Sökning: "formal protection"
Visar resultat 11 - 15 av 47 avhandlingar innehållade orden formal protection.
11. Protocol, mobility and adversary models for the verification of security
Sammanfattning : The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol. LÄS MER
12. MAC, A Verified Information-Flow Control Library
Sammanfattning : Information Flow Control (IFC) is a language-based security mechanism that tracks where data flows within a program and prevents leakage of sensitive data. IFC has been embedded in pure functional languages such as Haskell, in the form of a library, thus reducing the implementation and maintenance effort and fostering a secure-by-construction programming-model. LÄS MER
13. Practical, Flexible programming with Information Flow Control
Sammanfattning : Mainstream mechanisms for protection of information security are not adequate. Most vulnerabilities today do not arise from deficiencies in network security or encryption mechanisms, but from software that fails to provide adequate protection for the information it handles. LÄS MER
14. Changing Swedish sickness insurance : Policies, institutions and outcomes
Sammanfattning : The aim of this thesis is to contribute to welfare state theorising by analysing changing risk protection in Swedish sickness insurance and demonstrate how the understanding of such, and its implications, can be enhanced by strategic methodological choices. When analysing formal policy change in the compulsory sickness insurance system, it is concluded that the Swedish system fulfils almost every aspect of a so called social democratic welfare state, and no institutional shift can be discerned over time. LÄS MER
15. Making the Dead Alive : Dynamic Routines in Risk Management
Sammanfattning : Risk management in information security is relevant to most, if not all, organizations. It is perhaps even more relevant considering the opportunities offered by the digitalization era, where reliably sharing, creating, and consuming information has become a competitive advantage, and information has become an asset of strategic concern. LÄS MER