Essays about: "säkerhetskrav"

Showing result 1 - 5 of 17 essays containing the word säkerhetskrav.

  1. 1. Lek på allvar : bygglekplatsen i relation till barns lek, utveckling och säkerhet

    University essay from SLU/Department of Landscape Architecture, Planning and Management (from 130101)

    Author : Karolina Brandt; Turid Landström Petersen; [2018]
    Keywords : risktagande; kreativitet; utmaning; säkerhetskrav; säkerhetskrav;

    Abstract : Det här arbetet avhandlar ämnet bygglek i relation till barns lek, utveckling och säkerhet. Att leka är en essentiell del av att vara barn. Det är genom leken barn kommunicerar och får möjligheten att lära sig om livet. Barns rörelsefrihet har minskat de senaste tjugo åren, samtidigt som städerna växer och blir allt tätare. READ MORE

  2. 2. Patch Delivery Infrastructure in SCADA Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Svetlomir Petrov; [2018]
    Keywords : ;

    Abstract : As other technologies, the SCADA architecture, whose origin can be traced back to midtwentiethcentury, was not designed initially with security in mind. Recent cyber-attacks andsecurity incidents show that approaches like security through obscurity and air-gapping thesystems are not relevant anymore. READ MORE

  3. 3. Two-phase WCET analysis for cache-based symmetric multiprocessor systems

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Rodothea Myrsini Tsoupidi; [2017]
    Keywords : Worst-Case Execution Time Analysis; Abstract Domain; Real-Time Systems; Low-level Analysis; Pipeline Analysis; Cache-based Analysis; Multiprocessor Analysis; Längsta Exekveringstid Analys; WCET; Abstrakt Domän; Realtidsystem; Låg-nivå Analys; Pipeline Analys; Cachebaserad Analys;

    Abstract : The estimation of the worst-case execution time (WCET) of a task is a problem that concerns the field of embedded systems and, especially, real-time systems. Estimating a safe WCET for single-core architectures without speculative mechanisms is a challenging task and an active research topic. READ MORE

  4. 4. Effectiveness of fuzz testing high-security applications

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC); KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Balthazar West; Marcus Wengelin; [2017]
    Keywords : ;

    Abstract : Fuzzing is a testing methodology that is receiving increased attention in the field of software security. The methodology is interesting because almost anyone can download a fuzzer and search for bugs in large and well-tested programs or libraries. READ MORE

  5. 5. Formal Verification of Hardware Peripheral with Security Property

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC); KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Jonathan Yao Håkansson; Niklas Rosencrantz; [2017]
    Keywords : Formal Verification NuSMV JavaPathFinder Spin Promela CTL LTL DMA UART Model Checking Theorem Proving;

    Abstract : One problem with computers is that the operating system automatically trusts any externallyconnected peripheral. This can result in abuse when a peripheral technically can violate the security model because the peripheral is trusted. Because of that the security is an important issue to look at. READ MORE