Search for dissertations about: "security mechanisms"
Showing result 1 - 5 of 140 swedish dissertations containing the words security mechanisms.
-
1. Actual and Perceived Information Systems Security
Abstract : As the Internet becomes the major information infrastructure in most sectors, the importance of Information Systems (IS) security steadily increases. While reaching a certain level of actual IS security is vital for most businesses, this level must also be perceived as acceptable by stakeholders. READ MORE
-
2. Content Security for Web Applications
Abstract : This thesis puts the focus on security problems related to web applications and web browsers by analyzing real-world web applications and modern client-side security mechanisms. For the latter, we mostly look at practical issues related to Content Security Policy (CSP) enforcement in web browsers. READ MORE
-
3. CryptoNET : Generic Security Framework for Cloud Computing Environments
Abstract : The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. READ MORE
-
4. Parks, Policies and People : Nature Conservation Governance in Post-Socialist EU Countries
Abstract : The national parks in the Carpathian Mountains along the Polish and Slovak border represent encompassing policy agendas that strive to balance biodiversity conservation and social welfare tasks. These countries have, during the last 25 years, undergone rapid transformation from socialist regimes to liberal democracies, and this transformation has affected the political, social and economic spheres. READ MORE
-
5. Tracking Dependencies for Security and Privacy
Abstract : Information Flow Control is a well established field of research, providing asuite of theoretical and practical results. However, adoption to real worldsystems has yet to catch up. This thesis seeks to expand the boundaries ofthis field, in particular with the aim of making Information Flow Control moreapplicable to real world scenarios. READ MORE