10 research outputs found

    Context Sensitive Access Control Model TI for Business Processes

    Get PDF
    Kontrola pristupa odnosno autorizacija, u širem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova disertacija se bavi problemima kontrole pristupa u poslovnim sistemima. Tema disertacije je formalna specifkacija modela kontekstno zavisne kontrole pristupa u poslovnim sistemima koji je baziran na RBAC modelu kontrole pristupa. Uvođenjem kontekstno zavisne kontrole pristupa omogućeno je defnisanje složenijih prava pristupa koje u postojećim modelima kontrole pristupa za poslovne sisteme nije bilo moguće realizovati ili bi njihova realizacija bila komplikovana. Dati model primenljiv je u različitim poslovnim sistemima, a podržava defnisanje prava pristupa kako za jednostavne tako i za slo·zene poslovne tokove. Sistem je verifkovan na dva realna poslovna procesa pomoću razvijenog prototipa. Prikazana prototipska implementacija koja ispunjava ciljeve u pogledu funkcionalnosti postavljene pred sistem predstavlja potvrdu praktične vrednosti predloženog modela.Access control is concerned with the way in which users can access to resources in the computer system. This dissertation focuses on problems of access control for business processes. The subject of the dissertation is a formal specification of the RBAC-based context sensitive access control model for business processes. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation in existing access control models for business processes is not possible or is very complicated. The given model is applicable in diferent business systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by two case studies on real business processes. The presented prototype implementation represents a proof of the proposed model's practical value

    Context Sensitive Access Control Model TI for Business Processes

    Get PDF
    Kontrola pristupa odnosno autorizacija, u širem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova disertacija se bavi problemima kontrole pristupa u poslovnim sistemima. Tema disertacije je formalna specifkacija modela kontekstno zavisne kontrole pristupa u poslovnim sistemima koji je baziran na RBAC modelu kontrole pristupa. Uvođenjem kontekstno zavisne kontrole pristupa omogućeno je defnisanje složenijih prava pristupa koje u postojećim modelima kontrole pristupa za poslovne sisteme nije bilo moguće realizovati ili bi njihova realizacija bila komplikovana. Dati model primenljiv je u različitim poslovnim sistemima, a podržava defnisanje prava pristupa kako za jednostavne tako i za slo·zene poslovne tokove. Sistem je verifkovan na dva realna poslovna procesa pomoću razvijenog prototipa. Prikazana prototipska implementacija koja ispunjava ciljeve u pogledu funkcionalnosti postavljene pred sistem predstavlja potvrdu praktične vrednosti predloženog modela.Access control is concerned with the way in which users can access to resources in the computer system. This dissertation focuses on problems of access control for business processes. The subject of the dissertation is a formal specification of the RBAC-based context sensitive access control model for business processes. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation in existing access control models for business processes is not possible or is very complicated. The given model is applicable in diferent business systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by two case studies on real business processes. The presented prototype implementation represents a proof of the proposed model's practical value

    A Blockchain Solution for Securing Real Property Transactions: A Case Study for Serbia

    No full text
    The origins of digital money and blockchain technology goes back to the 1980s, but in the last decade, the blockchain technology gained large popularity in the financial sector with the appearance of cryptocurrencies such as Bitcoin. However, recently, many other fields of application have been recognized, particularly with the development of smart contracts. Among them is the possible application of blockchain technology in the domain of land administration, mostly as a tool for transparency in the developing countries and means to fight corruption. However, developed countries also find interest in launching pilot projects to test their applicability in land administration domain for reasons such as to increase the speed and reduce costs of the real property transactions through a more secure environment. In this paper, we analyse how transactions are handled in Serbian land administration and how this process may be supported by modern ledger technologies such as blockchain. In order to analyse how blockchain could be implemented to support transactions in land information systems (LIS), it is necessary to understand cadastral processes and transactions in LIS, as well as legislative and organizational aspects of LIS. Transactions in cadastre comprise many actors and utilize both alphanumeric (descriptive or legal) data and geospatial data about property boundaries on the cadastral map. Based on the determined requirements for the blockchain-based LIS, we propose a system architecture for its implementation. Such a system keeps track of transactions in LIS in an immutable and tamper-proof manner to increase the security of the system and consequently increase the speed of transactions, efficiency, and data integrity without a significant impact on the existing laws and regulations. The system is anticipated as a permissioned public blockchain implemented on top of the Ethereum network

    Prikaz realizacije mrežne digitalne biblioteke doktorskih, magistarskih i diplomskih radova = Overview of implementation of the networked digital library of theses and dissertations

    Get PDF
    The paper is an overview of the realisation of the project Networked Digital Library of Theses and Dissertations. The project has been financed by the Provincial Secretariat for Science and Technological Development of AP Vojvodina and is being carried out at the University of Novi Sad. The underlying software architecture of the system is a multi-layered Internet application which can be run on various hardware and software platforms. The client side layer is a web-based user interface enabling updating the database and user search

    Preparation, crystal structure and antibacterial activity of condensation products of usnic acid and acyl hydrazides

    No full text
    Three condensation products of usnic acid with the hydrazides of alpha-naphthoic, caprylic, and oxamic acids, respectively, have been prepared and characterized by spectrometric methods. A reassignment of the C-13-NMR spectral data of usnic acid has been done. The crystal structure of usnic acid 11-[(1-naphthoyl)hydrazone] ethanol solvate (1:1) has been determined. This substance crystallizes in the monoclinic crystal system, the space group P2(1), with the unit cell dimensiones a=7.7365(7) Angstrom, b = 19.632(2) Angstrom, c = 9.4150(15) Angstrom, beta = 108.830(11)degrees, V = 1405.0(4) Angstrom(3), and Z=2. At the end of the structure analysis R = 0.055, R-w = 0.052 and S = 0.89. The antibacterial activities of the compounds have been evaluated. The greatest activity against Staphylococcus aureus was found for usnic acid, somewhat lower for the derivatives with hydrazides of alpha-naphthoic and caprylic acid, and much lower for the derivative with semioxamazide. The activities of these compounds probably depend on their lipophilicity

    Preparation, crystal structure and antibacterial activity of condensation products of usnic acid and acyl hydrazides

    No full text
    Three condensation products of usnic acid with the hydrazides of alpha-naphthoic, caprylic, and oxamic acids, respectively, have been prepared and characterized by spectrometric methods. A reassignment of the C-13-NMR spectral data of usnic acid has been done. The crystal structure of usnic acid 11-[(1-naphthoyl)hydrazone] ethanol solvate (1:1) has been determined. This substance crystallizes in the monoclinic crystal system, the space group P2(1), with the unit cell dimensiones a=7.7365(7) Angstrom, b = 19.632(2) Angstrom, c = 9.4150(15) Angstrom, beta = 108.830(11)degrees, V = 1405.0(4) Angstrom(3), and Z=2. At the end of the structure analysis R = 0.055, R-w = 0.052 and S = 0.89. The antibacterial activities of the compounds have been evaluated. The greatest activity against Staphylococcus aureus was found for usnic acid, somewhat lower for the derivatives with hydrazides of alpha-naphthoic and caprylic acid, and much lower for the derivative with semioxamazide. The activities of these compounds probably depend on their lipophilicity

    Crystal Structure of 2-{1-[(1-(2-Pyridinio)ethylidene) hydrazono]ethyl}pyridinium diperchlorate, the Product of Template Condensation in the Presence of Cr(III)

    No full text
    In an attempt to synthesize a Cr(III) complex of 20-[1-(2-pyridinyl)ethylidene]oxamohydrazide an azine product 2-{1-[(1-(2-pyridinio)ethylidene)hydrazono]ethyl} pyridinium diperchlorate was obtained by an electrophilic acyl substitution catalyzed by Cr(III). Its structure was determined by X-ray crystal analysis and showed significant changes in comparison to the corresponding unprotonated compound. The 2-{1-[(1-(2-pyridinio)ethylidene)hydrazono] ethyl}pyridinium diperchlorate crystallizes in the space group P2(1)/n of the monoclinic crystal system with unit cell parameters a = 14.3809(3) angstrom, b = 24.1516(5) angstrom, c = 15.4471(3) angstrom, beta = 99.930(2)degrees, V = 5284.74(19) angstrom(3) and Z = 12, i.e. three molecules per asymmetric unit
    corecore