen; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; cybersecurity; cyberspace; violence; sovereignty; territory; infrastructure; digital rights; Palestine;

    Abstract : This thesis explores how the politics of cyber conflict redefine violence, sovereignty, and territory in and through cyberspace. It does this by studying how the digital mediates different facets and experiences of conflict and security in Palestine. READ MORE

  5. 5. Performance and Optimization Aspects of Time Critical Networking

    Author : Emmanouil Fountoulakis; Nikolaos Pappas; Vangelis Angelakis; Qi Liao; Ness B. Shroff; Linköpings universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Abstract : 5G and beyond networks are driven by the vision of the Internet of Things and mission-critical communications that have time-sensitive applications requiring low latency. These new, related to the previous network generations, requirements are challenging and they have a technical impact on the design of communication networks and classical networks cannot support such requirements. READ MORE