Search for dissertations about: "secure computing"

Showing result 1 - 5 of 46 swedish dissertations containing the words secure computing.

  1. 1. Secure and Privacy-Preserving Cloud-Assisted Computing

    Author : Georgia Tsaloli; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; differential privacy; decentralization; verifiability; privacy-preservation; secure aggregation; secret sharing; cloud computing; privacy;

    Abstract : Smart devices such as smartphones, wearables, and smart appliances collect significant amounts of data and transmit them over the network forming the Internet of Things (IoT). Many applications in our daily lives (e.g., health, smart grid, traffic monitoring) involve IoT devices that often have low computational capabilities. READ MORE

  2. 2. Secure Service Provisioning in a Public Cloud

    Author : Mudassar Aslam; Mats Björkman; Christian Gehrmann; Ben Smeets; Mälardalens högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; VM migration; trusted platforms; cloud security; IaaS; TPM; Security; Trusted Computing; Virtualization; Cloud Computing; trust; Computer Science; datavetenskap;

    Abstract : The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. READ MORE

  3. 3. Managing Applications and Data in Distributed Computing Infrastructures

    Author : Salman Zubair Toor; Sverker Holmgren; Dirk Düllmann; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Distributed Computing Infrastructures; Grids; Clouds; Application Management; Distributed Storage; Resource Allocation; Beräkningsvetenskap; Scientific Computing;

    Abstract : During the last decades the demand for large-scale computational and storage resources in science has increased dramatically. New computational infrastructures enable scientists to enter a new mode of science, e-science, which complements traditional theory and experiments. READ MORE

  4. 4. Generating Optimized and Secure Binary Code

    Author : Rodothea Myrsini Tsoupidi; Elena Troubitsyna; Panagiotis Papadimitratos; Fernando Magno Quintão Pereira; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; constraint programming; code optimization; secure compilation; side-channel attacks; code-reuse attacks; software security; villkorsprogrammering; kodoptimering; säker kompilering; sidokanalsattacker; kodåteranvändningsattacker; mjukvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology; Informations- och kommunikationsteknik; Information and Communication Technology;

    Abstract : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. READ MORE

  5. 5. Security and Privacy of Sensitive Data in Cloud Computing

    Author : Ali Gholami; Erwin Laure; Seif Haridi; Schahram Dustdar; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cloud Computing; Security; Privacy; Trust; Opertaing System; Computer Science; Datalogi;

    Abstract : Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. READ MORE