Avancerad sökning
Visar resultat 6 - 10 av 23 avhandlingar som matchar ovanstående sökkriterier.
6. Tracking Dependencies for Security and Privacy
Sammanfattning : Information Flow Control is a well established field of research, providing asuite of theoretical and practical results. However, adoption to real worldsystems has yet to catch up. This thesis seeks to expand the boundaries ofthis field, in particular with the aim of making Information Flow Control moreapplicable to real world scenarios. LÄS MER
7. Law Enforcement Large-Scale IT Systems in EU Internal Security and Migration Policies
Sammanfattning : Borderless Europe raises the problem of increased security deficit. One of its segments may be counterbalanced by the control of immigration flow at the external borders that consists of three endeavours: the common border control policy, the common visa policy and the common asylum policy. LÄS MER
8. Controlling Weapons of Mass Destruction : An Evaluation of International Security Regime Significance
Sammanfattning : This dissertation conducts an in-depth examination of the three weapons of mass destruction control regimes: the nuclear non-proliferation regime, the biological weapons control regime, and the chemical weapons control regime (NBC weapon control regimes). By examining a number of key indicators, this study investigates the specific ways each regime makes or does not make a difference in its respective issue area. LÄS MER
9. A Policy Semantics and a Programming Language for Securing Software
Sammanfattning : The work presented in this thesis contributes to the information flowpolicy specification language Paralocks and the enforcement of Paralockspolicies in the programming language Paragon.The thesis starts with a programming tutorial on Paragon. LÄS MER
10. Controlling Dependencies for Security and Privacy
Sammanfattning : This thesis explores several ways to diversify the field of Information Flow Control. At the heart of the field lie on one hand policies for describing limitations on information dependencies induced by a program, and on the other hand mechanisms to enforce such policies. LÄS MER