Search
Now showing items 1-10 of 12
(Research report / Forskningsrapport, 2017)
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun ...
(Research report / Forskningsrapport / PublishedVersionAcceptedVersionPublishedVersionAcceptedVersion; Peer reviewed, 2016)
The rapidly increasing pervasiveness and integration of computers in human and animal society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs ...
(Research report / Forskningsrapport / PublishedVersion, 2016)
Client platform infection poses a significant threat to secure user authentication. Com- bining vulnerable client platforms with special security devices, as often the case in e- banking, can increase significantly the ...
(Research report / Forskningsrapport, 2016)
Identity and authentication solutions often lack usability and scalability, or do not provide high enough authentication assurance. The concept of Lucidman (Local User-Centric Identity Management) is an approach to providing ...
(Research report / Forskningsrapport / SubmittedVersion; Peer reviewed, 2012)
We introduce Dynamic SOS as a framework for describing semantics of programming languages that include dynamic software upgrades. Dynamic SOS is built on top of theModular SOS of P.Mosses, with an underlying category theory ...
(Research report / Forskningsrapport, 2019)
Internet of Things (IoT) is a growing field and its use in home automation is one of the dominating application areas. The heterogeneity and limited capacity of storage and processing power make the security of IoT systems ...
(Research report / Forskningsrapport, 2020)
Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT (long version)
(Research report / Forskningsrapport, 2020)
We have previously proposed a security classification methodology for IoT systems and have applied it to the smart grid and smart home domain. This method departs from classical risk analysis and certification methods in ...
(Research report / Forskningsrapport, 2020)
DevSecOps is the extension of DevOps with security aspects and tools throughout all the stages of the software development life cycle. DevOps has become a popular way of developing modern software, especially in the Internet ...
(Research report / Forskningsrapport, 2016)
Railway systems designs deal with complex and large-scale, safety-critical infrastructures, where formal methods play an important role, especially in verifying the safety of so-called interlockings through model checking. ...