Search for dissertations about: "security as service"
Showing result 1 - 5 of 127 swedish dissertations containing the words security as service.
-
1. Modeling and Tuning Security from a Quality of Service Perspective
Abstract : Security has traditionally been thought of as a system or network attribute that was the result of the joint endeavors of the designer, maintainer and user, among others. Even though security can never reach a level of 100%, the aim has been to provide as much security as possible, given the boundary conditions in question. With the advent of, e.g. READ MORE
-
2. Innovative Security Business : Innovation, Standardization, and Industry Dynamics in the Swedish Security Sector, 1992–2012
Abstract : The overall aim of this dissertation is to generate new knowledge on innovation output and standardization in industries where innovation output typically is considered sparse. This is done through the longitudinal study of the Swedish security guard industry and security sector 1992-2012. READ MORE
-
3. Web Application Content Security
Abstract : The web has become ubiquitous in modern lives. People go online to stay in contact with their friends or to manage their bank account. With lots of different sensitive information handled by web applications securing them naturally becomes important. READ MORE
-
4. Secure Service Provisioning in a Public Cloud
Abstract : The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. READ MORE
-
5. Towards Measurable and Tunable Security
Abstract : Many security services today only provides one security configuration at run-time, and cannot then utilize the trade-off between performance and security. In order to make use of this trade-off, tunable security services providing several security configurations that can be selected at run-time are needed. READ MORE