Wydział Fizyki Technicznej, Informatyki i Matematyki Stosowanej / Faculty of Technical Physics, Information Technology and Applied Mathematics / W7

Stały URI zbioruhttp://hdl.handle.net/11652/7

Przeglądaj

Wyniki wyszukiwania

Teraz wyświetlane 1 - 5 z 5
  • Pozycja
    Virtual Money for Purchases in School Shops and for Educational Applications: eZloty
    (Wydawnictwo Politechniki Łódzkiej, 2018) Pawlak, Michał; Guziur, Jakub; Poniszewska-Marańda, Aneta; Stolarek, Jan
    Recent developments in Polish legislation concerning the healthiness of products in schools shops and results of law compliance verification resulted in a need for a way to supervise purchases in school shops. In this article, a solution for this problem is presented in a form of an online payment platform utilizing virtual currency called eZloty. The platform is based on blockchain technology which allows storing transaction history in an immutable form. As a result, eZloty payment system would enable supervision of products bought in schools, thus creating a possibility for more directed actions promoting healthy food and compliance with ministry regulations.
  • Pozycja
    Selected aspects of security mechanisms for cloud computing – current solutions and development perspectives
    (Komisja Informatyki Polskiej Akademii Nauk, Oddział w Gdańsku, 2014) Poniszewska-Marańda, Aneta
    The security aspects of cloud computing, especially the security of data, become more and more important. It is necessary to find and develop the new mechanisms to secure the cloud. The problem presented in the paper concerns the mechanisms for security of cloud computing with special attention paid to aspects of access control in clouds – the state of the art and the perspectives for the future.
  • Pozycja
    Model driven architecture for modeling of logical security based on RBAC approach
    (Wydawnictwo Politechniki Łódzkiej, 2014) Poniszewska-Marańda, Aneta
    This paper presents an approach of role-based access control (RBAC) for information systems with the use of MDA (Model Driven Architecture). The main purpose is to join the concepts of MDA approach with the concepts of access control models, in particular with the concepts of access control based on roles and on usage concept. To reach this objectives the appropriate solution was created to model the extended RBAC model and URBAC model with the use of concepts and tools of software engineering, in particular MDA methodology and UML (Unified Modeling Language). The presented approach was developed for role engineering in the aspects of logical security of information systems.
  • Pozycja
    Multi-agent system to assure the logical security of data in distributed information system
    (Wydawnictwo Politechniki Łódzkiej, 2013) Poniszewska-Marańda, Aneta
    The increased availability of information as a whole became an important problem and threat for its security, especially security of sensitive and confidential information and that is why the necessity to assure the security of such data became undeniable. The developers of applications an information systems put more and more stress on the aspect of their security and safety. Development of information systems has to answer more and more to problems connected to federated data sources and problems of heterogeneous distributed information systems. It is necessary to propose the architecture for secure cooperation of such systems. The paper presents the practical application of concepts of multi-agent systems in domain of logical security of data in distributed information systems. The purpose of presented solution is to support the process management of IT project realization based on the software creation methodologies.
  • Pozycja
    Administration of access control in information systems using URBAC model
    (Wydawnictwo Politechniki Łódzkiej, 2011) Poniszewska-Marańda, Aneta
    Since the value of information is constantly growing more and more businesses are in need for information system to aid them with information gathering and processing. The most important issue that arises here is how to ensure safety of this data that may be held on servers, personal computers or PDAs. This is where access control comes in. The main role of access control is to ensure that no unauthorized user will be able to gain access to resources and be able to copy or modify them. The paper deals with the process of access control administration in information systems with the use of usage role-based control approach. The presented process is based on the role engineering concept that includes the creation of security schema of access control divided between two actors - application/system developer and security administrator. They realize their tasks during two main phases that allow to define the complete access control schema for information systems of an organization.