Laura Vegh
Technical University of Cluj-Napoca
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Laura Vegh.
ieee international conference on automation, quality and testing, robotics | 2014
Laura Vegh; Liviu Miclea
Information technology is continually changing, discoveries are made every other day. Cyber-physical systems consist of both physical and computational elements and are becoming more and more popular in todays society. They are complex systems, used in complex applications. Therefore, security is a critical and challenging aspect when developing cyber-physical systems. In this paper, we present a solution for ensuring data confidentiality and security by combining some of the most common methods in the area of security - cryptography and steganography. Furthermore, we use hierarchical access to information to ensure confidentiality and also increase the overall security of the cyber-physical system.
international conference on system theory, control and computing | 2014
Laura Vegh; Liviu Miclea
Nowadays, a better part of our lives relies on technology. Every day brings new and improved ideas, applications and systems. For this reason, information security has become essential. Integrating both computational and physical components, cyber-physical systems used in more and more situations. Their complexity and the critical nature of the applications in which they are used increases the need for a solid security architecture, built not only to hide information, but to withstand cyber attacks. Our aim has been to find new and improved security architecture for cyber-physical systems. We use hierarchical access to information through the aid of an encryption algorithm with divided private key, combined with steganography. We also add a framework with the goal of verifying the integrity of each component of the system.
ieee international conference on automation quality and testing robotics | 2016
Laura Vegh; Liviu Miclea
With technology advancing faster than ever and complex systems present in most of the areas of our lives ensuring security has become a critical issue. Protecting data from unwanted access by modifying it through cryptography, hiding data or digitally signing it are some of the solutions available. Just as important however is to detect and prevent attacks. We propose a system with hierarchical access to data which is gained through a digital signature algorithm. We focus our attention on detecting and preventing attacks through a less conventional method - complex event processing. Any action within the cyber-physical system can be viewed as an event, such as digitally signing a message. With this idea in mind we propose a solution that allows designing a secure cyber-physical system with an efficient attack detection architecture.
international conference on control systems and computer science | 2015
Laura Vegh; Liviu Miclea
In a time when technology changes continuously, where things you need today to run a certain system, might not be needed tomorrow anymore, security is a constant requirement. No matter what systems we have, or how we structure them, no matter what means of digital communication we use, we are always interested in aspects like security, safety, privacy. An example of the ever-advancing technology are cyber-physical systems. We propose a complex security architecture that integrates several consecrated methods such as cryptography, steganography and digital signatures. This architecture is designed to not only ensure security of communication by transforming data into secret code, it is also designed to control access to the system and detect and prevent cyber attacks.
international conference on system theory, control and computing | 2016
Laura Vegh
The advances in technology within the past decade have been huge and now we use it in almost every aspect of our lives. As a result, security has become a pressing issue, wether we are talking about the security of communications, of stored data, privacy and more. A compromised system will be an unreliable system, therefore detecting attacks as soon as possible is of crucial importance. With complex systems, such as cyber-physical systems, the efficient use of resources is also important, especially when using security methods like encryption, which require a fair amount of resources. The present paper aims to bring a solution to all of these issues. Cryptography will be used to ensure data and communications security, but also access control, while a platform called WSO2 Data Analytics Server will be used for attack detection and for increasing the efficiency of communications within the system.
ieee international conference on automation quality and testing robotics | 2014
Stelian Flonta; Laura Vegh; Liviu Miclea; Iulia Stefan; Szilard Enyedi
A multi-agent system organized hierarchically based on a set of hierarchical keys can analyze, decide and decrypt a message. The message is encrypted using a public key chosen randomly from a set of public keys. The system analyzes and determines the set of keys used for encryption and decrypts the message.
international conference on autonomic and autonomous systems | 2011
Iulia Ştefan; Laura Vegh; George Dan Mois; Stelian Flonta; Szilard Enyedi; Liviu Miclea
international conference on communications | 2016
Laura Vegh; Liviu Miclea
international conference on industrial technology | 2015
Laura Vegh; Liviu Miclea
international conference on systems, signals and image processing | 2014
Laura Vegh; Liviu Miclea