Adam Kozakiewicz

Learn More
The paper discusses how digital rights management (DRM) approach can be adapted to work in local or offline mode, without access to global central servers. The focus of this adaptation is not on protection of copyright in a commercial content setting but on restricting access to non-public documents to legitimate users. Therefore we work under assumption(More)
Trust management is an approach to access control in distributed open systems, where access control decisions are based on policy statements made by multiple principals. The family of Role-based Trust management languages (RT) is an effective means for representing security policies and credentials in decentralized, distributed, large scale access control(More)
The article is devoted to security aspects of Wireless Sensor Networks. Starting with review and classification of existing threats and methods of improving security, the paper presents an idea of securing WSNs using honeypots for verification of its proper functioning. Several implementation possibilities are presented, as well as identification of the(More)
— Bioinformatics is a large group of methods used in biology, mostly for analysis of gene sequences. The algorithms developed for this task have recently found a new application in network threat detection. This paper is an introduction to this area of research, presenting a survey of bioinformatics methods applied to this task, outlining the individual(More)
The article proposes a two-layered system for distributed computation. The setup combines two different tools - Globus and Mosix - in order to harness the computing power wasted in unused student laboratories. The system is easy to set up and use. We present the results of experiments on a simple testbed, using the Google PageRank algorithm as an example(More)
In this paper, we investigate the problem of detecting correlations among datasets containing malicious data concerned with various types of network attacks and related events of the infections taken from a numerous sources and organizations. We propose a graph based technique to depict relationships between malicious data based on values of attributes(More)