Entity

Time filter

Source Type

Bijeljina, Bosnia and Herzegovina

University Sinergija is a private university located in Bijeljina city, Republika Srpska, Bosnia and Herzegovina. Wikipedia.


Milentijevic G.,University of Prishtina | Spalevic Z.,University Sinergija | Bjelajac Z.,University of Belgrade | Djokic J.,University of Prishtina | Nedeljkovic B.,University of Prishtina
Metalurgia International | Year: 2013

The aim of this paper is to provide analysis of the impact of exploitation and primary processing of mineral raw materials (lead and zinc) in the water pollution of the river Ibar in the municipality of Zvecan, especially focused on heavy metals. Environment on the Zvecan area is exposed to the pollution originated by the intensive industrial production of MCC Trepca. In the production processes, depending on the intensity of the production, the enormous amounts of pollutants were released, influencing to the quality of the environment. It is primary referring to the heavy metals, which were considered as main contaminants at the observed area, for their toxicity. Mining Metallurgical Combine Trepča and industrial tailing waste deposits in Zvecan municipality area are located close to the River Ibar banks. This fact determined the direction of this paper, presenting the analysis of the water Ibar quality, heavy metals concentration (Pb, Zn, Cu, Cd,) in the river Ibar water at the region of Zvecan. The maximum allowed concentrations for all analyzed heavy metals from national law regulation are compared to the EU law regulations. Source


Tot L.,Singidunum University | Grubor G.,University Sinergija | Marta T.,Obuda University
Acta Polytechnica Hungarica | Year: 2015

Numerous organizations coordinate and certify their information security systems according to the Information Security Management System (ISMS) standard. Available Cloud Computing Services (CCSs) include new types of vulnerability (management, virtualization, sprawl, etc.) and differ in management requirements from other computational systems. Establishing a consistent security management framework (SMF) and information security management system (ISMS) in CC environment is a complicated, demanding and time-consuming process. Every experience from applying ISMS standard solutions is certainly useful, but not enough to entirely cover all security requirements of the customers and Cloud Service Provider (CSP). Attempts of establishing an integrated and consistent SMF and ISMS in CC environment have not been researched in-depth in recent available literature. In this paper, authors suggested a framework for an establishing quality management system (QMS) of CCSs, including CC SMF and CC ISMS, proactive digital forensic (DF), proactive and predictive security controls and corporate DF investigation process up to the level specified in Service Level Agreement (SLA). © 2015, Budapest Tech Polytechnical Institution. All rights reserved. Source


Jevremovic A.,Singidunum University | Ristic N.,University Sinergija | Veinovic M.,Singidunum University
2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2013 | Year: 2013

Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology. © 2013 IEEE. Source


Jevremovic A.,Singidunum University | Ristic N.,University Sinergija | Veinovic M.,Singidunum University
AIP Conference Proceedings | Year: 2013

Protecting PHP scripts from unwanted use, copying and modifications is a big issue today. Existing solutions on source code level are mostly working as obfuscators, they are free, and they are not providing any serious protection. Solutions that encode opcode are more secure, but they are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply re-buying encoders from the authors. Finally, if extension source-code is compromised, all scripts encoded with that solution are compromised too. In this paper, we will present a new model for free and open-source PHP script protection solution. Protection level provided by the proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from use of standard cryptology models for analysis of strengths and weaknesses of the existing solutions, when a scripts protection is seen as secure communication channel in the cryptology. © 2013 AIP Publishing LLC. Source


Grubor G.,Singidunum University | Njegus A.,Singidunum University | Regodic D.,University Sinergija
Metalurgia International | Year: 2013

Numerous organizations use Cloud Computing (CC) services. The main deterrence factor still remains a lack of confidence in the CC information security. CC services (CCS) include new types of vulnerability and risk assessment. The risk taxonomy has to be considered for better understanding of the CC Security Management Framework (CC SMF) and Information Security Management System (CC ISMS). In this paper an important security risks aspects, specific to the cloud services, are discussed and taxonomy of security risks in CC is proposed to help companies in identifying the security risks more effectively. This taxonomy includes the most important security risks aspects which must be considered whenever CCSs are used. The CC SMF should be expanded to a certain level with a proactive digital forensic and mandatory forensic investigation up to some level, specified in the Service Level Agreement (SLA). Source

Discover hidden collaborations