
Miroslav Bača- Prof.dr.sc.
- Head of Department at University of Zagreb Faculty of Organization and Informatics
Miroslav Bača
- Prof.dr.sc.
- Head of Department at University of Zagreb Faculty of Organization and Informatics
About
110
Publications
83,352
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
662
Citations
Introduction
Full Professor at Faculty of Organization and Informatics Varaždin, University of Zagreb
Current institution
University of Zagreb Faculty of Organization and Informatics
Current position
- Head of Department
Additional affiliations
April 2010 - November 2014
May 2014 - present
Position
- Business Government Information Systems (PITUP FOI) Business Application of Biometrics Data (PITUP FOI) Internet Security (BS FOI) Government Information Systems (BS FOI) Chosen Topics in Biometrics (BS FOI) Methods for Retrieval and Clasification of Information (BS FOI) Computer Security (BS FPZ) Security of Business Information Systems (MSc FOI) Misuse in Information Systems (MSc FOI) Biometrics and System Security (MSc FOI)) Computer Security (MSc FOI) Biometrics and IT (MSc FPZ) Integral Information System Security System (PhD FOI)
Education
April 2008
Evaluation of Information Privacy , European Privacy Seal, Technical Expert
Field of study
January 2008
Expert Witenees for Informatics
Field of study
March 2006
ISO/IEC 17799/27001:2005 Implementation and Consultancy
Field of study
Publications
Publications (110)
In the past two decades ambient intelligence (AmI) has been a focus of research in different fields and from different points of view. It can be defined as an electronic environment consisting of devices capable of recognising people presence and responding in a certain way. The security and privacy in these kind of environments is still a challeng...
Today there is no criminal investigation that does not contain a digital dimension. A large number of criminal offenses, whether official investigations conducted by judicial bodies or corporate investigations, contain digital evidence, which in most investigations is key to the identification of perpetrators. Since the cyber space is undefined, it...
Today there is no criminal investigation that does not contain a digital dimension. A large number of criminal offenses, whether official investigations conducted by judicial bodies or corporate investigations, contain digital evidence, which in most investigations is key to the identification of perpetrators. Since the cyber space is undefined, it...
Acquisition of volatile data for further forensic analysis still represents a challenge to both practitioners and researchers. The current tools used for acquisition of such data are focused exclusively on a way to capture content. However, the development of forensic science, in particular in the area of digital evidence in terms of the admissibil...
Everyday spread use of biometric system in many fields of human life as security or access control systems make serious concern about its reliability. Actual research concerning analysis of technical function impact on general function of biometric system taking into account hardware characteristics, software functionality and its performance param...
In this paper authors will discuss about metadata of digital evidence, digital chain of custody and framework for
digital evidence management. A concretization of DEMF - Digital Evidence Management Framework will be presented. DEMF is a framework that was developed on conceptual – ontology level, and now programmed in java.
One case study from real...
In this paper authors will discuss about (digital) privacy. They will try to define a new approach to defining a digital privacy and propose a framework for «calculating» a percentage of privacy in a specific case. Most important factors and representation of this framework will be presented. It will be proposed a set of concepts mostly used in thi...
DEMF Framework - presentation
Biometric systems play an important role in digital investigation process as a important factor of authentication and verification applications, since they are strongly linked to the holder of a biometric traits and possible suspect. Thus it is important that biometric systems can be designed to withstand attacks when employed in security-critical...
Biometric systems play an important role in digital investigation process as a important factor of authentication and verification applications, since they are strongly linked to the holder of a biometric traits and possible suspect. Thus it is important that biometric systems can be designed to withstand attacks when employed in security-critical...
This paper deals with a new challenge for digital forensic experts - the forensic analysis of social networks. There is a lot of identity theft, theft of personal data, public defamation, cyber stalking and other criminal activities on social network sites. This paper will present a forensic analysis of social networks and cloud forensics in the in...
Personal signature has become an important part of human identity verification. Therefore, it is important to protect ones signature and be able to detect signature forgery. We present a statistical based approach to signature verification with user oriented signature feature weights. Only basic on-line signature features are used in the verificati...
http://www.intechopen.com/books/new-trends-and-developments-in-biometrics/basic-principles-and-trends-in-hand-geometry-and-hand-shape-biometrics
Biometric face recognition is one of the fields of computer vision. The part of biometric person identification has been extensivly researched. This resulted in a large number of algorithms used for person identification. This paper gives an overview and classification of those algorithms. Because of large number of algorithms, knowledge visualizat...
Application of biometric tools today is a major challenge for developers of biometric systems and for users of those systems. A specific application can be seen in systems requiring a certain accuracy in person authentication. A large number of systems is created in a way that the algorithms used are not verified as standardized, thus causing uncer...
Aging process affects the appearance of people in different ways. One of the changes caused by aging are changes in craniofacial morphology of individuals. Different models of facial aging exist and this paper will apply anthropometric model of facial aging on pictures of 20 people at different ages of their lives to show the similarities between c...
Handwritten signature is being used in various applications on daily basis. The problem arises when someone decides to imitate our signature and steal our identity. Therefore, there is a need for adequate protection of signatures and a need for systems that can, with a great degree of certainty, identify who is the signatory. This paper presents pr...
Analysis how to use Internet influence to the process of political
communication, marketing and the management of public relations, what kind of
online communication methods are used by political parties, and to assess
satisfaction, means of communication and the services they provide to their
partys voters (people) and other interest groups and wh...
Computer forensics is essential for the successful prosecution of criminals in computer (cyber) crime. Digital investigation process must be done in a lawful way, and some proposed steps must be followed in order for evidence to be accepted by the court of law. The digital forensic investigation process will be successful, if we follow simple rules...
The aging process affects the structure and appearance of people in different ways. One of such is the change in craniofacial morphology (CM) of individuals. The subject of a person's CM and age estimation is by itself insufficiently researched. Especially on the analysis of children's CM at different ages, because it hasn't been considered thoroug...
Chain of custody of digital evidence in digital forensic field are today essential part of digital investigation process. In order the evidence to be accepted by the court as valid, chain of custody for digital evidence must be kept, or it must be known who exactly, when, where, why and how came into contact with evidence in each stage of the digit...
Age estimation of humans is one of the problems in field of computer vision which is insufficient researched. To efficiently estimate the age of an individual based on his/her face image, characteristic points of the face have to be determined. In this paper the most common face recognition algorithms will be described.
Handwritten signature is widely accepted and collectible biometric characteristic. Great entrophy makes that characteristic suitable for research and development of new models for personal authentication and identification. This paper presents basic differences between authentication and identification methods, followed by previous work in that fie...
On-line handwritten signature-based personal authentication is still a challenging research topic. Although great efforts have been achieved in developing and defining a framework that systems for on-line authentication based on the handwritten signature of a person should adhere, these frameworks are still not enough because they do not include al...
This chapter presents a semantic network formalism based on frame logic. Advanced techniques including HiLog extensions, transaction logic and dynamic module creation are applied to the problem of preferential routing and rerouteing. The deductive program is implemented in the FLORA-2 reasoning engine, which allows for scalable query execution. In...
This paper defines digital antiforensic. It is a relative new technology used by cyber criminals, to destroy digital evidence in purpose to obstruct digital investigation, and by legal users to keep their privacy. This paper introduces some methods and tools that are used in digital antiforensic, that should be comprehensible for participants of di...
Approaches The development of biometric systems is undoubtedly on the rise in the number and the application areas. Modelling of system reliability and system data analysis after failure and the time of re-establishing the operating regime is of crucial importance for users of the system and also for producers of certain components. This paper give...
Approaches for reliability analysis of biometric systems are subject to a review of numerous scientific papers. Most of them consider issues of reliability of component software applications. System reliability, considering technical and software part, is of crucial importance for users and for manufacturers of biometric systems. In this paper, the...
This paper constructs a theory model in order to study point of strength for standardization processes using business consulting model and knowledge management process.
Model presents interaction of internal and external partecipants during the process of standardization implementation including partecipant's external and individual characteristics...
This paper defines digital antiforensic. It is a relative new technology used by cyber criminals, to destroy digital evidence in purpose to obstruct digital investigation, and by legal users to keep their privacy. This paper introduces some methods and tools that are used in digital antiforensic, that should be comprehensible for participants of di...
In all phases of forensic investigation, digital evidence is exposed to external influences and coming into contact with many factors. Legal admissibility of digital evidence is the ability of that evidence being accepted as evidence in a court of law. Life cycle of digital evidence is very complex. In each stage there is more impact that can viola...
U radu je napravljen pregled i definisana je digitalna antiforenzika, nadolazeća tehnologija koju upotrebljavaju cyber kriminalci kako bi digitalne dokaze prikrili, uništili, promjenili, te time onemogućili zvaničnoj digitalnoj forenzici rješavanje djela iz oblasti kompjuterskog kriminala. Digitalnu antiforenziku koriste i legitimni korisnici koji...
Autopoietic theory, a theory of complex, non-linear, autonomous and especially living systems, found its way from biology, through the social sciences to organization theory and information systems. It enjoys major attention from scientific audiences in lots of different disciplines. Still, there hasn't been enough effort to establish a common foun...
Traditionaly, a chain of custody (chain of evidence) refers to the chronological documentation , or paper trail, showing storing, controling, transfer, analysis and handling with evidence. Chain of custody plays very important role in digital forensic investigation process. To prove chain of custody, investigators must know all details on how the e...
Chain of custody plays an important role in digital forensic investigation. Contact with different variables occurs through a life cycle of digital evidence. To prove chain of custody, investigators must know all details on how the evidence was handled every step of the way. ”Five WS (and one H) “must be applied. Life cycle of digital evidence is v...
The integrity of digital evidence plays an important role in the digital process of forensic investigation. Proper chain of custody must include information on how evidence is collected, transported, analyzed, preserved, and handled with. There are several adapted methods for evidence digital signing to (im)prove the integrity of digital evidence....
The integrity of digital evidence plays an important role in the digital process of forensic investigation. Proper chain of custody must include information on how evidence is collected, transported, analyzed, preserved, and handled with. There are several adapted methods for evidence digital signing to (im)prove the integrity of digital evidence....
The term "steganography" is usually associated to hiding or covering data and information. Most of IT personnel
do not know a true meaning of this term, even though IT security specialists rarely come into contact with steganography and steganalysis. The steganography has become a great danger through development of techniques and technology, espec...
Recent research has shown a correlation between personality disorders (PDs) and the position of a person in a social network. Following this research we conducted a social network analysis on one of the greatest Croatian cyber-political blogging sites to identify individuals with possible PDs. These individuals' blogs were then analyzed in order to...
With all the efforts put into IT system security, the issue remains of what the level of such security is and how sure we are that our IT system is secure. The paper starts with the assumption that users are one of the most important components of IT system security, and an aware and trained user takes much more care about security in his daily act...
Autopoietic theory, a theory of complex, non- linear, autonomous and especially living systems, found its way from biology, through the social sciences to organization theory and information systems. It enjoys major attention from scientific audience in lots of different disciplines. Still there hasn't been enough effort to establish a common found...
The idea behind this article is to give an overview of B-tree data structure and show the connection between B-tree indexing technique and computer forensics. B-tree is a fast data indexing method that organizes indexes into a multi-level set of nodes, where each node contains indexed data. This technique is most commonly used in databases and file...
The steganography has become a great danger through development of techniques and technology, especially in the last few years. Hackers, malicious users of the Internet, cyber criminals, use it in their evil intentions and after 9/11, attacks on the United States, even terrorists use it too. In this paper the authors will present the concept of ste...
The strong development of information and communication technology (ICT) as well as the fact that there are currently over 800 million on-line users worldwide, bring us to the position of rethinking carefully about where all this data is going. Sending and receiving secure data is a well known concept. But what about data in the "open space" where...
Social systems are autopoietic (self-creating) systems which produce all their internal processes by them selves. When autopoietic systems interact with environmental (possibly allopoietic) systems the process of structural coupling takes place and there are possibilities that language will emerge. We analyze different public interfaces like wiki s...
A foundation for closing the gap between biometrics in the narrower and the broader perspective is presented trough a conceptualization of biometric systems in both perspectives. A clear distinction between verification, identification and classification systems is made as well as shown that there are additional classes of biometric systems. In the...
The paper presents a method for the evaluation of biometric systems based on an open ontology of selected segments of biometrics. The ontology was developed in F-logic using the FLORA-2 system. Descriptive parameters of biometric characteristics as well as organizational contingency parameters are taken into consideration and a metric for grading a...
Biometric technologies rely on specific biometric characteristics that are used for recognition. The particular characteristic for a given situation can be described through a serious of descriptive parameters including ease of collecting, permanence, measurably, acceptability, deceptiveness, universality, uniqueness, sample cost, system cost, data...
With the development of the Web and the services it provides to the end user one of the aspects one has to take in mind is the need for an account for each of its services. Until now the accounts used a username and password model for the user authentication but with the development of the biometric science and high-speed Internet there are other p...
In this paper we will present an evaluation of open source offi�ce suites for the use in public administration of the Republic of Croatia from a security oriented view. Security is an important factor in this evaluation since there is no guarantee from a software developer company that can provide the necessary backdrop for a huge organization like...
This paper presents the idea how to use fuzzy active rules within biometric systems. We have already shown how the concept of complex events presented in the active database theory could be used in order to build a biometric system. We especially explored the paradigm of active rules and complex events and experimental results were encouraging. Fuz...
In this paper we shall introduce a taxonomy of biometric methods continuing thereby our previous research on selected segments of biometrics. We show how our previously developed systematization and categorization of biometric methods, characteristics and models can be extended by building upon an open ontology of biometrics. The developed taxonomy...
Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In some situations it is enough that user knows e.g. password, in other situations it is enough that user posses e.g. a smart card, but, there are also situations where user's...
Abstract. In this paper we present an object-relational database for biometric
systems and results conducted during implementation. Using a systematization of biometric methods, models and characteristics we developed a UML (Unified Modeling Language) model and
ODL (Object Definition Language) specification of the database which can be used for uni...
In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and auth...
Terrorist attacks in New York City and Washington, District of Columbia on the morning of September 11, 2001 have changed our lives. The security problem became very important regarding all spheres of human activities. Tracking persons (employees, customers etc.) in ITS (Intelligent Transport System) is a huge problem. Biometrics offers a very good...
Generally speaking, a user (person) can be authorized in three different ways (or their combinations): one can use something that a user knows, something that a user possesses or by measuring some physical or psychological characteristics which are immanent and unique to each person i.e. biometric characteristics. In this paper we are going to put...
In this paper we argue for the possibilities of applying the concept of autopoiesis to modern organizations information systems. Modern organizations today in a rapidly changing, turbulent and complex environment are virtual, open, heterarchic and autopoietic. The main question in this paper we try to address is how to support such organizations wi...
In the last decade we faced a great number of publications in the field of biometrics and a lot of new biometric methods, techniques, models, metrics and characteristics were proposed. Due to this explosion of research, scientific and professional papers certain inconsistencies in terminology emerged. What some authors call a biometric method, othe...
Active databases have been used in many different fields to accomplish many different tasks. One of the main problems today that still have not been solved is authorization. In some situations it is enough that user knows e.g. password, in other situations it is enough that user posses e.g. a smart card, but, there are also situations where user’s...
The actual problem of information security (infosec) risk assessment is determining the value of information property or asset. This is particularly manifested through the use of quantitative methodology in which it is necessary to state the information value in quantitative sizes. The aim of this paper is to describe the evaluation possibilities o...
During the last decade a great number of publications in the field of biometry has emerged. Due to this explosion of research, which has brought us scientific and professional papers, a lot of new biometric methods, techniques, models, metrics and characteristics were proposed. But there was not enough effort in creating a unique systematization an...
Nowadays a new form of learning, so called e-learning is being introduced. The motives for this kind of learning are better time use, decrease of educational costs, more effective learning and learning management from the user's side. This form of distance learning is supported by information-communication technology (ICT) and fast computer network...
Minutiae classification and fingerprint classification in fingerprint evaluating process are very important. Fingerprint image contains about 150 minutiae’s. When we compare two fingerprint images, we compare latent and non latent fingerprint and we try to find 12 minutiae’s placed on the same position on latent and non latent fingerprint images. A...
In the past decade agent systems were considered to be as one of the major fields of study in Artificial Intelligence (AI) field. Many different definitions of agents were presented and several different approaches describing agency can be distinguished. While some authors have tried to define “what” an agent really is, others have tried to identif...
The process of security improvement is a huge problem especially in large ships. Terrorist attacks and everyday threats against life and property destroy transport and tourist companies, especially large tourist ships. Every person on a ship can be recognized and identified using something that the person knows or by means of something the person p...
In this paper we describe that user authentication methods based on hash functions like MD5, NT / NTLM and SHA-1 can be easily compromised. We used methods that utilize cryptanalytic tables based on time memory tradeoff procedures (TMTO) and we analyzed certain limitations on this approach. We suggest improvements to this technique and additional c...
These papers explain the basic elements of construetion of expert svstem for human resource management in state government on the organization level of ministry, state government and offices of state government. Because the state government has a great number of emplovees and so great organization there's a need to develop a qualitative model of hu...