Pavel Ocenasek
Brno University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pavel Ocenasek.
international conference on networking | 2006
Pavel Ocenasek; Miroslav Sveda
This paper deals with a formal specification approach that supports the design of security protocols. After introduction to communication protocols and description of the current problems in the design process, the subsequent section of the paper reviews a framework that is based on the genetic-programming approach. The original contribution consists of presentation of automated system to demonstrate the utilization of this approach for designing protocols that can establish secure communication. Moreover, this paper compares analytical and automated technique that might be used in the design process.
international conference on universal access in human computer interaction | 2009
Pavel Ocenasek; Miroslav Sveda
This paper presents an approach based on 3-layered model that may be useful for analysis and measurement of workflow processes. The workflow system can evaluate a state of the products or services in each point of processing and is divided into three layers (sources, workflow management system and workflow processes), whereas each layer covers the processing of its specific tasks.
international conference on universal access in human computer interaction | 2009
Pavel Ocenasek
This paper discusses selected security issues of the Zigbee/802.15.4 standard. The first part gives an introduction to the 802.15.4 standard and describes the security of the two lowest layers (MAC, PHY). The second part focuses on ZigBee architecture and its security functions. The last part outlines security problems in the specified standards, the network vulnerabilities and tries to draw new research topics in the area of sensor networks security.
international conference on e-learning and games | 2008
Pavel Ocenasek
The paper deals with the system for modification of web content according to the user requirements. The system is based on the network proxy server. The general idea is to employ translation rules (regular expressions) to render web pages upon user requests stored in profiles. The concept of the proposed proxy is general and the system can be used for various purposes. The main targets of use are: providing secure content of web sites, translation of non-accessible web pages into accessible form, etc.
programmable devices and embedded systems | 2009
Miroslav Sveda; Roman Trchalik; Pavel Ocenasek
The netX family of Hilscher company are highly integrated SoC with the system architecture based on ARM9 CPU, optimized for communication in industrial automation. It offers the migration strategy from field bus to Real-Time-Ethernet. Besides the CPU, a couple of communication channels and peripherals are integrated on the chip. This contribution describes a study the goal of which is to test the usability of netX according to solving DSP tasks.Abstract This paper presents a safety and security-based approach to networked embedded system design that offers reusable design patterns for applications dedicated to various domains. After introducing dependability requirements for embedded system applications, it deals with industrial, sensor-based applications development support aiming at distributed components interconnected by wired Internet compatible intranets and wireless sensor networks. The paper discusses a safety and security-driven approach to embedded system design for an industrial class of Internet-based applications. It focuses on an integrated networking that stems from the IEEE 1451.1 smart transducer interface standard, which is an object-based networking model supporting client-server and publish-subscribe communication patterns in group messaging, and from the IP multicast communication, all together mediating safe and secure access to smart sensors through Internet and ZigBee. The case study demonstrates how clients can access groups of wireless smart pressure and temperature sensors and valves through Internet effectively using developed system architecture while respecting prescribed requirements for application dependent safety and security.
Archive | 2006
Pavel Ocenasek
This paper proposes an evolutionary method that serves for designing security protocols. The principles of security protocols are outlined, followed by the specification of modal logic that is used to encode the belief and knowledge of communicating parties. The second part introduces the evolutionary optimization framework and proposes the techniques that can be used to automatically evolve basic security protocols.
international conference on human-computer interaction | 2016
Jaromír Karmazín; Pavel Ocenasek
We analyze the Android operating system as a platform for building NFC-enabled applications. First, we briefly examine the security of NFC and provide an overview of the three modes (reader/writer, peer-to-peer, card emulation) that are exposed to developers through Android’s API. Furthermore, we present some existing Android applications using NFC, such as diagnostic tools, contactless tag manipulation tools, peer-to-peer NFC applications, as well as a few uncommon use cases. We conclude with an assessment of the completeness of Android’s NFC API and suggest a novel use case.
international conference on networking | 2006
Miroslav Sveda; Radimir Vrba; Pavel Ocenasek
This paper deals with a formal specification approach that supports the design of small, real-time embedded applications with distributed architectures. After discussing the notion of local time and its role in computer science and software engineering, the next section of the paper reviews an original specification language dedicated to local-time concepts. The next contribution consists in treating a real world, networked measurement system application as a case study to demonstrate utilization of this language for behavioral specifications of distributed real-time systems. Moreover, this paper examines how to employ a nonobject oriented specification tool for object-oriented implementations.
international conference on human-computer interaction | 2013
Pavel Ocenasek
This paper deals with Global Internet Filtering.. Various technical solutions for Internet filtering are presented together with filtering analysis options. Several possibilities for blocked content access and filtering circumvention in general are discussed.
international conference on human-computer interaction | 2013
Pavel Ocenasek; Jaromír Karmazín
This paper deals the aspects of data synchronization. The first part focuses on existing technologies and their features. We follow with the proposal of application that can be used as an alternative to the existing solutions. The proposed peer-to-peer application includes several safety improvements as well as it supports secure communication and data storage.