| | SLO | ENG | Piškotki in zasebnost

Večja pisava | Manjša pisava

Iskanje po katalogu digitalne knjižnice Pomoč

Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju

Opcije:
  Ponastavi


1 - 10 / 69
Na začetekNa prejšnjo stran1234567Na naslednjo stranNa konec
1.
Towards a sustainable cybersecurity governance : threat modelling with large language models
Nika Jeršič, Muhamed Turkanović, Tina Beranič, 2025, izvirni znanstveni članek

Opis: With the increased complexity of applications and systems, threat modelling struggles to keep pace with the evolution of risks. This article addresses this challenge by exploring how large language models (LLMs) can be leveraged to create comprehensive threat models across different risk assessment methodologies. We examine whether a single generic prompt can support frameworks such as LINDDUN, PASTA, and STRIDE, despite their different requirements. Through this comparative analysis, we identify components that enable AI-based assessments, while acknowledging that privacy, regulatory, and dynamic risks require adaptation of the frameworks. Our findings show that a universal guideline is feasible for broad applications, but adaptation is necessary for effective use. Overall, LLM-based threat modelling improves the accessibility, repeatability, and effectiveness of risk analysis and supports stronger and more sustainable practices.
Ključne besede: cybersecurity, large language models, threat modelling, sustainability, resilient infrastructure, SDG 9
Objavljeno v DKUM: 02.12.2025; Ogledov: 0; Prenosov: 7
.pdf Celotno besedilo (875,62 KB)

2.
From model to mechanism : enforcing delegated authority in ssi with language-based security
Muhamed Turkanović, Vid Keršič, Alen Horvat, Dominik Beron, Špela Čučko, 2025, izvirni znanstveni članek

Opis: Delegation of authority remains a critical yet insufficiently addressed capability in SelfSovereign Identity (SSI) systems. Building on an existing delegation model that introduced the concept of a Verifiable Mandate (VM) for expressing authority and access rights, this paper extends the approach with a rigorous formalization of delegation semantics, enabling unambiguous reasoning over roles, grants, and constraints. The formal model is aligned with standards from the World Wide Web Consortium (W3C), and its constructs are embedded into an extended credential schema that preserves compatibility with the Verifiable Credentials (VC) data model while introducing delegation-specific attributes. A generalized VM schema is defined, supporting both generic and business-specific instantiations, and ensuring structural and semantic interoperability. Policy compliance is operationalized through a policy-based enforcement architecture, where rules are authored in the Rego language and evaluated at runtime by the Open Policy Agent (OPA). The architecture incorporates trusted registries for schema and policy distribution, allowing verifiers to define and enforce context-specific delegation rules in a modular and interoperable manner. Validation through realistic scenarios, such as postal service and academic use cases, demonstrates how formal semantics, schema validation, and language-based policy enforcement can be combined to enable secure, verifiable, and context-aware delegation in SSI ecosystems.
Ključne besede: self-sovereign identity, delegation, verifiable mandate, formalization, policy-based enforcement, verifiable credentials, blockchain, language-based security
Objavljeno v DKUM: 02.10.2025; Ogledov: 0; Prenosov: 10
.pdf Celotno besedilo (1,46 MB)

3.
Analiza tehnoloških procesov in izzivov podatkovnih prostorov : magistrsko delo
Nina Kliček, 2025, magistrsko delo

Opis: Podatkovni prostori omogočajo varen in nadzorovan način izmenjave podatkov znotraj odprtega in standardiziranega okvira. Evropska strategija za podatke spodbuja oblikovanje skupnih evropskih podatkovnih prostorov na različnih vsebinskih področjih z namenom ustvarjanja enotnega trga podatkov. Kljub njihovemu potencialu se implementacija sooča s številnimi tehničnimi, organizacijskimi in pravnimi izzivi, kot so zagotavljanje interoperabilnosti, skladnost z zakonodajo ter zagotavljanje podatkovne suverenosti. V magistrskem delu smo izvedli sistematičen pregled literature, s katerim smo identificirali in klasificirali ključne izzive vzpostavitve podatkovnih prostorov. Predstavili smo glavne domene njihove uporabe, analizirali podatkovni tok v podatkovnem prostoru ter ga primerjali glede na uporabljene tehnologije implementacije. Dodatno smo analizirali in primerjali različne obstoječe povezovalnike in opisali ključne tehnične gradnike za boljše razumevanje delovanja in strukture podatkovnih prostorov.
Ključne besede: podatkovni prostori, interoperabilnost, referenčna arhitektura, izzivi, Evropska strategija za podatke
Objavljeno v DKUM: 30.09.2025; Ogledov: 0; Prenosov: 12
.pdf Celotno besedilo (4,95 MB)

4.
Analiza posebnosti zagotavljanja kakovosti pri razvoju decentraliziranih aplikacij v okolju Ethereum
Mitja Gradišnik, Tina Beranič, Muhamed Turkanović, 2025, pregledni znanstveni članek

Opis: Pri razvoju decentraliziranih aplikacij (dApps) se tradicionalni razvojni procesi pogosto izkažejo za nezadostne. Tovrstne rešitve zahtevajo večji poudarek na tehničnih, varnostnih in uporabniških vidikih kakovosti aplikacij, kot smo jih sicervajeni pri razvoju klasičnih rešitev. Ker je spreminjanje pametnih pogodb po namestitvi v omrežje verig blokov zahtevno oziroma nemogoče, sta temeljito testiranje ter presoja programske kode ključnega pomena za uspešen razvoj tovrstnih rešitev. Optimizacija stroškov goriva, nujna za izvrševanje programov v javnih omrežjih, predstavlja enega ključnih razvojnih izzivov, ki ga je potrebnoustrezno obravnavati. Poleg tega specifično okolje omrežij veriženja blokov zahteva ustrezne ukrepe za obvladovanje tveganj povezanih z ranljivostmi aplikacij in morebitnimi povezanimi finančnimi izgubami. Nespremenljivost, stroški goriva in zagotavljanje varnosti so le nekateri izmed ključnih razvojnih izzivov, ki jih je treba uspešno nasloviti pri izgradnji kakovostnih in stabilnih decentraliziranih aplikacij. Prispevek obravnava izzive, sodobne pristope in strategije razvoja decentraliziranih aplikacij ter podaja priporočila za njihov zanesljivejši in učinkovitejši razvoj, s čimer naslavlja ključne izzive uvajanja tehnologij veriženja blokov v industrijska okolja ter razvoja pametnih pogodb. Poseben poudarek je namenjen pametnim pogodbam, ki temeljijo na omrežju Ethereum.
Ključne besede: verige blokov, proces razvoja dApps, testiranje, vzdrževanje, obvladovanje stroškov transakcije, presoje
Objavljeno v DKUM: 29.09.2025; Ogledov: 0; Prenosov: 14
.pdf Celotno besedilo (947,57 KB)
Gradivo ima več datotek! Več...

5.
Analiza in primerjava pristopov modeliranja relacij med podatki v dokumentnih podatkovnih bazah NoSQL : diplomsko delo
Amar Tabaković, 2025, diplomsko delo

Opis: Diplomsko delo analizira razlike med pristopoma modeliranja relacij znotraj dokumentnih podatkovnih baz NoSQL, in sicer referenciranje (ang. REF) in vgnezdenje (ang. EMBED). Podrobno sta predstavljena pristopa REF in EMBED, pri čemer je poseben fokus na analizi razlik v performancah pri izvajanju različnih operacij vstavljanja, poizvedovanja/iskanja, posodabljanja itn. Diplomsko delo zaključujemo s predstavitvijo in predlogi, kdaj je najboljše uporabiti enega izmed teh dveh pristopov modeliranja povezav med dokumenti in zbirkami. Teze, ki smo si jih zastavili kot dokaz pri izbiri pravilnega pristopa ob določenih pogojih, smo prikazali s pomočjo praktičnih primerov.
Ključne besede: dokumentne podatkovne baze, NoSQL, MongoDB, referenciranje, ugnezdenje, REF, EMBED
Objavljeno v DKUM: 23.09.2025; Ogledov: 0; Prenosov: 11
.pdf Celotno besedilo (2,44 MB)

6.
A novel model for authority and access delegation utilizing self-sovereign identity and verifiable credentials
Špela Čučko, Muhamed Turkanović, 2025, izvirni znanstveni članek

Opis: Self-Sovereign Identity (SSI) is a decentralized, user-centric approach to Identity Management (IdM), that allows users to gain control over their digital identity and data. It brings many advantages and reduces the shortcomings of traditional, centralized IdM systems. Despite its positive features, SSI focuses predominantly on direct interactions between two independent entities. It enables direct identification, authentication, authorization, and access to resources and services where the identity holders are the authenticated bearers of their credentials. On the other hand, it does not address primarily indirect identity control, such as delegation, which is an essential part of life situations and natural human relationships. Delegation is particularly common in organizational contexts, and usually arises from the need for greater efficiency, relief, or distribution of work, collaboration, and cooperation and the inability to perform work, tasks, responsibilities, and duties for various reasons. However, it is relatively unexplored within the SSI framework, and requires additional research efforts and the development of new approaches. Consequently, our research aimed to reduce the aforementioned gap and address delegation in the SSI ecosystem comprehensively. Thus, we present a novel authority and access delegation model utilizing Verifiable Credentials, that enable delegation support for existing use cases, workflows, and processes of organizations and companies, providing resources and services to end users. The model includes delegation building blocks, data objects and data flow, delegation phases and processes, and technology-independent components. It is validated with a case study in the field of Education
Ključne besede: access delegation, authority delegation, delegation, self-sovereign identity, verifiable credential, verifiable mandate
Objavljeno v DKUM: 25.07.2025; Ogledov: 0; Prenosov: 4
.pdf Celotno besedilo (7,67 MB)

7.
Navidezno zasebno omrežje kot storitev
Mark Kolarič, 2025, diplomsko delo

Opis: Namen diplomskega dela je izdelava delujočega navideznega zasebnega omrežja (ang. Virtual Private Network – VPN), ki bo deloval kot storitev. V ospredje bomo postavili izdelavo in prodajo VPN-a kot storitev. Izbrali bomo VPN protokol, ki bo konkurenčen, moral bo delovati zanesljivo in učinkovito, saj se bo prodajal kot samostojna storitev. Izbrali bomo tudi dodatne tehnologije, ki bodo pripomogle k temu, da bo VPN lahko deloval kot storitev.
Ključne besede: navidezno zasebno omrežje, omrežna varnost, tuneliranje, šifriranje, programske storitve, protokol VPN
Objavljeno v DKUM: 10.07.2025; Ogledov: 0; Prenosov: 35
.pdf Celotno besedilo (2,60 MB)

8.
A review on building blocks of decentralized artificial intelligence
Vid Keršič, Muhamed Turkanović, 2025, izvirni znanstveni članek

Opis: Artificial intelligence (AI) is one of the key technologies transforming our lives, while the transfer of knowledge and competencies from the academic sphere to the industry and real-world use cases are accelerating yearly. However, during that transition, several significant problems and questions need to be addressed for the field to develop ethically, such as digital privacy, ownership, and control. These are some of the reasons why the currently most popular approaches of artificial intelligence, i.e., centralized artificial intelligence (CEAI), are questionable, with other directions also being explored widely, such as decentralized artificial intelligence (DEAI), which aim to solve some of the most far-reaching problems. This paper aims to review and organize the knowledge in the field of DEAI, focusing solely on studies that fall within this category. A systematic literature review (SLR) was conducted using six scientific databases and additional gray literature to analyze and present the findings of 71 identified studies. The paper’s primary focus is identifying the building blocks of DEAI solutions and networks, tackling the DEAI analysis from a bottom-up approach. Future research directions and open problems are presented and proposed at the end.
Ključne besede: artificial intelligence, blockchain, cryptography, decentralization, AI, DEAI, decentralized artificial intelligence
Objavljeno v DKUM: 23.04.2025; Ogledov: 0; Prenosov: 7
.pdf Celotno besedilo (2,83 MB)

9.
10.
On-chain zero-knowledge machine learning : an overview and comparison
Vid Keršič, Sašo Karakatič, Muhamed Turkanović, 2024, izvirni znanstveni članek

Ključne besede: zero-knowledge proofs, machine learning, ZKML, decentralized AI
Objavljeno v DKUM: 31.01.2025; Ogledov: 0; Prenosov: 6
.pdf Celotno besedilo (2,44 MB)

Iskanje izvedeno v 0.12 sek.
Na vrh
Logotipi partnerjev Univerza v Mariboru Univerza v Ljubljani Univerza na Primorskem Univerza v Novi Gorici