Project detail

Security-Oriented Research in Information Technology

Duration: 1.1.2007 — 31.12.2013

Funding resources

Ministerstvo školství, mládeže a tělovýchovy ČR - Institucionální prostředky SR ČR (např. VZ, VC)

On the project

Společnost založená na znalostech, která využívá moderní informační technologie (IT) v každodenním životě, je a bude stále více ohrožena úmyslným či neúmyslným zneužitím těchto technologií. Současně ale vhodné využití informačních technologií nabízí velký potenciál při ochraně společnosti před různými typy hrozeb, včetně terorismu. Předmětem výzkumného záměru je proto výzkum informačních technologií z hlediska bezpečnosti. Jedná se zejména o systematické rozvíjení konceptu „návrhu pro bezpečnost“ (design for security) v oblasti informačních technologií (tj. vývoj IT s ohledem na jejich spolehlivost a bezpečnost) a výzkum možností využití informačních technologií pro posílení bezpečnosti společnosti (vytváření nových přístupů k analýze, monitorování a předvídání potenciálně nebezpečných aktivit).

Description in English
A knowledge-based society, which utilizes modern information technology in everyday life, is and will be increasingly endangered by intentional as well as involuntary misuse of that technology. Simultaneously, a proper use of information technology offers a great potential for the protection of society against various kinds of threats, including terrorism. Hence, the subject of this research plan is the security-oriented research in information technology. The main goals of the research plan are to systematically develop the concept of the “design for security” in the area of information technology and to explore possible applications of information technology in order to strengthen the security of society . The research plan will mainly be oriented to the following areas of information technology: speakers recognition and keyword spotting in various languages, search of video sequences for specific objects and persons, datamining of sensitive information in databases, biometric authentication, etc.

Keywords
informační technologie, bezpečnost

Key words in English
information technology; security

Mark

MSM0021630528

Default language

Czech

People responsible

Hruška Tomáš, prof. Ing., CSc. - principal person responsible
Bartík Vladimír, Ing., Ph.D. - fellow researcher
Bidlo Michal, doc. Ing., Ph.D. - fellow researcher
Burgetová Ivana, Ing., Ph.D. - fellow researcher
Drábek Vladimír, doc. Ing., CSc. - fellow researcher
Erlebach Pavel, Ing., Ph.D. - fellow researcher
Gajda Zbyšek, Ing., Ph.D. - fellow researcher
Granát Jiří, Ing. - fellow researcher
Grézl František, Ing., Ph.D. - fellow researcher
Holík Lukáš, doc. Mgr., Ph.D. - fellow researcher
Honzík Jan M., prof. Ing., CSc. - fellow researcher
Chmelař Petr, Ing. - fellow researcher
Chudý Peter, doc. Ing., Ph.D., MBA - fellow researcher
Karafiát Martin, Ing., Ph.D. - fellow researcher
Kreslíková Jitka, doc. RNDr., CSc. - fellow researcher
Křivka Zbyněk, Ing., Ph.D. - fellow researcher
Kumpošt Marek, RNDr., Ph.D. - fellow researcher
Kunc Michael, Ing. - fellow researcher
Květoňová Šárka, Ing., Ph.D. - fellow researcher
Lampa Petr, Ing. - fellow researcher

Units

Department of Information Systems
- responsible department (27.2.2007 - not assigned)
Faculty of Information Technology
- responsible department (30.3.2008 - not assigned)
Automated Analysis and Verification Research Group - VeriFIT
- internal (27.2.2007 - 31.12.2013)
Management of software engineering Research Group
- internal (27.2.2007 - 31.12.2013)
Faculty of Information Technology
- co-beneficiary (27.2.2007 - 31.12.2013)
Faculty of Information Technology
- beneficiary (30.3.2008 - not assigned)

Results

ČERMÁK, M.; MEDUNA, A. n-Accepting Restricted Pushdown Automata Systems. 7th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science. Brno: Masaryk University, 2011. p. 0-0. ISBN: 978-80-214-4305-1.
Detail

HOZZA, T.; RYŠAVÝ, O.: AclCheck; AclCheck. Nástroj včetně zdrojových souborů je dostupný na http://code.google.com/p/acl-check/.. URL: https://www.fit.vut.cz/research/product/258/. (software)
Detail

KAZZAZ, M. Semantic Services Migration. Proceedings of the 18th Conference STUDENT EEICT 2012 Volume 3. Brno: Brno University of Technology, 2012. p. 386-390. ISBN: 978-80-214-4462-1.
Detail

POLČÁK, L. Challenges in Identification in Future Computer Networks. ICETE 2014 Doctoral Consortium. Wien: SciTePress - Science and Technology Publications, 2014. p. 15-24.
Detail

CHMELAŘ, P.; MLÍCH, J.; PEŠEK, M.; VOLF, T.; ZEMČÍK, P.; ZENDULKA, J. Brno University of Technology at TRECVid 2013: Interactive Surveillance Event Detection. 2013 TREC Video Retrieval Evaluation Notebook Papers and Slides. Gaithersburg: 2013. p. 1-9.
Detail

KOUTNÝ, J. Grammars with Restricted Derivation Trees. Brno: 2012. p. 0-0.
Detail

HOLÍK, L.; JONSSON, B.; LENGÁL, O.; VOJNAR, T.; TRINH, Q.; ABDULLA, P. Verification of Heap Manipulating Programs with Ordered Data by Extended Forest Automata. FIT-TR-2013-02, Brno: Faculty of Information Technology BUT, 2013. p. 1-35.
Detail

HOLÍK, L.; LENGÁL, O.; ROGALEWICZ, A.; ŠIMÁČEK, J.; VOJNAR, T. Fully Automated Shape Analysis Based on Forest Automata. FIT-TR-2013-01, Brno: Faculty of Information Technology BUT, 2013. p. 1-25.
Detail

HELLER, S.; VOLF, T. Datastore MongoDB Stub pro Google App Engine SDK. Datakon a Znalosti 2013. 1. vydání. Ostrava: VŠB Technická univerzita Ostrava, 2013. s. 195-204. ISBN: 978-80-248-3189-3.
Detail

MILIČKA, M.; BURGET, R. RDF-based Modelling of Web Documents on Different Levels of Abstraction. Proceedings of the 12th annual conference Znalosti 2013. Ostrava: VŠB-Technical University of Ostrava, 2013. p. 127-132. ISBN: 978-80-248-3189-3.
Detail

DUDKA, K.; PERINGER, P.; VOJNAR, T. Byte-Precise Verification of Low-Level List Manipulation. FIT-TR-2012-04, Brno: Faculty of Information Technology BUT, 2013. p. 0-0.
Detail

DRAHANSKÝ, M. Biometrie - Detekce živosti na prstech. Brno: Rotary Club Brno City - District 2240, 2013. s. 0-0.
Detail

ROGALEWICZ, A.; ŠIMÁČEK, J.; IOSIF, R. The Tree Width of Separation Logic with Recursive Definitions. arXiv:1301.5139: 2013. p. 0-0.
Detail

HORÁČEK, P. Application Perspectives of Synchronous Matrix Grammars. Proceedings of the 19th Conference STUDENT EEICT 2013 Volume 3. Brno: Brno University of Technology, 2013. p. 202-206. ISBN: 978-80-214-4695-3.
Detail

VRÁBELOVÁ, P. Wavelet Based Feature Extraction of Be Stars Spectra. Proceedings of the 19th Conference STUDENT EEICT 2013. Vol. 3. Brno: Brno University of Technology, 2013. p. 40-44. ISBN: 978-80-214-4695-3.
Detail

ZEMEK, P. One-Sided Random Context Grammars: Established Results and Open Problems. Proceedings of the 19th Conference STUDENT EEICT 2013 Volume 3. Brno: Brno University of Technology, 2013. p. 222-226. ISBN: 978-80-214-4695-3.
Detail

ZACHARIÁŠOVÁ, M.; LENGÁL, O. Towards Beneficial Hardware Acceleration in HAVEN: Evaluation of Testbed Architectures. Lecture Notes in Computer Science, 2012, vol. 2013, no. 7857, p. 266-273. ISSN: 0302-9743.
Detail

ZACHARIÁŠOVÁ, M.; LENGÁL, O. Towards Beneficial Hardware Acceleration in HAVEN: Evaluation of Testbed Architectures. FIT-TR-2012-03, Brno: Faculty of Information Technology BUT, 2012. p. 0-0.
Detail

VAŠÍČEK, Z. Acceleration Methods for Evolutionary Design of Digital Circuits. Brno: 2012. p. 0-0.
Detail

DUDKA, V.; KŘENA, B.; LETKO, Z.; VOJNAR, T. Testing of Concurrent Programs Using Genetic Algorithms. FIT-TR-2012-01, Brno: 2012. p. 0-0.
Detail

Link