1. |
2. VAROVANJE XML DOKUMENTOV Z UPORABO ELEKTRONSKEGA PODPISA IN ŠIFRIRANJADušan Rutnik, 2010, diplomsko delo Opis: V diplomski nalogi so predstavljene osnove kriptografije: elektronski podpis in šifriranje. Podrobneje smo obdelali poglavje o varovanju XML dokumentov. Spoznali smo uporabo XML elektronskega podpisa, šifriranja XML dokumentov ter tehnologije, ki sodijo zraven. Izdelali in predstavili smo spletno aplikacijo, s katero lahko podpišemo posamezen XML dokument na vse možne načine in posamezen podpis tudi preverimo. Aplikacija omogoča tudi šifriranje in dešifriranje XML dokumentov. Ključne besede: Kriptografija, elektronski podpis, šifriranje, XML dokument, XML Security, Infrastruktura javnih ključev, varnost Objavljeno: 01.09.2010; Ogledov: 1977; Prenosov: 207
Celotno besedilo (3,03 MB) |
3. QoS-oriented design of embedded systems with specification PEARLRoman Gumzej, Wolfgang A. Halang, 2007, izvirni znanstveni članek Opis: Only recently have methodical tools adequate to design real-time systems been formally introduced in design methodologies. Naturally, they were present fromthe beginning, but due to the large diversity of embedded systemsć areas of deployment, specially dedicated formalisms have been developed and used. High-level language programming and integration of modeling formalisms into design methods eased the development of more complex real-time applications. With the emerging object-oriented programming languages and design methods, their integration into larger information systems has become more transparent. It was the UML methodology, however, which eventually merged also the design methods and concepts of real-time systems into a consistent whole. It took a large consortium and a long process to persuade industry of the benefits the new integral methodology can offer. On the other hand, there are some trade-offs, and there are some features not completely covered, yet. Here, a different, more straightforward approach to program and design (embedded) real-time systems is presented. Since it emerged from the real-time community, it includes most features relevant there. Independent of the UML profile for schedulability, performance and time specification, a profile was devised for use in PEARL-oriented UML design. The strengths of the mentioned language and design methods for QoS-oriented design of (embedded) real-time systems are emphasised throughout this article. Ključne besede: real time systems, embedded systems, quality of service, co-design, co-simulation, safety, dependability, security, timeliness, determinism, readiness, reliability, portability, flexibility, specification PEARL, UML profiles, patterns Objavljeno: 31.05.2012; Ogledov: 1783; Prenosov: 103
Povezava na celotno besedilo |
4. Improvement of the Peyravian-Jeffries`s user authentication protocol and password change protocolMarko Hölbl, Tatjana Welzer-Družovec, Boštjan Brumen, 2008, izvirni znanstveni članek Opis: Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries`s remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack. Ključne besede: networks, user authentication, remote user access, password-based protocol, security Objavljeno: 31.05.2012; Ogledov: 1275; Prenosov: 60
Povezava na celotno besedilo |
5. An algorithm for protecting knowledge discovery dataBoštjan Brumen, Izidor Golob, Tatjana Welzer-Družovec, Ivan Rozman, Marjan Družovec, Hannu Jaakkola, 2003, izvirni znanstveni članek Opis: In the paper, we present an algorithm that can be applied to protect data before a data mining process takes place. The data mining, a part of the knowledge discovery process, is mainly about building models from data. We address the following question: can we protect the data and still allow the data modelling process to take place? We consider the case where the distributions of original data values are preserved while the values themselves change, so that the resulting model is equivalent to the one built with original data. The presented formal approach is especially useful when the knowledge discovery process is outsourced. The application of the algorithm is demonstrated through an example. Ključne besede: data protection algorithm, classification algorithm, disclosure control, data mining, knowledge discovery, data security Objavljeno: 01.06.2012; Ogledov: 1451; Prenosov: 35
Povezava na celotno besedilo |
6. Building data mining applications for CRMAlex Berson, Stephen Smith, Kurt Thearling, priročnik Ključne besede: information society, informatics, information technology, computer networks, internet, enterprise, electronic commerce, electronic marketing, marketing strategy, new economy, data warehousing, data base, data analysis, security, application, data structures, customer, information resources, consumer, statistics, cluster analysis, neural networks, data, trends, cases, case study Objavljeno: 01.06.2012; Ogledov: 1906; Prenosov: 46
Povezava na celotno besedilo |
7. E-everything: e-commerce, e-government, e-household, e-democracy : proceedings2001, zbornik Ključne besede: electronic commerce, government, administration, budgets, democration, computer application, users, electronic money, electronic payments, security, data analysis, information system, information science, business, commerce, models, advertising, Internet, computer networks, electronic mail, services, media, public services, regional policy, cases, retail trade Objavljeno: 01.06.2012; Ogledov: 1434; Prenosov: 21
Povezava na celotno besedilo |
8. E-everything: e-commerce, e-government, e-household, e-democracy : conference proceedings2001 Ključne besede: electronic commerce, CD-ROM, computer diskette, compact disc, government, administration, budgets, democration, computer application, users, electronic money, electronic payments, security, data analysis, information system, information science, business, commerce, models, advertising, Internet, computer networks, electronic mail, services, media, public services, regional policy, cases, retail trade Objavljeno: 01.06.2012; Ogledov: 1165; Prenosov: 20
Povezava na celotno besedilo |
9. |
10. |