Sökning: "standards of proof"
Visar resultat 11 - 15 av 29 avhandlingar innehållade orden standards of proof.
11. Digital Power of Attorney for Authorization in Industrial Cyber-Physical Systems
Sammanfattning : Since ancient times, there has been a practice to authorize individuals that we trust. Today, we grant credentials and privileges digitally, making authorization a crucial part of security control and extending its use cases beyond people and web applications. LÄS MER
12. Soft proofing using liquid crystal displays
Sammanfattning : Development of colour management systems, the level ofstandardisation, as well as the embedding of facilities forcolour management into computer operating systems and software,enables successful future interoperability of colour reproductionin the graphic arts industry. Yet colour reproduction from onemedium to another, still gives rise to inconsistencies. LÄS MER
13. Culling Concurrency Theory : Reusable and trustworthy meta-theory, proof techniques and separation results
Sammanfattning : As concurrent systems become ever more complex and ever more ubiquitous, the need to understand and verify them grows ever larger. For this we need formal modelling languages that are well understood, with rigorously verified foundations and proof techniques, applicable to a wide variety of concurrent systems. LÄS MER
14. Portable Tools for Interoperable Grids : Modular Architectures and Software for Job and Workflow Management
Sammanfattning : The emergence of Grid computing infrastructures enables researchers to shareresources and collaborate in more efficient ways than before, despite belongingto different organizations and being geographically distributed. While the Gridcomputing paradigm offers new opportunities, it also gives rise to newdifficulties. LÄS MER
15. Towards Automated Context-aware Vulnerability Risk Management
Sammanfattning : The information security landscape continually evolves with increasing publicly known vulnerabilities (e.g., 25064 new vulnerabilities in 2022). Vulnerabilities play a prominent role in all types of security related attacks, including ransomware and data breaches. LÄS MER