Miroslav Bača

Miroslav Bača
  • Prof.dr.sc.
  • Head of Department at University of Zagreb Faculty of Organization and Informatics

About

110
Publications
83,352
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
662
Citations
Introduction
Current institution
University of Zagreb Faculty of Organization and Informatics
Current position
  • Head of Department
Additional affiliations
April 2010 - November 2014
University of Zagreb
Position
  • Head of Centre
May 2014 - present
University of Zagreb
Position
  • Computer Forensics
Description
  • Computer Forensic
Position
  • Business Government Information Systems (PITUP FOI) Business Application of Biometrics Data (PITUP FOI) Internet Security (BS FOI) Government Information Systems (BS FOI) Chosen Topics in Biometrics (BS FOI) Methods for Retrieval and Clasification of Information (BS FOI) Computer Security (BS FPZ) Security of Business Information Systems (MSc FOI) Misuse in Information Systems (MSc FOI) Biometrics and System Security (MSc FOI)) Computer Security (MSc FOI) Biometrics and IT (MSc FPZ) Integral Information System Security System (PhD FOI)
Education
April 2008
Evaluation of Information Privacy , European Privacy Seal, Technical Expert
Field of study
January 2008
Expert Witenees for Informatics
Field of study
March 2006
ISO/IEC 17799/27001:2005 Implementation and Consultancy
Field of study

Publications

Publications (110)
Conference Paper
In the past two decades ambient intelligence (AmI) has been a focus of research in different fields and from different points of view. It can be defined as an electronic environment consisting of devices capable of recognising people presence and responding in a certain way. The security and privacy in these kind of environments is still a challeng...
Article
Full-text available
Today there is no criminal investigation that does not contain a digital dimension. A large number of criminal offenses, whether official investigations conducted by judicial bodies or corporate investigations, contain digital evidence, which in most investigations is key to the identification of perpetrators. Since the cyber space is undefined, it...
Article
Full-text available
Today there is no criminal investigation that does not contain a digital dimension. A large number of criminal offenses, whether official investigations conducted by judicial bodies or corporate investigations, contain digital evidence, which in most investigations is key to the identification of perpetrators. Since the cyber space is undefined, it...
Conference Paper
Full-text available
Acquisition of volatile data for further forensic analysis still represents a challenge to both practitioners and researchers. The current tools used for acquisition of such data are focused exclusively on a way to capture content. However, the development of forensic science, in particular in the area of digital evidence in terms of the admissibil...
Article
Full-text available
Everyday spread use of biometric system in many fields of human life as security or access control systems make serious concern about its reliability. Actual research concerning analysis of technical function impact on general function of biometric system taking into account hardware characteristics, software functionality and its performance param...
Article
Full-text available
In this paper authors will discuss about metadata of digital evidence, digital chain of custody and framework for digital evidence management. A concretization of DEMF - Digital Evidence Management Framework will be presented. DEMF is a framework that was developed on conceptual – ontology level, and now programmed in java. One case study from real...
Article
Full-text available
In this paper authors will discuss about (digital) privacy. They will try to define a new approach to defining a digital privacy and propose a framework for «calculating» a percentage of privacy in a specific case. Most important factors and representation of this framework will be presented. It will be proposed a set of concepts mostly used in thi...
Presentation
Full-text available
DEMF Framework - presentation
Article
Full-text available
Biometric systems play an important role in digital investigation process as a important factor of authentication and verification applications, since they are strongly linked to the holder of a biometric traits and possible suspect. Thus it is important that biometric systems can be designed to withstand attacks when employed in security-critical...
Article
Full-text available
Biometric systems play an important role in digital investigation process as a important factor of authentication and verification applications, since they are strongly linked to the holder of a biometric traits and possible suspect. Thus it is important that biometric systems can be designed to withstand attacks when employed in security-critical...
Conference Paper
Full-text available
This paper deals with a new challenge for digital forensic experts - the forensic analysis of social networks. There is a lot of identity theft, theft of personal data, public defamation, cyber stalking and other criminal activities on social network sites. This paper will present a forensic analysis of social networks and cloud forensics in the in...
Article
Full-text available
Personal signature has become an important part of human identity verification. Therefore, it is important to protect ones signature and be able to detect signature forgery. We present a statistical based approach to signature verification with user oriented signature feature weights. Only basic on-line signature features are used in the verificati...
Chapter
Full-text available
http://www.intechopen.com/books/new-trends-and-developments-in-biometrics/basic-principles-and-trends-in-hand-geometry-and-hand-shape-biometrics
Conference Paper
Full-text available
Biometric face recognition is one of the fields of computer vision. The part of biometric person identification has been extensivly researched. This resulted in a large number of algorithms used for person identification. This paper gives an overview and classification of those algorithms. Because of large number of algorithms, knowledge visualizat...
Conference Paper
Application of biometric tools today is a major challenge for developers of biometric systems and for users of those systems. A specific application can be seen in systems requiring a certain accuracy in person authentication. A large number of systems is created in a way that the algorithms used are not verified as standardized, thus causing uncer...
Conference Paper
Full-text available
Aging process affects the appearance of people in different ways. One of the changes caused by aging are changes in craniofacial morphology of individuals. Different models of facial aging exist and this paper will apply anthropometric model of facial aging on pictures of 20 people at different ages of their lives to show the similarities between c...
Article
Full-text available
Handwritten signature is being used in various applications on daily basis. The problem arises when someone decides to imitate our signature and steal our identity. Therefore, there is a need for adequate protection of signatures and a need for systems that can, with a great degree of certainty, identify who is the signatory. This paper presents pr...
Article
Full-text available
Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their partys voters (people) and other interest groups and wh...
Article
Full-text available
Computer forensics is essential for the successful prosecution of criminals in computer (cyber) crime. Digital investigation process must be done in a lawful way, and some proposed steps must be followed in order for evidence to be accepted by the court of law. The digital forensic investigation process will be successful, if we follow simple rules...
Conference Paper
Full-text available
The aging process affects the structure and appearance of people in different ways. One of such is the change in craniofacial morphology (CM) of individuals. The subject of a person's CM and age estimation is by itself insufficiently researched. Especially on the analysis of children's CM at different ages, because it hasn't been considered thoroug...
Article
Full-text available
Chain of custody of digital evidence in digital forensic field are today essential part of digital investigation process. In order the evidence to be accepted by the court as valid, chain of custody for digital evidence must be kept, or it must be known who exactly, when, where, why and how came into contact with evidence in each stage of the digit...
Conference Paper
Full-text available
Age estimation of humans is one of the problems in field of computer vision which is insufficient researched. To efficiently estimate the age of an individual based on his/her face image, characteristic points of the face have to be determined. In this paper the most common face recognition algorithms will be described.
Conference Paper
Full-text available
Handwritten signature is widely accepted and collectible biometric characteristic. Great entrophy makes that characteristic suitable for research and development of new models for personal authentication and identification. This paper presents basic differences between authentication and identification methods, followed by previous work in that fie...
Conference Paper
Full-text available
On-line handwritten signature-based personal authentication is still a challenging research topic. Although great efforts have been achieved in developing and defining a framework that systems for on-line authentication based on the handwritten signature of a person should adhere, these frameworks are still not enough because they do not include al...
Chapter
Full-text available
This chapter presents a semantic network formalism based on frame logic. Advanced techniques including HiLog extensions, transaction logic and dynamic module creation are applied to the problem of preferential routing and rerouteing. The deductive program is implemented in the FLORA-2 reasoning engine, which allows for scalable query execution. In...
Article
Full-text available
This paper defines digital antiforensic. It is a relative new technology used by cyber criminals, to destroy digital evidence in purpose to obstruct digital investigation, and by legal users to keep their privacy. This paper introduces some methods and tools that are used in digital antiforensic, that should be comprehensible for participants of di...
Article
Full-text available
Approaches The development of biometric systems is undoubtedly on the rise in the number and the application areas. Modelling of system reliability and system data analysis after failure and the time of re-establishing the operating regime is of crucial importance for users of the system and also for producers of certain components. This paper give...
Article
Full-text available
Approaches for reliability analysis of biometric systems are subject to a review of numerous scientific papers. Most of them consider issues of reliability of component software applications. System reliability, considering technical and software part, is of crucial importance for users and for manufacturers of biometric systems. In this paper, the...
Conference Paper
Full-text available
This paper constructs a theory model in order to study point of strength for standardization processes using business consulting model and knowledge management process. Model presents interaction of internal and external partecipants during the process of standardization implementation including partecipant's external and individual characteristics...
Conference Paper
Full-text available
This paper defines digital antiforensic. It is a relative new technology used by cyber criminals, to destroy digital evidence in purpose to obstruct digital investigation, and by legal users to keep their privacy. This paper introduces some methods and tools that are used in digital antiforensic, that should be comprehensible for participants of di...
Article
Full-text available
In all phases of forensic investigation, digital evidence is exposed to external influences and coming into contact with many factors. Legal admissibility of digital evidence is the ability of that evidence being accepted as evidence in a court of law. Life cycle of digital evidence is very complex. In each stage there is more impact that can viola...
Conference Paper
Full-text available
U radu je napravljen pregled i definisana je digitalna antiforenzika, nadolazeća tehnologija koju upotrebljavaju cyber kriminalci kako bi digitalne dokaze prikrili, uništili, promjenili, te time onemogućili zvaničnoj digitalnoj forenzici rješavanje djela iz oblasti kompjuterskog kriminala. Digitalnu antiforenziku koriste i legitimni korisnici koji...
Article
Full-text available
Autopoietic theory, a theory of complex, non-linear, autonomous and especially living systems, found its way from biology, through the social sciences to organization theory and information systems. It enjoys major attention from scientific audiences in lots of different disciplines. Still, there hasn't been enough effort to establish a common foun...
Conference Paper
Full-text available
Traditionaly, a chain of custody (chain of evidence) refers to the chronological documentation , or paper trail, showing storing, controling, transfer, analysis and handling with evidence. Chain of custody plays very important role in digital forensic investigation process. To prove chain of custody, investigators must know all details on how the e...
Conference Paper
Full-text available
Chain of custody plays an important role in digital forensic investigation. Contact with different variables occurs through a life cycle of digital evidence. To prove chain of custody, investigators must know all details on how the evidence was handled every step of the way. ”Five WS (and one H) “must be applied. Life cycle of digital evidence is v...
Conference Paper
Full-text available
The integrity of digital evidence plays an important role in the digital process of forensic investigation. Proper chain of custody must include information on how evidence is collected, transported, analyzed, preserved, and handled with. There are several adapted methods for evidence digital signing to (im)prove the integrity of digital evidence....
Conference Paper
Full-text available
The integrity of digital evidence plays an important role in the digital process of forensic investigation. Proper chain of custody must include information on how evidence is collected, transported, analyzed, preserved, and handled with. There are several adapted methods for evidence digital signing to (im)prove the integrity of digital evidence....
Conference Paper
Full-text available
The term "steganography" is usually associated to hiding or covering data and information. Most of IT personnel do not know a true meaning of this term, even though IT security specialists rarely come into contact with steganography and steganalysis. The steganography has become a great danger through development of techniques and technology, espec...
Conference Paper
Full-text available
Recent research has shown a correlation between personality disorders (PDs) and the position of a person in a social network. Following this research we conducted a social network analysis on one of the greatest Croatian cyber-political blogging sites to identify individuals with possible PDs. These individuals' blogs were then analyzed in order to...
Conference Paper
Full-text available
With all the efforts put into IT system security, the issue remains of what the level of such security is and how sure we are that our IT system is secure. The paper starts with the assumption that users are one of the most important components of IT system security, and an aware and trained user takes much more care about security in his daily act...
Article
Full-text available
Autopoietic theory, a theory of complex, non- linear, autonomous and especially living systems, found its way from biology, through the social sciences to organization theory and information systems. It enjoys major attention from scientific audience in lots of different disciplines. Still there hasn't been enough effort to establish a common found...
Conference Paper
Full-text available
The idea behind this article is to give an overview of B-tree data structure and show the connection between B-tree indexing technique and computer forensics. B-tree is a fast data indexing method that organizes indexes into a multi-level set of nodes, where each node contains indexed data. This technique is most commonly used in databases and file...
Conference Paper
Full-text available
The steganography has become a great danger through development of techniques and technology, especially in the last few years. Hackers, malicious users of the Internet, cyber criminals, use it in their evil intentions and after 9/11, attacks on the United States, even terrorists use it too. In this paper the authors will present the concept of ste...
Conference Paper
Full-text available
The strong development of information and communication technology (ICT) as well as the fact that there are currently over 800 million on-line users worldwide, bring us to the position of rethinking carefully about where all this data is going. Sending and receiving secure data is a well known concept. But what about data in the "open space" where...
Conference Paper
Full-text available
Social systems are autopoietic (self-creating) systems which produce all their internal processes by them selves. When autopoietic systems interact with environmental (possibly allopoietic) systems the process of structural coupling takes place and there are possibilities that language will emerge. We analyze different public interfaces like wiki s...
Article
Full-text available
A foundation for closing the gap between biometrics in the narrower and the broader perspective is presented trough a conceptualization of biometric systems in both perspectives. A clear distinction between verification, identification and classification systems is made as well as shown that there are additional classes of biometric systems. In the...
Conference Paper
Full-text available
The paper presents a method for the evaluation of biometric systems based on an open ontology of selected segments of biometrics. The ontology was developed in F-logic using the FLORA-2 system. Descriptive parameters of biometric characteristics as well as organizational contingency parameters are taken into consideration and a metric for grading a...
Article
Full-text available
Biometric technologies rely on specific biometric characteristics that are used for recognition. The particular characteristic for a given situation can be described through a serious of descriptive parameters including ease of collecting, permanence, measurably, acceptability, deceptiveness, universality, uniqueness, sample cost, system cost, data...
Conference Paper
With the development of the Web and the services it provides to the end user one of the aspects one has to take in mind is the need for an account for each of its services. Until now the accounts used a username and password model for the user authentication but with the development of the biometric science and high-speed Internet there are other p...
Conference Paper
Full-text available
In this paper we will present an evaluation of open source offi�ce suites for the use in public administration of the Republic of Croatia from a security oriented view. Security is an important factor in this evaluation since there is no guarantee from a software developer company that can provide the necessary backdrop for a huge organization like...
Conference Paper
Full-text available
This paper presents the idea how to use fuzzy active rules within biometric systems. We have already shown how the concept of complex events presented in the active database theory could be used in order to build a biometric system. We especially explored the paradigm of active rules and complex events and experimental results were encouraging. Fuz...
Conference Paper
Full-text available
In this paper we shall introduce a taxonomy of biometric methods continuing thereby our previous research on selected segments of biometrics. We show how our previously developed systematization and categorization of biometric methods, characteristics and models can be extended by building upon an open ontology of biometrics. The developed taxonomy...
Article
Full-text available
Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In some situations it is enough that user knows e.g. password, in other situations it is enough that user posses e.g. a smart card, but, there are also situations where user's...
Conference Paper
Full-text available
Abstract. In this paper we present an object-relational database for biometric systems and results conducted during implementation. Using a systematization of biometric methods, models and characteristics we developed a UML (Unified Modeling Language) model and ODL (Object Definition Language) specification of the database which can be used for uni...
Article
Full-text available
In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and auth...
Article
Full-text available
Terrorist attacks in New York City and Washington, District of Columbia on the morning of September 11, 2001 have changed our lives. The security problem became very important regarding all spheres of human activities. Tracking persons (employees, customers etc.) in ITS (Intelligent Transport System) is a huge problem. Biometrics offers a very good...
Conference Paper
Full-text available
Generally speaking, a user (person) can be authorized in three different ways (or their combinations): one can use something that a user knows, something that a user possesses or by measuring some physical or psychological characteristics which are immanent and unique to each person i.e. biometric characteristics. In this paper we are going to put...
Article
Full-text available
In this paper we argue for the possibilities of applying the concept of autopoiesis to modern organizations information systems. Modern organizations today in a rapidly changing, turbulent and complex environment are virtual, open, heterarchic and autopoietic. The main question in this paper we try to address is how to support such organizations wi...
Article
Full-text available
In the last decade we faced a great number of publications in the field of biometrics and a lot of new biometric methods, techniques, models, metrics and characteristics were proposed. Due to this explosion of research, scientific and professional papers certain inconsistencies in terminology emerged. What some authors call a biometric method, othe...
Article
Full-text available
Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In some situations it is enough that user knows e.g. password, in other situations it is enough that user posses e.g. a smart card, but, there are also situations where user’s...
Article
Full-text available
The actual problem of information security (infosec) risk assessment is determining the value of information property or asset. This is particularly manifested through the use of quantitative methodology in which it is necessary to state the information value in quantitative sizes. The aim of this paper is to describe the evaluation possibilities o...
Conference Paper
During the last decade a great number of publications in the field of biometry has emerged. Due to this explosion of research, which has brought us scientific and professional papers, a lot of new biometric methods, techniques, models, metrics and characteristics were proposed. But there was not enough effort in creating a unique systematization an...
Conference Paper
Nowadays a new form of learning, so called e-learning is being introduced. The motives for this kind of learning are better time use, decrease of educational costs, more effective learning and learning management from the user's side. This form of distance learning is supported by information-communication technology (ICT) and fast computer network...
Article
Full-text available
Minutiae classification and fingerprint classification in fingerprint evaluating process are very important. Fingerprint image contains about 150 minutiae’s. When we compare two fingerprint images, we compare latent and non latent fingerprint and we try to find 12 minutiae’s placed on the same position on latent and non latent fingerprint images. A...
Article
Full-text available
In the past decade agent systems were considered to be as one of the major fields of study in Artificial Intelligence (AI) field. Many different definitions of agents were presented and several different approaches describing agency can be distinguished. While some authors have tried to define “what” an agent really is, others have tried to identif...
Article
Full-text available
The process of security improvement is a huge problem especially in large ships. Terrorist attacks and everyday threats against life and property destroy transport and tourist companies, especially large tourist ships. Every person on a ship can be recognized and identified using something that the person knows or by means of something the person p...
Article
Full-text available
In this paper we describe that user authentication methods based on hash functions like MD5, NT / NTLM and SHA-1 can be easily compromised. We used methods that utilize cryptanalytic tables based on time memory tradeoff procedures (TMTO) and we analyzed certain limitations on this approach. We suggest improvements to this technique and additional c...
Article
These papers explain the basic elements of construetion of expert svstem for human resource management in state government on the organization level of ministry, state government and offices of state government. Because the state government has a great number of emplovees and so great organization there's a need to develop a qualitative model of hu...

Network

Cited By