Search for dissertations about: "security testing"

Showing result 1 - 5 of 46 swedish dissertations containing the words security testing.

  1. 1. Integrated Security Platform for Mobile Applications

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Hao Zhao; Sead Muftic; Fisseha Mekuria; [2011]
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Integrated Security Platform; UICC; security; mobile applications; Secure Mobile Wallet; TECHNOLOGY Information technology Other information technology; TEKNIKVETENSKAP Informationsteknik Övrig informationsteknik; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : This report describes our concept, design and current implementation of theIntegrated Security Platform for mobile applications.The increasing use of mobile applications is the trend of mobile communicationtechnology. Under initiatives of ISO, ETSI, GSMA and other standardization bodies,mobile applications play more and more important role. READ MORE

  2. 2. A Framework for Adaptive Information Security Systems A Holistic Investigation

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Jeffy Mwakalinga; Louise Yngström; Stewart Kowalski; Helena Armstrong; [2011]
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Security; framework for adaptive security systems; socio-technical; SOCIAL SCIENCES Statistics; computer and systems science Informatics; computer and systems science Computer and systems science; SAMHÄLLSVETENSKAP Statistik; data- och systemvetenskap Informatik; data- och systemvetenskap Data- och systemvetenskap;

    Abstract : This research proposes a framework for adaptive information security systems that considers both the technical and social aspects of information systems security. Initial development of information systems security focused on computer technology and communication protocols. READ MORE

  3. 3. Tracking Dependencies for Security and Privacy

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Arnar Birgisson; [2013]
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Programming Languages; Software Security; Web Security;

    Abstract : Information Flow Control is a well established field of research, providing asuite of theoretical and practical results. However, adoption to real worldsystems has yet to catch up. This thesis seeks to expand the boundaries ofthis field, in particular with the aim of making Information Flow Control moreapplicable to real world scenarios. READ MORE

  4. 4. MobiLeak Security and Privacy of Personal Data in Mobile Applications

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Pasquale Stirparo; Sead Muftic; Steven Marcus Furnell; [2015]
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; mobile application; security; privacy; android; forensics; malware; Informations- och kommunikationsteknik; Information and Communication Technology; Datalogi; Computer Science;

    Abstract : Smartphones and mobile applications have become an essential part of our daily lives. People always carry their smartphones with them and rely on mobile applications for most of their tasks: from checking emails for personal or business purposes, to engaging in social interactions via social networks, from trading online or checking their bank accounts to communicating with families and friends through instant messaging applications. READ MORE

  5. 5. Tool Support for Enterprise Architecture Analysis with application in cyber security

    University dissertation from Stockholm : KTH Royal Institute of Technology

    Author : Markus Buschle; Pontus Johnson; Stephan Aier; [2014]
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Enterprise Architecture; Decision-making; Model-based analysis; Property analysis; Cyber security; Software tool; Design Science; Electrical Engineering; Elektro- och systemteknik;

    Abstract : In today’s companies, business processes and information technology areinterwoven. Old and new systems as well as off-the-shelf products and tailoredsolutions are used. This results in heterogeneous, often complex ITlandscapes. The impact of changes and the affected systems are difficult toidentify. READ MORE