National Repository of Grey Literature 23 records found  beginprevious14 - 23  jump to record: Search took 0.00 seconds. 
Biometric data authentication using remote database
Menčík, Vlastimil ; Hoksza, David (referee) ; Jirovský, Václav (advisor)
A range of issues arises in biometric authentication primarily concerning protection of biometric data against security leaks and potential abuse. Biometric data is inherently irreplaceable and its protection must be a key part of an authentication system. This thesis proposes a solution, in which a remote server authenticates users without transferring their biometric data across network. The key is the introduction of representative sets of biometric samples. User's sample is matched with elements of representative set by a score function. Resulting score vector is stored in a database. Users are authenticated by scoring their biometric sample against the representative set and the resulting vector is matched with the enrolled score vector.
Dimensional analysis for HD languages
Horváth, Martin ; Jirovský, Václav (referee) ; Bednárek, David (advisor)
The engineers today use special description languages for developing electronic circuits and these enable them to test their models prior to their industrial construction. However, none of these languages provides sufficiently complex means to define physical dimensions and units for quantities used in the models and to check their consistency in all equations and computations. The inconsistency in the usage of physical units can be caused by plain typing errors but sometimes represents deep conceptual flaws. The tracking of these errors can be very difficult as the models commonly consist of thousands of lines of code. This master's thesis sets itself two goals. The first is to analyze the problem of physical dimensions, formalize their properties and devise an algorithm for automatic checking of their usage in the models written in hardware description languages. The second is to design and implement the system for annotating models with dimensional information and to implement the algorithm of dimensional analysis as a module into commercial tool ModLyng which is the integrated environment for developing analog/mixed-signal integrated circuits. The usage of this automatic analysis will help engineers in writing correct models and will speed up their development.
Multimedia Grid
Šimko, Viliam ; Galamboš, Leo (advisor) ; Jirovský, Václav (referee)
The thesis describes the possibilities and issues of existing videoconferencing systems. We focus on open-source solutions for group-to-group communication especially the AccessGrid technology that utilizes the multicast packet delivery method of multimedia content. We describe AccessGrid node created for CIANT organization, which has been taken as a starting point for de ning the architecture of a videoconferencing system based exclusively on open-source components, particularly Linux and related software. We address issues related to rewalls and NAT traversal and provide a comparison of various videoconference-related codecs and protocols. Finally, the text touches the question of recording and archiving of conference sessions and provides a new integrated recording application { StreamVNC. The tool allows users to prepare their presentations using localhost recording facility which includes AGVCR for recoding RTP packets, EVIC for grabbing the VNC display and camera source and RAT as an audio encoder.
Authentization in distributed web caching environment
Miňo, Tomáš ; Bulej, Lubomír (referee) ; Jirovský, Václav (advisor)
Web servers migth contain sensitive informations, which require authentication. To decrease load of these server, distributed cache system can be used. This thesis consider some proposal of authentication within distributed cache system, which has to follow the security politics of the original server, but without replication the database of access control rules from the original server. Next, the security analysis and prototype implementation of the proposal is accomplished and described.
Wireless Networks Security
Turek, Lukáš ; Forst, Libor (advisor) ; Jirovský, Václav (referee)
This thesis compares the security of several wireless technologies and studies the security of networks based on IEEE 802.11 standard more in detail. Methods of securing are assessed in the view of resistance against eavesdropping, unauthorized access, DoS attacks and also attacks from inside of the network. Examples of configuration and in some cases also ways of attack are demonstrated. The thesis also studies related problems of secure passwords selection of and stored login data protection. At the end it suggests a way of securing a home network, a company network and a network of Internet service provider.
The VoIP protocols real time analyzer
Dvořák, Michal ; Jirovský, Václav (advisor) ; Kvítek, Petr (referee)
This thesis goal is to desing an application which would allow real-time monitoring and analyzing of services for transferring voice over the Internet network, based on the study of the relevant standards. The thesis focuses on monitoring the H.323 standard. An implementation is a part of this thesis.
Topological analysis of computer network threats
Řeháková, Jaroslava Antea ; Trčka, Martin (referee) ; Jirovský, Václav (advisor)
To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level vulnerabilities can be combined to achieve high-level attack goals. In this project, we describe a tool that implements a topological approach to network vulnerability analysis. Out TAU Model includes modeling of network security conditions and attack techniques with use of preconditions/postconditions dependencies. An important part of TAU Model is The Graph of Dependencies that is used for creating exploit sequences leading to specifics attack goals. This representation enables highly scalable methods of vulnerability analysis, such as discovering security flaws of given network configuration. An important subject of this project is discussion about complexity and stopping of TAU Model computation. We also mention future extension possibilities and technical challenges.
Framework for on-line service security risk management
Mészáros, Jan ; Buchalcevová, Alena (advisor) ; Čermák, Igor (referee) ; Doucek, Petr (referee) ; Jirovský, Václav (referee)
This dissertation thesis is dedicated to on-line services security management from service provider's and service consumer's viewpoints. The main goal is to propose a framework for on-line services security risk management, to develop a supporting software tool prototype and to validate them through a case study performed in a real-world environment. The key components of the proposed framework are a threat model and a risk model. These models are designed to fit specific features of on-line services and the surrounding environment. A risk management process is an integral part of the framework. The process is suitable for frequent and recurrent risk assessments. The process comprises of eight steps, related roles and responsibilities are defined for each step. The process execution results in identification and execution of proper tasks which contribute to treatment of identified security risks and deficiencies. Documentation and reporting of an overall level of on-line services security over time is possible if the process is executed on a regular basis. The proposed framework was validated through a case study performed in a large enterprise environment.

National Repository of Grey Literature : 23 records found   beginprevious14 - 23  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.