Search for dissertations about: "unix"

Found 4 swedish dissertations containing the word unix.

  1. 1. Evaluation and enhancement of operational security based on experimental data

    Author : Ulf Gustafson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; security; PPC network; vulnerability; detection; experimentation; unix; intrusion; modelling;

    Abstract : .... READ MORE

  2. 2. Observations on Operating System Security Vulnerabilities

    Author : Stefan Lindskog; Karlstads universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; computer security; operating system; vulnerability; intrusion; experiment; modeling; analysis; Datavetenskap; Computer Science;

    Abstract : This thesis presents research on computer security vulnerabilities in general-purpose operating systems. The objective is to investigate intrusions in such systems in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. READ MORE

  3. 3. Software Development Productivity Issues in Large Telecommunication Applications

    Author : Piotr Tomaszewski; Blekinge Tekniska Högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; productivity; measurement; improvement;

    Abstract : The high non-functional requirements of telecommunication applications increase their complexity. Introducing a new and specialized technology is often seen as a way of meeting these high non-functional requirements. An example of such a technology is a software platform that provides high performance and availability. READ MORE

  4. 4. Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation

    Author : Tomas Olovsson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; computers; dependability; vulnerabilities; tiger teams; taxonomy; operational security; analysis; security; terminology;

    Abstract : The first part of this thesis describes the results of applying dependability methods to the security area. A uniform taxonomy for security, expected to contain all characteristic attributes, is presented. This taxonomy will hopefully increase the understanding of security issues. READ MORE