Search for dissertations about: "information integrity"

Showing result 1 - 5 of 212 swedish dissertations containing the words information integrity.

  1. 1. Semantic Information and Information Security : Definitional Issues

    Author : Björn Lundgren; Niklas Möller; Sven Ove Hansson; Stjernberg Fredrik; KTH; []
    Keywords : HUMANIORA; HUMANITIES; definitions; distinctions; philosophy of information; philosophy of risk; security; information; information security; semantics; semantic information; veridicality thesis; informativity; RIGHT; CIA; Philosophy; Filosofi;

    Abstract : This licentiate thesis consist of two separate research papers which concern two tangential topics – that of semantic information and that of information security. Both topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. READ MORE

  2. 2. Information-Flow Tracking for Dynamic Languages

    Author : Luciano Bello; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; information security; information integrity; dependency analysis; information confidentiality; information flow; privacy;

    Abstract : This thesis explores information-flow tracking technologies and their applicability on industrial-scale dynamic programming languages. We aim to narrow the gap between the need for flexibility in current dynamic languages and the solid well-studied mechanisms from academia. READ MORE

  3. 3. Making the Dead Alive : Dynamic Routines in Risk Management

    Author : Martin Lundgren; Åsa Ericson; Johan Holmqvist; Stewart James Kowalski; Luleå tekniska universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Risk management; information security; routine; practice; asset identification; risk analysis; risk treatment; organizational aspects; Information systems; Informationssystem; Centrumbildning - Centrum för säkerhet i samhälle och kritiska infrastrukturer CISS ; Centre - Centre for Critical Infrastructure and Societal Security CISS ;

    Abstract : Risk management in information security is relevant to most, if not all, organizations. It is perhaps even more relevant considering the opportunities offered by the digitalization era, where reliably sharing, creating, and consuming information has become a competitive advantage, and information has become an asset of strategic concern. READ MORE

  4. 4. Secure and Privacy-Preserving Cloud-Assisted Computing

    Author : Georgia Tsaloli; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; differential privacy; decentralization; verifiability; privacy-preservation; secure aggregation; secret sharing; cloud computing; privacy;

    Abstract : Smart devices such as smartphones, wearables, and smart appliances collect significant amounts of data and transmit them over the network forming the Internet of Things (IoT). Many applications in our daily lives (e.g., health, smart grid, traffic monitoring) involve IoT devices that often have low computational capabilities. READ MORE

  5. 5. Cryptographic Tools for Privacy Preservation

    Author : Carlo Brunetta; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Outsourced Computation; Verifiability; Cryptography; Privacy; Cloud Computing;

    Abstract : Data permeates every aspect of our daily life and it is the backbone of our digitalized society. Smartphones, smartwatches and many more smart devices measure, collect, modify and share data in what is known as the Internet of Things. READ MORE