| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Search the digital library catalog Help

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


1 - 10 / 86
First pagePrevious page123456789Next pageLast page
1.
From model to mechanism : enforcing delegated authority in ssi with language-based security
Muhamed Turkanović, Vid Keršič, Alen Horvat, Dominik Beron, Špela Čučko, 2025, original scientific article

Abstract: Delegation of authority remains a critical yet insufficiently addressed capability in SelfSovereign Identity (SSI) systems. Building on an existing delegation model that introduced the concept of a Verifiable Mandate (VM) for expressing authority and access rights, this paper extends the approach with a rigorous formalization of delegation semantics, enabling unambiguous reasoning over roles, grants, and constraints. The formal model is aligned with standards from the World Wide Web Consortium (W3C), and its constructs are embedded into an extended credential schema that preserves compatibility with the Verifiable Credentials (VC) data model while introducing delegation-specific attributes. A generalized VM schema is defined, supporting both generic and business-specific instantiations, and ensuring structural and semantic interoperability. Policy compliance is operationalized through a policy-based enforcement architecture, where rules are authored in the Rego language and evaluated at runtime by the Open Policy Agent (OPA). The architecture incorporates trusted registries for schema and policy distribution, allowing verifiers to define and enforce context-specific delegation rules in a modular and interoperable manner. Validation through realistic scenarios, such as postal service and academic use cases, demonstrates how formal semantics, schema validation, and language-based policy enforcement can be combined to enable secure, verifiable, and context-aware delegation in SSI ecosystems.
Keywords: self-sovereign identity, delegation, verifiable mandate, formalization, policy-based enforcement, verifiable credentials, blockchain, language-based security
Published in DKUM: 02.10.2025; Views: 0; Downloads: 5
.pdf Full text (1,46 MB)

2.
A critical analysis of cyber security threats posed by Covid-19 : designing a roadmap for future
Niteesh Kumar Upadhyay, Mahak Rathee, 2022

Keywords: cyber law, cyber security, pandemic
Published in DKUM: 08.09.2025; Views: 0; Downloads: 5
.pdf Full text (363,00 KB)
This document has many files! More...

3.
A comprehensive survey on integration of machine learning with secure blockchain-based applications
Chahna Meka, Keerthi Reddy Palakollu, Maria Azees, Arun Sekar Rajasekaran, Ashok Kumar Das, Marko Hölbl, 2025, original scientific article

Abstract: Machine learning (ML) is a critical technology that provides pervasive intelligence for the Internet of Things (IoT), enabling smart decision and automation. Meanwhile, Blockchain has emerged as a reliable, secure, decentralized and distributed network with applications in a variety of sectors like healthcare, insurance, finance, banking, and business. The integration of blockchain and ML may further enhance security, optimize data processing and ensure intelligent automation. The linkage of blockchain technology with ML aims to safeguard the privacy of ML models by executing blockchain transparency functions. However, maintaining the integrity of ML models and optimizing blockchain process are challenging. The integration in this work aims to solve challenges like security vulnerability, scalability and computational efficiency. Integration enables automation through smart contracts, enabling secure decision making while preserving data integrity and supporting auditing tasks. Moreover, the security benefits of blockchain networks result from anomaly detection technologies enabled by ML that detects fraudulent activities while defending blockchain networks from security threats. This work presents an organized approach to examine contemporary blockchain-ML research developments, analysis of applications based on the integration of blockchain and ML, technical aspects of Integration and its case studies. Finally, integration with respect to industry focus, followed by open challenges and research problems in ML-based blockchain technology, future directions and emerging trends are discussed in this survey.
Keywords: machine learning, blockchain, artificial intelligence, security, privacy, regression
Published in DKUM: 05.09.2025; Views: 0; Downloads: 2
.pdf Full text (2,72 MB)

4.
5.
Slovenia’s nuclear energy pathway : strategic expansion, regulatory hurdles, and future prospects
Nataša Samec Berghaus, Aleš Ferčič, Klemen Drnovšek, 2025, original scientific article

Abstract: Slovenia boasts a longstanding tradition in the field of nuclear energy generation, with the Krško Nuclear Power Plant (NEK) traditionally playing an important role in the national energy system. As the country plans its future energy mix, nuclear power continues to figure prominently, not least in light of the proposed JEK2 project. However, the development of new nuclear facilities faces significant challenges, including lengthy regulatory procedures, complex construction processes, financial uncertainties, long-term issues related to nuclear fuel supply and waste management, as well as broader concerns regarding public acceptance. This article focuses on the legal dimensions shaping Slovenia’s nuclear energy pathway, with non-legal considerations introduced solely insofar as they serve to elucidate or reinforce the legal analysis. Within this framework, the licensing process in Slovenia is examined in detail, with particular regard to its multi-step structure and the administrative challenges it poses. In addition, issues related to public procurement procedures, transparency, and governance are well discussed, particularly considering past infrastructure project failures. While Small Modular Reactors (SMRs) are being explored as a potential long-term solution, their licensing and deployment remain uncertain due to regulatory and spatial constraints. The paper also emphasises the importance of strategic workforce planning. Ultimately, the attainment of a resilient and secure energy future in Slovenia demands not only continued investment in nuclear infrastructure, but also a broader consideration of energy efficiency, security risks, and long-term sustainability—considerations which are addressed herein.
Keywords: nuclear energy, Krško NPP, JEK2, nuclear licensing, environmental consent, permitting process, Nuclear Safety Administration, energy security, nuclear laws, Slovenia
Published in DKUM: 28.08.2025; Views: 0; Downloads: 10
.pdf Full text (422,15 KB)
This document has many files! More...

6.
A framework to establish and operate a global logistics energy hub : doktorska disertacija
Mahmoud Ahmed Abd Ellatif Hammad, 2024, doctoral dissertation

Abstract: Energy is an essential component of our daily lives. Despite the expanded use of new and renewable energy sources, oil and gas remain the primary sources of energy. Recently, oil and gas sources have become more vulnerable due to their limited and uncertain availability, as well as geopolitical issues that threaten the security of their supply chains. As a result, securing energy sources in general and oil and gas in particular at reasonable prices and reliable supplies has become a major global concern. As a result, the establishment and operation of energy hubs along energy transit routes between producing and consuming countries is crucial for the security and sustainability of the energy supply. These energy hubs can facilitate the trade and exchange of energy by offering logistics services such as transportation, storage, processing, and distribution. This means that establishing and operating such energy hubs necessitates some logistics requirements. However, previous studies did not tackle the logistics requirements for establishing and operating energy hubs in a single, comprehensive framework. Accordingly, the purpose of this study is to address the logistics requirements of energy hubs, with a focus on oil and gas, and to develop a comprehensive framework for establishing and operating GLEH through conducting an empirical study on the Egyptian oil and gas industry. The study was carried out through seven sequential phases. The study conducted a systematic review of the previous literature using the PRISMA flow diagram and visual bibliometric analysis via VOSviewer software to identify the main research gap and develop an integrated theoretical framework for creating and operating a GLEH. The study then adopted mixed research methods to reap the benefits of both qualitative and quantitative methods. The qualitative technique was used to convert the theoretical framework into a practical framework by conducting semi-structured interviews with key stakeholders. The quantitative method was applied to examine the relationships between the variables and validate the study’s hypotheses in the Egyptian context through a survey. The study set out an applied framework to help establish and operate GLEHs that can improve the security of energy supplies. It also highlighted the key challenges that might face the establishment and operation of GLEHs and suggested strategies to deal with them. The study would contribute to science by developing a unique and comprehensive framework for establishing and operating GLEHs, considering both theoretical and empirical aspects. At a practical level, the proposed framework can help improve the global energy supply chain and its sustainability, especially for oil and gas. It can also be used as a model by other countries and regions to establish and operate logistics hubs for energy and other sectors. Furthermore, the framework can be used in further research to develop the performance of energy hubs.
Keywords: Energy supply chain, energy sustainability and security, global logistics energy hub, oil and gas, Egypt
Published in DKUM: 27.08.2025; Views: 0; Downloads: 5
.pdf Full text (9,35 MB)

7.
Recent trends in information and cyber security maturity assessment : a systematic literature review
Alenka Baggia, Alenka Brezavšček, 2025, review article

Abstract: This work represents a comprehensive and systematic literature review (SLR) that follows the PRISMA (Preferred Reporting Items for Systematic Reviews and MetaAnalyses) guidelines for research assessing information and cyber security maturity. The period from 2012 to 2024 was considered and the final collection of 96 studies was taken into account. Our findings were summarised in two stages, a quantitative analysis and a qualitative synthesis. In the first part, various quantitative indicators were used to analyse the evolution of the information and cyber security maturity assessment domain over the last twelve years. The qualitative synthesis, which was limited to 36 research papers, categorises the studies into three key areas: the development of new maturity models, the implementation of established models and frameworks, and the advancement of methodologies to support maturity assessments. The findings reveal significant progress in sector-specific customisation, the growing importance of lightweight models for small and medium-sized enterprises (SMEs), and the integration of emerging technologies. This study provides important insights into the evolving landscape of information and cyber security maturity assessment and provides actionable recommendations for academia and industry to improve security resilience and support the adoption of tailored, effective maturity models
Keywords: cyber security, information security, maturity assessment, maturity model, maturity framework, systematic literature review, SLR
Published in DKUM: 26.08.2025; Views: 0; Downloads: 3
.pdf Full text (2,49 MB)
This document has many files! More...

8.
Development of cyber security platform for experiential learning
Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad Zabukovšek, 2024, original scientific article

Abstract: The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour. Cybersecurity as a field has evolved as a multi-discipline, multistakeholder and multi-role discipline. Therefore, the need to address formal education with an outcomebased philosophy is imperative to address for a wider audience with varied past training in their formal education. With the Internet becoming an essential part of human life, providing security of data passed over the Internet is becoming increasingly crucial. Therefore, the role in the organization which is quite demanding is to have expertise in handling and configuring network security, a subdomain of cyber security as a priority area. The rapid increase in the network attack landscape is constantly demanding monitoring of network attacks as well as a need to promote collaborative R&D and education in the sphere of cyber security due to a shortage of skilled resources. Platform-based education is a potential direction to achieve the objective and address the skill gap required in cyber security. The present research proposes a comprehensive web-based platform that can be used to communicate, collaborate and practice various use cases in the domain of network intrusion detection tools using machine learning algorithms and to evaluate user experience. The proposed platform CySecLearn is a collection of various functionalities and features that ensures experiential learning, will help the learner to develop critical thinking and expertise in network security and promote digital literacy in the domain of cyber security.
Keywords: digital education, cyber security, platformization, online simulation, user feedback, experiential learning
Published in DKUM: 30.06.2025; Views: 0; Downloads: 23
.pdf Full text (1,66 MB)
This document has many files! More...

9.
Organization of efficient energy security management
Bojana Vasić, 2024, doctoral dissertation

Abstract: The main problem this research addresses is the EU energy policy, which focuses on a critical analysis of strategic energy management in all process phases. Particular emphasis is placed on strategic control, which is a key phase of the management process. Strategic control includes evaluating the effectiveness of implementing planned measures and making decisions about necessary adjustments or changes. The purpose of the study is to assess how well EU energy management strategies are aligned with policy objectives, in particular, to ensure energy security, sustainability and economic competitiveness, and at the same time to identify areas where improvements are needed to address current challenges. Energy management in the European Union is a crucial aspect of its energy policy, which focuses on ensuring energy security, sustainability and efficiency. Since the middle of the 20th century, organisations' increasing energy intensity has emphasized the need for a comprehensive and flexible approach. Energy management involves controlling the entire life cycle of energy - from extraction, conversion and distribution to consumption and waste disposal - in a complex environment shaped by various external factors. These challenges become even more pronounced in regions that experience frequent environmental, economic or geopolitical changes. Designing a universal model for global energy management is difficult because of the different conditions, regulations, and energy needs worldwide. Adaptable and adaptive strategies are essential to respond to supply and demand fluctuations, integrate renewable energy sources, manage geopolitical risks and achieve sustainability goals. Therefore, energy management must evolve to respond to a dynamic global environment. The EU prioritizes energy security but lacks a unified approach, which creates challenges in defining and measuring energy security. The absence of standardized criteria makes it difficult to strategically evaluate policies and make decisions, which could have long-term consequences for both energy and national security. Initially, energy security was focused on stable supply for economic growth, but global changes – such as rising demand, geopolitical tensions and environmental concerns – have made it more complex. The recent years have underscored significant vulnerabilities in global energy security and the sustainability of energy systems, particularly in Europe. The dual crises of the COVID-19 pandemic and the conflict in Ukraine have highlighted the urgency of addressing these challenges, pushing the European Union to accelerate its efforts toward more sustainable and secure energy practices. In response, the EU has diversified energy sources and strengthened energy security to reduce its dependence on politically unstable suppliers. Given the complexity of the geopolitical situation, disrupted supply chains and the EU's clear official commitment to decarbonisation by 2050, the above should be viewed from different angles. EU energy policy (short-term and long-term) is conditioned by the action of many factors, which differ in type, intensity of action and effect (positive or negative) - but the need to analyse existing and define new methodologies for evaluating the effectiveness of EU energy policy is evident. The doctoral dissertation examines the above and suggests improvements.
Keywords: Energy management, sustainable management, energy security, aggregate index, composite indicator
Published in DKUM: 10.04.2025; Views: 0; Downloads: 25
.pdf Full text (6,70 MB)

10.
A real-world information security performance assessment using a multidimensional socio-technical approach
Kaja Prislan Mihelič, Anže Mihelič, Igor Bernik, 2020, original scientific article

Abstract: Measuring the performance of information security is an essential part of the information security management system within organisations. Studies in the past mainly focused on establishing qualitative measurement approaches. Since these can lead to ambiguous conclusions, quantitative metrics are being increasingly proposed as a useful alternative. Nevertheless, the literature on quantitative approaches remains scarce. Thus, studies on the evaluation of information security performance are challenging, especially since many approaches are not tested in organisational settings. The paper aims to validate the model used for evaluating the performance of information security management system through a multidimensional socio-technical approach, in a real-world settings among medium-sized enterprises in Slovenia. The results indicate that information security is strategically defined and compliant, however, measures are primarily implemented at technical and operational levels, while its strategic management remains underdeveloped. We found that the biggest issues are related to information resources and risk management, where information security measurement-related activities proved to be particularly problematic. Even though enterprises do possess certain information security capabilities and are aware of the importance of information security, their current practices make it difficult for them to keep up with the fast-paced technological and security trends.
Keywords: information security, information security management, organisations, qualitative measurement
Published in DKUM: 07.02.2025; Views: 0; Downloads: 7
.pdf Full text (1,17 MB)
This document has many files! More...

Search done in 0.11 sec.
Back to top
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica