SLO | ENG

Večja pisava | Manjša pisava

Iskanje po katalogu digitalne knjižnice Pomoč

Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju

Opcije:
  Ponastavi


1 - 10 / 26
Na začetekNa prejšnjo stran123Na naslednjo stranNa konec
1.
2.
VAROVANJE XML DOKUMENTOV Z UPORABO ELEKTRONSKEGA PODPISA IN ŠIFRIRANJA
Dušan Rutnik, 2010, diplomsko delo

Opis: V diplomski nalogi so predstavljene osnove kriptografije: elektronski podpis in šifriranje. Podrobneje smo obdelali poglavje o varovanju XML dokumentov. Spoznali smo uporabo XML elektronskega podpisa, šifriranja XML dokumentov ter tehnologije, ki sodijo zraven. Izdelali in predstavili smo spletno aplikacijo, s katero lahko podpišemo posamezen XML dokument na vse možne načine in posamezen podpis tudi preverimo. Aplikacija omogoča tudi šifriranje in dešifriranje XML dokumentov.
Ključne besede: Kriptografija, elektronski podpis, šifriranje, XML dokument, XML Security, Infrastruktura javnih ključev, varnost
Objavljeno: 01.09.2010; Ogledov: 1563; Prenosov: 170
.pdf Polno besedilo (3,03 MB)

3.
QoS-oriented design of embedded systems with specification PEARL
Roman Gumzej, Wolfgang A. Halang, 2007, izvirni znanstveni članek

Opis: Only recently have methodical tools adequate to design real-time systems been formally introduced in design methodologies. Naturally, they were present fromthe beginning, but due to the large diversity of embedded systemsć areas of deployment, specially dedicated formalisms have been developed and used. High-level language programming and integration of modeling formalisms into design methods eased the development of more complex real-time applications. With the emerging object-oriented programming languages and design methods, their integration into larger information systems has become more transparent. It was the UML methodology, however, which eventually merged also the design methods and concepts of real-time systems into a consistent whole. It took a large consortium and a long process to persuade industry of the benefits the new integral methodology can offer. On the other hand, there are some trade-offs, and there are some features not completely covered, yet. Here, a different, more straightforward approach to program and design (embedded) real-time systems is presented. Since it emerged from the real-time community, it includes most features relevant there. Independent of the UML profile for schedulability, performance and time specification, a profile was devised for use in PEARL-oriented UML design. The strengths of the mentioned language and design methods for QoS-oriented design of (embedded) real-time systems are emphasised throughout this article.
Ključne besede: real time systems, embedded systems, quality of service, co-design, co-simulation, safety, dependability, security, timeliness, determinism, readiness, reliability, portability, flexibility, specification PEARL, UML profiles, patterns
Objavljeno: 31.05.2012; Ogledov: 1142; Prenosov: 3
URL Polno besedilo (0,00 KB)

4.
Improvement of the Peyravian-Jeffries`s user authentication protocol and password change protocol
Marko Hölbl, Tatjana Welzer Družovec, Boštjan Brumen, 2008, izvirni znanstveni članek

Opis: Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries`s remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack.
Ključne besede: networks, user authentication, remote user access, password-based protocol, security
Objavljeno: 31.05.2012; Ogledov: 638; Prenosov: 2
URL Polno besedilo (0,00 KB)

5.
An algorithm for protecting knowledge discovery data
Boštjan Brumen, Izidor Golob, Tatjana Welzer Družovec, Ivan Rozman, Marjan Družovec, Hannu Jaakkola, 2003, izvirni znanstveni članek

Opis: In the paper, we present an algorithm that can be applied to protect data before a data mining process takes place. The data mining, a part of the knowledge discovery process, is mainly about building models from data. We address the following question: can we protect the data and still allow the data modelling process to take place? We consider the case where the distributions of original data values are preserved while the values themselves change, so that the resulting model is equivalent to the one built with original data. The presented formal approach is especially useful when the knowledge discovery process is outsourced. The application of the algorithm is demonstrated through an example.
Ključne besede: data protection algorithm, classification algorithm, disclosure control, data mining, knowledge discovery, data security
Objavljeno: 01.06.2012; Ogledov: 875; Prenosov: 5
URL Polno besedilo (0,00 KB)

6.
7.
8.
9.
10.
Iskanje izvedeno v 0.16 sek.
Na vrh
Logotipi partnerjev Univerza v Mariboru Univerza v Ljubljani Univerza na Primorskem Univerza v Novi Gorici