National Repository of Grey Literature 255 records found  beginprevious213 - 222nextend  jump to record: Search took 0.00 seconds. 
Laboratory task of the card access system.
Minárik, Peter ; Kyselák, Martin (referee) ; Burda, Karel (advisor)
The Bachelor´s thesis is based on creating laboratory task of the card access system. Principles, technical solutions and primary parts of card access system are described in the first part of the project. The laboratory task is designed in the second part. It’s focused on getting familiar with card access systems, their setup and function.
Test implementation of the ACP protocol
Ležák, Petr ; Strašil, Ivo (referee) ; Burda, Karel (advisor)
In general this master’s thesis deals with access control methods and their individual modules and in particular with authentication of supplicants. There are listed authentication methods useful in the implementation of the ACP protocol. ACP protocol is also discussed including possibilities and uses. ACP message format is described in detail with AVP format and types. The transaction mechanism is also mentioned here. The main part of the thesis is focused on software design for protocol testing. Possibilities of the testing are discussed and test scenarios are suggested. Consequently, requirements for test software are listed and its implementation is designed. Furthermore, there is technical documentation of the program. The main ideas used in the program are explained in it. The purpose of each part of the program is written including links between them. Finally, there is a manual for the program. It also contains an illustrative example describing how to make and test a simple scenario of the authentication.
Implementation of the ACP protocol into L4 operating system
Kolarík, Tomáš ; Strašil, Ivo (referee) ; Burda, Karel (advisor)
This thesis deals with the implementation of ACP protocol which serves to manage the access for operation system based on L4 microkernel. The theoretical part of the thesis deals with methods of access management in computer networks. It focuses primarily on AAA systems which make access management possible. Furthermore it describes in detail the ACP protocol, the types of messages and their feedback. The next theoretical part is dedicated to operation systems and in particular to their architecture and services. Then we get a closer look at L4 microkernel family, their philosophy and properties. We continue with a detailed description of the L4 application interface and its ways of expansion. The practical section deals with the implemented concept of system for ACP protocol support in computers. General concept is then applied in real implementation of ACP protocol into the L4 operation system environment based on the L4 platform. To assist, I also included a detailed tutorial explaining the modeling and compilation of software for this platform. At this point we describe the methods used at the implementation and the description of particular modules and features. The end of the thesis concludes the information about the ways of testing and the implementation properties.
Backup of documents in goverment information systems
Starosta, Martin ; Babnič, Patrik (referee) ; Burda, Karel (advisor)
The thesis is focused on backup documents in the public administration information systems. First chapters of thesis are devoted to general theories of backup files and databases. Next is described storage media what is used for backups, their advantages and disadvantages. Afterwards are described the most common backup strategies and rotation scheme. Thesis is devoted after that to analysis of a representative information system that is used to publish documents to the public. Based on information obtained from analysis is selected optimal backup strategy and this strategy is implemented and tested in designed application.
Antivirus protection of a computer from a boot repository
Mlejnek, Jiří ; Malina, Lukáš (referee) ; Burda, Karel (advisor)
ABSTRACT Theme of the thesis is the design method of anti-virus protection with the use of an alternative boot store. Processed is a related issue of viruses and the possibility of defenses against them. This thesis is focused on the design and selection of components solutions enabling the execution of antivirus test from the undistorted by the operating system. With selected components continues to realize an alternative booting the operating system from a Windows platform computer network with automatic virus checking of all local disks. The results of inspection are transmitted using signed files on a network server and typically give an overview of the results of the individual tests.
Access Control System Based on ACP Protocol
Jedlička, Zdeněk ; Burda, Karel (referee) ; Strašil, Ivo (advisor)
Work is focused on the possibility of implementation of ACP into applications for mobile devices using the Android operating system ogether with the implementation of this Protocol in the hardware device. Communication is based on standard TCP / IP and UDP protocol.
Securing computer networks with IPv6 protocol
Geyer, Lukáš ; Jeřábek, Jan (referee) ; Burda, Karel (advisor)
The objective of the diploma thesis is the analysis of network attacks on local area networks with IPv6 protocol and defenses against these attacks along with methodology of the security process.
Simulator of stations with frequency hopping and collision avoidance
Akkizová, Dinara ; Pust, Radim (referee) ; Burda, Karel (advisor)
The master's thesis aims to introduce and study the issue of frequency hopping with collsion avoidance (FH/CA). On this basis, design a computer program for simulating the operation of a radio systém FHCA, who works in the band used by other systems FH/CA . This simulation programm using MATLAB software to implement verify the correctness of programs. Use simulator to obtain date about the intensity of interference systems FH/CA for the chosen scenario. This work consists of five parts: the first part consists of describing the queuing system, the second part of the description of the radio frequency system with collision avoidence FH / CA, the third part of the description of the simulation model. The fourth part includes verification of the model in the fifth and last section inspects results are shown.
Tools for analyzing security protocols
Duchovič, Adam ; Burda, Karel (referee) ; Pelka, Tomáš (advisor)
This thesis is focused on tools which are used to analyzed security protocols. In the beginning of the thesis key goals of security protocols are mentioned and also basic attacks on them are illustrated. Subsequently basic verification techniques, specification languages and verification tools are described. Next part of thesis contains description of protocols in common syntax. Then the main standards used for evaluation of information security products are mentioned. In the end of thesis two well-known verification tools – AVISPA and Scyther - are described and compared to designed methodology of comparing verification tools and their outputs.
Tunneling and Cryptographic protocols as a privacy protection on regulated internet
Čížek, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis is about internet regulations and usage of tunneling protocols as a privacy protection on regulated internet. The thesis includes detailed description of most widely used tunneling protocols focused on their usage in regulated networks. The produce the teoretical part of the thesis is synoptical comparative table including benefits and disadvantages of each protocol and examples of suitable usage. The practical part presents the tunneling protocols in three different scenarios which are very frequent in practice. Each scenario has been realized, the communication has been captured using Wireshark network protocol analyzer and also the analysis of potential risks has been done for the event that the communication would be captured by a third party - the regulator.

National Repository of Grey Literature : 255 records found   beginprevious213 - 222nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.