Bijeljina, Bosnia and Herzegovina
Bijeljina, Bosnia and Herzegovina

University Sinergija is a private university located in Bijeljina city, Republika Srpska, Bosnia and Herzegovina. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

Tot L.,Singidunum University | Grubor G.,University Sinergija | Marta T.,Óbuda University
Acta Polytechnica Hungarica | Year: 2015

Numerous organizations coordinate and certify their information security systems according to the Information Security Management System (ISMS) standard. Available Cloud Computing Services (CCSs) include new types of vulnerability (management, virtualization, sprawl, etc.) and differ in management requirements from other computational systems. Establishing a consistent security management framework (SMF) and information security management system (ISMS) in CC environment is a complicated, demanding and time-consuming process. Every experience from applying ISMS standard solutions is certainly useful, but not enough to entirely cover all security requirements of the customers and Cloud Service Provider (CSP). Attempts of establishing an integrated and consistent SMF and ISMS in CC environment have not been researched in-depth in recent available literature. In this paper, authors suggested a framework for an establishing quality management system (QMS) of CCSs, including CC SMF and CC ISMS, proactive digital forensic (DF), proactive and predictive security controls and corporate DF investigation process up to the level specified in Service Level Agreement (SLA). © 2015, Budapest Tech Polytechnical Institution. All rights reserved.


Grubor G.,Singidunum University | Njegus A.,Singidunum University | Regodic D.,University Sinergija
Metalurgia International | Year: 2013

Numerous organizations use Cloud Computing (CC) services. The main deterrence factor still remains a lack of confidence in the CC information security. CC services (CCS) include new types of vulnerability and risk assessment. The risk taxonomy has to be considered for better understanding of the CC Security Management Framework (CC SMF) and Information Security Management System (CC ISMS). In this paper an important security risks aspects, specific to the cloud services, are discussed and taxonomy of security risks in CC is proposed to help companies in identifying the security risks more effectively. This taxonomy includes the most important security risks aspects which must be considered whenever CCSs are used. The CC SMF should be expanded to a certain level with a proactive digital forensic and mandatory forensic investigation up to some level, specified in the Service Level Agreement (SLA).


Jevremovic A.,Singidunum University | Ristic N.,University Sinergija | Veinovic M.,Singidunum University
2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2013 | Year: 2013

Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology. © 2013 IEEE.


Jevremovic A.,Singidunum University | Ristic N.,University Sinergija | Veinovic M.,Singidunum University
AIP Conference Proceedings | Year: 2013

Protecting PHP scripts from unwanted use, copying and modifications is a big issue today. Existing solutions on source code level are mostly working as obfuscators, they are free, and they are not providing any serious protection. Solutions that encode opcode are more secure, but they are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply re-buying encoders from the authors. Finally, if extension source-code is compromised, all scripts encoded with that solution are compromised too. In this paper, we will present a new model for free and open-source PHP script protection solution. Protection level provided by the proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from use of standard cryptology models for analysis of strengths and weaknesses of the existing solutions, when a scripts protection is seen as secure communication channel in the cryptology. © 2013 AIP Publishing LLC.


Marija M.,Singidunum University | Ivan B.,Singidunum University | Dusan R.,Singidunum University | Gojko G.,University Sinergija
Acta Polytechnica Hungarica | Year: 2015

Risk management is an integrating part of every supply chain aspect. Unsuccessful risk management can have negative economic and ecologic consequences and cause total or partial lost in the business of a company. Supply Chain Risk Management (SCRM) technology helps managers plan for and handle disruptions in the supply chain. Companies that invest in the emerging field of SCRM technology are less likely to sustain costly supply disruptions or negative press because of the actions of their suppliers. In this paper a model of risk management in supply chain is suggested, according to the international standard ISO 31000:2009 recommendation. An automatic risk evaluation has been performed by software application and as a result 2393 individual risk assessments have been obtained. In this case study the levels of risk factors obtained by risk treatment have been accepted. In order to lessen the subjectivity of the analysts it is necessary to use the same methodology for risk assessment by more than one risk analysts and then to compare their results to provide an objective risk assessment, a key phase in risk management. © 2015, Budapest Tech Polytechnical Institution. All rights reserved.


Palevic M.,University of Kragujevac | Djordjevic S.,University of Kragujevac | Spalevic Z.,University Sinergija
Metalurgia International | Year: 2013

The paper processes the problem of human environment protection in the Republic of Serbia from the normative-legal aspect. Contemporary law order of Serbia acknowledges the accomplished level of civilization experience of a healthy environment as a special human right, which can be identified by analyzing the relevant constitutional norms of this state. There is a special indication to the openness of the Serbian law order in accordance with the international conventions regulating the matters of right to healthy environment and regarding appropriate obligations of the state. At the same time, the emphasis is on the meaning and manner the practice of European court of human rights dedicated to the problems is respected in the normative-legal order of the Republic of Serbia. After the law analysis, it is possible to come to specific conclusions about the need to upgrade the existing normative frame of Serbia in the matter of environmental law as well as the frame of enforcement of existing so-called environmental legal norms.regulations.


University Sinergija | Entity website


University Sinergija | Entity website


University Sinergija | Entity website

Copyright 2011 Univerzitet Sinergija


University Sinergija | Entity website

Copyright 2011 Univerzitet Sinergija

Loading University Sinergija collaborators
Loading University Sinergija collaborators