Search for dissertations about: "information security 2014"

Showing result 1 - 5 of 31 swedish dissertations containing the words information security 2014.

  1. 1. Tool Support for Enterprise Architecture Analysis : with application in cyber security

    Author : Markus Buschle; Pontus Johnson; Stephan Aier; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Enterprise Architecture; Decision-making; Model-based analysis; Property analysis; Cyber security; Software tool; Design Science; Electrical Engineering; Elektro- och systemteknik;

    Abstract : In today’s companies, business processes and information technology areinterwoven. Old and new systems as well as off-the-shelf products and tailoredsolutions are used. This results in heterogeneous, often complex ITlandscapes. The impact of changes and the affected systems are difficult toidentify. READ MORE

  2. 2. A Framework and Calculation Engine for Modeling and Predicting the Cyber Security of Enterprise Architectures

    Author : Hannes Holm; Mathias Ekstedt; Robert Lagerström; Göran Ericsson; Ketil Stølen; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Computer security; security metrics; vulnerability assessment; attack graphs; risk management; architecture modeling; Enterprise Architecture; Cybersäkerhet; säkerhetsmetriker; sårbarhetsanalys; attackgrafer; riskhantering; arkitekturmodellering; organisationsövergripande arkitektur;

    Abstract : Information Technology (IT) is a cornerstone of our modern society and essential for governments' management of public services, economic growth and national security. Consequently, it is of importance that IT systems are kept in a dependable and secure state. READ MORE

  3. 3. An Information Flow Approach to Fault-Tolerant Security and Information Erasure

    Author : Filippo Del Tedesco; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Fault Tolerance; Information Erasure; Information flow security;

    Abstract : Sensitive information is a crucial asset for both individuals and companies. Since it is processed in a largely automated way, it is important that the computational infrastructures are equipped with methods for reasoning about and enforcing security policies. Information flow security has been proposed for this purpose in many contexts. READ MORE

  4. 4. Bringing Visibility in the Clouds : using Security, Transparency and Assurance Services

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Chris Mitchell; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; Cloud Security; Trusted Computing; Trustworthy Clouds; Cloud Audits; Security Automation; SCAP; Virtual Machine; Computer Science; datavetenskap;

    Abstract : The evolution of cloud computing allows the provisioning of IT resources over the Internet and promises many benefits for both - the service users and providers. Despite various benefits offered by cloud based services, many users hesitate in moving their IT systems to the cloud mainly due to many new security problems introduced by cloud environments. READ MORE

  5. 5. Communication With Reconstruction and Privacy Constraints

    Author : Kittipong Kittichokechai; Mikael Skoglund; Tobias J. Oechtering; Sennur Ulukus; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; source coding; channel coding; information privacy; physical layer security; action; side information; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Communication networks are an integral part of the Internet of Things (IoT) era. They enable endless opportunities for connectivity in a wide range of applications, leading to advances in efficiency of day-to-day life. While creating opportunities, they also incur several new challenges. READ MORE