Project detail
Security-Oriented Research in Information Technology
Duration: 1.1.2007 — 31.12.2013
Funding resources
Ministerstvo školství, mládeže a tělovýchovy ČR - Institucionální prostředky SR ČR (např. VZ, VC)
On the project
Společnost založená na znalostech, která využívá moderní informační technologie (IT) v každodenním životě, je a bude stále více ohrožena úmyslným či neúmyslným zneužitím těchto technologií. Současně ale vhodné využití informačních technologií nabízí velký potenciál při ochraně společnosti před různými typy hrozeb, včetně terorismu. Předmětem výzkumného záměru je proto výzkum informačních technologií z hlediska bezpečnosti. Jedná se zejména o systematické rozvíjení konceptu „návrhu pro bezpečnost“ (design for security) v oblasti informačních technologií (tj. vývoj IT s ohledem na jejich spolehlivost a bezpečnost) a výzkum možností využití informačních technologií pro posílení bezpečnosti společnosti (vytváření nových přístupů k analýze, monitorování a předvídání potenciálně nebezpečných aktivit).
Description in English
A knowledge-based society, which utilizes modern information technology in everyday life, is and will be increasingly endangered by intentional as well as involuntary misuse of that technology. Simultaneously, a proper use of information technology offers a great potential for the protection of society against various kinds of threats, including terrorism. Hence, the subject of this research plan is the security-oriented research in information technology. The main goals of the research plan are to systematically develop the concept of the “design for security” in the area of information technology and to explore possible applications of information technology in order to strengthen the security of society . The research plan will mainly be oriented to the following areas of information technology: speakers recognition and keyword spotting in various languages, search of video sequences for specific objects and persons, datamining of sensitive information in databases, biometric authentication, etc.
Keywords
informační technologie, bezpečnost
Key words in English
information technology; security
Mark
MSM0021630528
Default language
Czech
People responsible
Hruška Tomáš, prof. Ing., CSc. - principal person responsible
Bartík Vladimír, Ing., Ph.D. - fellow researcher
Bidlo Michal, doc. Ing., Ph.D. - fellow researcher
Burgetová Ivana, Ing., Ph.D. - fellow researcher
Drábek Vladimír, doc. Ing., CSc. - fellow researcher
Erlebach Pavel, Ing., Ph.D. - fellow researcher
Gajda Zbyšek, Ing., Ph.D. - fellow researcher
Granát Jiří, Ing. - fellow researcher
Grézl František, Ing., Ph.D. - fellow researcher
Holík Lukáš, doc. Mgr., Ph.D. - fellow researcher
Honzík Jan M., prof. Ing., CSc. - fellow researcher
Chmelař Petr, Ing. - fellow researcher
Chudý Peter, doc. Ing., Ph.D., MBA - fellow researcher
Karafiát Martin, Ing., Ph.D. - fellow researcher
Kreslíková Jitka, doc. RNDr., CSc. - fellow researcher
Křivka Zbyněk, Ing., Ph.D. - fellow researcher
Kumpošt Marek, RNDr., Ph.D. - fellow researcher
Kunc Michael, Ing. - fellow researcher
Květoňová Šárka, Ing., Ph.D. - fellow researcher
Lampa Petr, Ing. - fellow researcher
Units
Department of Information Systems
- responsible department (27.2.2007 - not assigned)
Faculty of Information Technology
- responsible department (30.3.2008 - not assigned)
Automated Analysis and Verification Research Group - VeriFIT
- internal (27.2.2007 - 31.12.2013)
Management of software engineering Research Group
- internal (27.2.2007 - 31.12.2013)
Faculty of Information Technology
- co-beneficiary (27.2.2007 - 31.12.2013)
Faculty of Information Technology
- beneficiary (30.3.2008 - not assigned)
Results
ČERMÁK, M.; MEDUNA, A. n-Accepting Restricted Pushdown Automata Systems. 7th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science. Brno: Masaryk University, 2011. p. 0-0. ISBN: 978-80-214-4305-1.
Detail
HOZZA, T.; RYŠAVÝ, O.: AclCheck; AclCheck. Nástroj včetně zdrojových souborů je dostupný na http://code.google.com/p/acl-check/.. URL: https://www.fit.vut.cz/research/product/258/. (software)
Detail
KAZZAZ, M. Semantic Services Migration. Proceedings of the 18th Conference STUDENT EEICT 2012 Volume 3. Brno: Brno University of Technology, 2012. p. 386-390. ISBN: 978-80-214-4462-1.
Detail
POLČÁK, L. Challenges in Identification in Future Computer Networks. ICETE 2014 Doctoral Consortium. Wien: SciTePress - Science and Technology Publications, 2014. p. 15-24.
Detail
CHMELAŘ, P.; MLÍCH, J.; PEŠEK, M.; VOLF, T.; ZEMČÍK, P.; ZENDULKA, J. Brno University of Technology at TRECVid 2013: Interactive Surveillance Event Detection. 2013 TREC Video Retrieval Evaluation Notebook Papers and Slides. Gaithersburg: 2013. p. 1-9.
Detail
KOUTNÝ, J. Grammars with Restricted Derivation Trees. Brno: 2012. p. 0-0.
Detail
HOLÍK, L.; JONSSON, B.; LENGÁL, O.; VOJNAR, T.; TRINH, Q.; ABDULLA, P. Verification of Heap Manipulating Programs with Ordered Data by Extended Forest Automata. FIT-TR-2013-02, Brno: Faculty of Information Technology BUT, 2013. p. 1-35.
Detail
HOLÍK, L.; LENGÁL, O.; ROGALEWICZ, A.; ŠIMÁČEK, J.; VOJNAR, T. Fully Automated Shape Analysis Based on Forest Automata. FIT-TR-2013-01, Brno: Faculty of Information Technology BUT, 2013. p. 1-25.
Detail
HELLER, S.; VOLF, T. Datastore MongoDB Stub pro Google App Engine SDK. Datakon a Znalosti 2013. 1. vydání. Ostrava: VŠB Technická univerzita Ostrava, 2013. s. 195-204. ISBN: 978-80-248-3189-3.
Detail
MILIČKA, M.; BURGET, R. RDF-based Modelling of Web Documents on Different Levels of Abstraction. Proceedings of the 12th annual conference Znalosti 2013. Ostrava: VŠB-Technical University of Ostrava, 2013. p. 127-132. ISBN: 978-80-248-3189-3.
Detail
DUDKA, K.; PERINGER, P.; VOJNAR, T. Byte-Precise Verification of Low-Level List Manipulation. FIT-TR-2012-04, Brno: Faculty of Information Technology BUT, 2013. p. 0-0.
Detail
DRAHANSKÝ, M. Biometrie - Detekce živosti na prstech. Brno: Rotary Club Brno City - District 2240, 2013. s. 0-0.
Detail
ROGALEWICZ, A.; ŠIMÁČEK, J.; IOSIF, R. The Tree Width of Separation Logic with Recursive Definitions. arXiv:1301.5139: 2013. p. 0-0.
Detail
HORÁČEK, P. Application Perspectives of Synchronous Matrix Grammars. Proceedings of the 19th Conference STUDENT EEICT 2013 Volume 3. Brno: Brno University of Technology, 2013. p. 202-206. ISBN: 978-80-214-4695-3.
Detail
VRÁBELOVÁ, P. Wavelet Based Feature Extraction of Be Stars Spectra. Proceedings of the 19th Conference STUDENT EEICT 2013. Vol. 3. Brno: Brno University of Technology, 2013. p. 40-44. ISBN: 978-80-214-4695-3.
Detail
ZEMEK, P. One-Sided Random Context Grammars: Established Results and Open Problems. Proceedings of the 19th Conference STUDENT EEICT 2013 Volume 3. Brno: Brno University of Technology, 2013. p. 222-226. ISBN: 978-80-214-4695-3.
Detail
ZACHARIÁŠOVÁ, M.; LENGÁL, O. Towards Beneficial Hardware Acceleration in HAVEN: Evaluation of Testbed Architectures. Lecture Notes in Computer Science, 2012, vol. 2013, no. 7857, p. 266-273. ISSN: 0302-9743.
Detail
ZACHARIÁŠOVÁ, M.; LENGÁL, O. Towards Beneficial Hardware Acceleration in HAVEN: Evaluation of Testbed Architectures. FIT-TR-2012-03, Brno: Faculty of Information Technology BUT, 2012. p. 0-0.
Detail
VAŠÍČEK, Z. Acceleration Methods for Evolutionary Design of Digital Circuits. Brno: 2012. p. 0-0.
Detail
DUDKA, V.; KŘENA, B.; LETKO, Z.; VOJNAR, T. Testing of Concurrent Programs Using Genetic Algorithms. FIT-TR-2012-01, Brno: 2012. p. 0-0.
Detail
Link
Responsibility: Hruška Tomáš, prof. Ing., CSc.