Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Iulia Stefan is active.

Publication


Featured researches published by Iulia Stefan.


east-west design and test symposium | 2010

Reconfiguration and hardware agents in testing and repair of distributed systems

George Dan Mois; Iulia Stefan; Szilard Enyedi; Liviu Miclea

This paper proposes a new approach for distributed system testing and repairing using mobile hardware agents. This way, we obtain a networked reconfigurable system which does not need human intervention for maintenance and testing. The proposed architecture uses two FPGA boards and a microprocessor (agent host) as components and is flexible and re-programmable.


ieee international conference on automation, quality and testing, robotics | 2008

Agent-based testing and repair of heterogeneous distributed systems

Sz. Enyedi; Liviu Miclea; Iulia Stefan

In this paper, we propose a distributed use of software-based self-testing, where intelligent agents are responsible for the transfer of software routines to the distributed processors, which in turn will be able to execute the routines and test/repair the corresponding sub-system. This distributed strategy is flexible, re-usable and re-programmable.


ieee international conference on automation quality and testing robotics | 2014

Assisted test case design using contextual information by DOM exploration

Iulia Stefan; Ioan Ivan; Liviu Miclea

The paper proposes a method to use contextual data from the web applications DOM (Document Object Model) to aid test cases generation for functional testing. The objective is to enhance the automation by reducing the time allocated to obtain the input values and the rough steps of the test cases. The DOM architecture for Web applications will be considered the starting point in the development of the method. The discussion remains if the tester inspection is needed in order to choose between the diversity of test cases automatically generated or the tests will be entirely executed without exception. The required system resources will be taken in consideration to repeatedly run all the tests in regression testing. In the case of applying this method to several user interfaces, by saving the extracted properties and the generated test cases and results, statistical data regarding effective templates to use would emerge.


ieee international conference on automation quality and testing robotics | 2012

Hybrid cryptosystem with hierarchical private key

Stelian Flonta; Liviu Miclea; Iulia Stefan

The access to protected information is allowed based on the agent access level inside the security system. The management for such systems is made using an interdependent private keys domain, such keys being organized on access levels. The decryption speed is established by the combination of a symmetric encryption system with an asymmetric system. The use of the mathematical model describing elliptical curves increases the security by reducing the needed memory resources.


ieee international conference on automation quality and testing robotics | 2010

Reconfiguration security for hardware agents in testing

George Dan Mois; Stelian Flonta; Iulia Stefan; Szilard Enyedi; Liviu Miclea

This paper presents a new method for assuring security in a distributed system using agents and reconfigurable circuits. The agents are used to implement an extension of the El Gamal encryption algorithm, used for conferring a certain level of security to the communication and the reconfiguration of the systems components. The proposed architecture uses FPGA boards and a microprocessor, the agent host, as components and is flexible and re-programmable.


ieee international conference on automation quality and testing robotics | 2016

Connected visualization service in a water management system

Szilard Enyedi; Iulia Stefan; Liviu Miclea; I. Stoian; D. Capatina

Large scale water management systems have both high dynamics and low dynamics parts. The “slow” data, comprising logs and long-term predictions, is not time-critical, and so it can be stored and put through data analytics or other processing, when there is time for it. The quick control, however, is managed by automated SCADA routines, which generate near real-time data, and quite a lot of it. The visualization of the slow and quick data should be done accurately and in a timely manner, including new data which is created/stored during the visualization. This work proposes a fast, synchronous solution to getting the data from the SCADA system, through the visualization gateway, to the clients viewer, and updating it automatically, when necessary. Access is role based, with proper credential management. The communication is encrypted and based on open standards, so that further clients and server modules may be developed.


ieee international conference on automation quality and testing robotics | 2016

Security concerns regarding a federative web service

Iulia Stefan; Szilard Enyedi; Liviu Miclea; D. Capatina; I. Stoian

In a continuously increasing demand for rapid access to information, the web services represent affordable instruments. The technology is available for numerous software platforms. The need to share sensitive information between authorized entities, using global area networks, and not exclusively a dedicated, hardware separated channel, fosters the risk for malicious attacks. The current paper proposes an analysis of the security risks reported by past and ongoing research regarding data transfer using WaterML/XML. The analysis is extended to an existing federation of water associated SCADAs on the Someş river (F2S), using web services, data access separation and SSL-encrypted communication, among other security resolutions.


ieee international conference on automation quality and testing robotics | 2014

Multi-agent system with hierarchical private key

Stelian Flonta; Laura Vegh; Liviu Miclea; Iulia Stefan; Szilard Enyedi

A multi-agent system organized hierarchically based on a set of hierarchical keys can analyze, decide and decrypt a message. The message is encrypted using a public key chosen randomly from a set of public keys. The system analyzes and determines the set of keys used for encryption and decrypts the message.


ieee international conference on automation quality and testing robotics | 2012

The usage of contextual information to develop data test vectors

Iulia Stefan; Liviu Miclea

In real-time systems/hybrid systems the quality of the controlling software represents one of the major aspects. Many of these systems allow interaction with the users by a graphical interface having inputs to select or type in. Even where the software does not control an industrial plant, machinery, a car or robot, it is possible to control financial transactions, personal details or electronic patient information. Large amount of financial, time, human resources are allocated toward testing the software. The paper proposes a method to use contextual data from the GUI of applications to create test cases for functional testing. The objective is to enhance the automation in testing by reducing the time allocated to generate the controllable input values. The DOM architecture for Web and .NET resource file for Windows OS applications will be considered as starting points in the development of the method. The discussion remains if the tester inspection is needed in order to choose between the diversity of test cases automatically generated or the tests will be all executed without exception. It will be taken in consideration the required system resources to repeatedly run all the tests in regression testing. In case of applying this method to several user interfaces, by saving the properties extracted and the generated test cases and results, statistical data regarding effective templates to use would emerge.


Journal of Control Engineering and Applied Informatics | 2010

Distributed Security in Multi-Agent Systems

George Dan Mois; Stelian Flonta; Iulia Stefan; Szilard Enyedi; Liviu Miclea

Collaboration


Dive into the Iulia Stefan's collaboration.

Top Co-Authors

Avatar

Liviu Miclea

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Szilard Enyedi

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Stelian Flonta

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

George Dan Mois

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Adina Astilean

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Camelia Avram

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Laura Vegh

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Ovidiu Stan

Technical University of Cluj-Napoca

View shared research outputs
Top Co-Authors

Avatar

Sz. Enyedi

Technical University of Cluj-Napoca

View shared research outputs
Researchain Logo
Decentralizing Knowledge