Search for dissertations about: "security testing"
Showing result 16 - 20 of 66 swedish dissertations containing the words security testing.
-
16. Integrating Security in Software Engineering Process: The CSEP Methodology
Abstract : In today’s organizations, a vast amount of existing software systems is insecure, which results in compromised valuable assets and has negative consequences on the organizations. Throughout the years, many attempts have been made to build secure software systems, but the solutions proposed were limited to a few add-on fixes made after implementation and installation of the system. READ MORE
-
17. PARENTS’ POSTNATAL SENSE OF SECURITY (PPSS)- developing an instrument and description of important factors based on mothers’ and fathers’ experiences
Abstract : The overall aim of this thesis was to develop and evaluate a specific instrument, measuring both mothers’ and fathers’ postnatal sense of security during the first postnatal week, and to explore and describe important factors associated with this. Data was collected from 2003 to 2009. READ MORE
-
18. Flexible and Practical Information-Flow Control
Abstract : As more and more sensitive data is handled by software, itstrustworthiness becomes an increasingly important concern. This thesispresents work on ensuring that information that is processed bycomputing systems is not disclosed to third parties without the user'spermission; i.e. to prevent unwanted flows of information. READ MORE
-
19. Simulation used as a learning approach in nursing education : Students’ experiences and validation of evaluation questionnaires
Abstract : The overall aim was to investigate bachelor nursing students’ experiences with simulation as a learning approach conducted under various conditions. Additionally, the aim was to translate and validate questionnaires for the evaluation of simulation in a Norwegian context.Methods: Quantitative and qualitative methods were used. READ MORE
-
20. Deep Learning Side-Channel Attacks on Advanced Encryption Standard
Abstract : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. READ MORE