Krešimir Šolić
Josip Juraj Strossmayer University of Osijek
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Krešimir Šolić.
Computers & Security | 2015
Krešimir Šolić; Hrvoje Ocevcic; Marin Golub
In the area of information technology an amount of security issues persists through time. Ongoing activities on security solutions aim to integrate existing security guidelines, best practices, security standards and existing solutions, but they often lack a knowledge base or do not involve all security issues, particularly human influence.In this paper, we presented a model that can be the basis for a novel information systems security evaluation solution. This solution should be able to cover a wide range of all possible information security issues. Our model is based on an OWL ontology for knowledge base, uses an enhanced Evidential Reasoning algorithm for mathematical calculations and possesses a simple reflex intelligent agents algorithm as a decision supporting element.Properties for this model supervene from properties of its constructing elements. Knowledge base being built on OWL ontology is a major element of the model. It can provide high flexibility and applicability to different information systems and business organizations; upgradeability to be up to date regarding current security issues and new threats; and high versatility, taking into evaluation all possible aspects regarding security issues, e.g., network security, software and hardware issues, human influence, security policies and disaster recovery plans. Enhanced Evidential Reasoning algorithm is based on the Dumpster-Shafer theory and is well suited for calculations with experts subjective judgements combining qualitative with quantitative evaluation grades. We designed an algorithm for back coupling based on a simple reflex intelligent agent for results presentation and decision support.In our work, we explained how to connect and use each of the models constructive elements to obtain information security evaluation results. In addition, we conducted a case study with the proposed model on a small business organization. To test our model, we also used the standard qualitative risk assessment method on the same business organization in order to compare both qualitative results.Preliminary testing results have shown that the presented model could achieve its goal if it would be developed into an integrated software tool with a well-defined and up-to-date ontological knowledge base.
international convention on information and communication technology electronics and microelectronics | 2017
Krešimir Šolić; Hrvoje Ocevcic; Igor Fosic; Ivan Horvat; Marin Vuković; T. Ramljak
Although the importance of information security in every days business and private life is obvious, there is a constant increase in number of security breaches. A wide array of all kinds of issues have either direct or indirect impact on the overall information security and privacy level.
international convention on information and communication technology, electronics and microelectronics | 2011
Krešimir Šolić; Damir Šebo; Franjo Jović; Vesna Ilakovac
international convention on information and communication technology electronics and microelectronics | 2014
Tena Velki; Krešimir Šolić; Hrvoje Ocevcic
Tehnicki Vjesnik-technical Gazette | 2013
Krešimir Šolić; Franjo Jović; Damir Blažević
international convention on information and communication technology, electronics and microelectronics | 2012
Krešimir Šolić; Bojan Tovjanin; Vesna Ilakovac
international convention on information and communication technology electronics and microelectronics | 2015
Krešimir Šolić; Tena Velki; Tomislav Galba
Acta Polytechnica Hungarica | 2015
Tomislav Galba; Krešimir Šolić; Ivica Lukić
Automatika: Journal for Control, Measurement, Electronics, Computing and Communications | 2015
Krešimir Šolić; Hrvoje Očevčić; Damir Blažević
Tehnicki Vjesnik-technical Gazette | 2010
Krešimir Šolić; Krešimir Grgić; Dario Galić