Sökning: "Security Monitor"
Visar resultat 1 - 5 av 45 avhandlingar innehållade orden Security Monitor.
1. Tracking Dependencies for Security and Privacy
Sammanfattning : Information Flow Control is a well established field of research, providing asuite of theoretical and practical results. However, adoption to real worldsystems has yet to catch up. This thesis seeks to expand the boundaries ofthis field, in particular with the aim of making Information Flow Control moreapplicable to real world scenarios. LÄS MER
2. A framework and theory for cyber security assessments
Sammanfattning : Information technology (IT) is critical and valuable to our society. An important type of IT system is Supervisor Control And Data Acquisition (SCADA) systems. These systems are used to control and monitor physical industrial processes like electrical power supply, water supply and railroad transport. LÄS MER
3. Security and Privacy of Sensitive Data in Cloud Computing
Sammanfattning : Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. LÄS MER
4. Secure System Virtualization : End-to-End Verification of Memory Isolation
Sammanfattning : Over the last years, security-kernels have played a promising role in reshaping the landscape of platform security on embedded devices. Security-kernels, such as separation kernels, enable constructing high-assurance mixed-criticality execution platforms on a small TCB, which enforces isolation between components. LÄS MER
5. Lightweight Inlined Reference Monitors for Securing Extensible and Open Systems
Sammanfattning : This thesis studies an alternative implementation of asecurity reference monitor in the contexts of extensible and opensystems. A security reference monitor is a classic approach to imposing asecurity policy on an otherwise untrusted system by using a trusted componentwhich intercepts security-relevant resource requests and applies a securitypolicy to decide whether to grant such requests. LÄS MER