Search for dissertations about: "security enforcement"

Showing result 1 - 5 of 45 swedish dissertations containing the words security enforcement.

  1. 1. Dynamic enforcement of decentralized security policies

    Author : Jonas Magazinius; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; dynamic; enforcement; security; policies; decentralized;

    Abstract : This thesis explores defining security policies in a decentralized setting and dynamic methods of enforcing such policies. In a decentralized setting, principals are free to trust or distrust other principals. The key challenge is to provide possibilities for expressing and enforcing expressive decentralized policies. READ MORE

  2. 2. Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software

    Author : Phu Phung; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; security policy enforcement; JavaScript security; web-application security; vehicle software security; untrusted software;

    Abstract : This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of the approach is that it is lightweight in the sense that it does not need an additional policy language or extra tool. READ MORE

  3. 3. Information Erasure: An Information-Flow Approach to Semantics and Enforcement

    Author : Filippo Del Tedesco; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; erasure policies; erasure; information flow; enforcement; Python; security;

    Abstract : Many modern online services require sensitive data to complete their tasks. For this reason, guaranteeing security policies in such services is a major concern. The traditional (and well studied) aspects of security, namely confidentiality, integrity, and availability of data, capture many but not all desirable policies involving sensitive-data. READ MORE

  4. 4. Security in Physical Distribution - Causes, mitigation measures and an investment model

    Author : Luca Urciuoli; Teknisk logistik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security investments.; security measures in supply chains; causes of security vulnerability; antagonistic risks; security; physical distribution;

    Abstract : Recent statistics and terror events testify an increased vulnerability of distribution networks. Antagonistic threats as theft, counterfeiting, contamination and terror are burdening supply chains with unexpected costs in form of lost cargo, production downtimes, lower customer satisfaction, and higher transportation costs. READ MORE

  5. 5. Content Security for Web Applications

    Author : Daniel Hausknecht; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; content security policy; web security; browser security; empirical study;

    Abstract : This thesis puts the focus on security problems related to web applications and web browsers by analyzing real-world web applications and modern client-side security mechanisms. For the latter, we mostly look at practical issues related to Content Security Policy (CSP) enforcement in web browsers. READ MORE