This page has only limited features, please log in for full access.
As with any other database solution, graph databases also need to be able to implement business rules related to a given application domain. At the moment, aside from integrity constraints, there is a limited number of mechanisms for business rules implementation in Graph Database Management Systems (GDBMSs). The underlying property graph data model does not include any formal notation on how to represent different constraints. Specifically, this paper discusses the problem of representing cardinality constraints in graph databases. We introduce the novel concept of k-vertex cardinality constraints, which enable us to specify the minimum and maximum number of edges between a vertex and a subgraph. We also propose an approach, which includes the representation of cardinality constraints through the property graph data model, and demonstrate its implementation through a series of stored procedures in Neo4j GDBMS. The proposed approach is then evaluated by performing experiments on synthetic and real datasets to test the influence of checking cardinality constraints on query execution times (QETs) when adding new edges. Additionally, a comparison is performed on synthetic datasets with varying outgoing vertex degrees in order to gain an insight into how increasing the vertex degree affects QETs. In general, the results obtained for each test scenario show that the implemented k-vertex cardinality constraints model does not significantly affect QETs. Also, the results indicate that the model is dependent on the order of the underlying k-vertex cardinality constraints and outgoing vertex degree in the dataset.
Martina Šestak; Marjan Heričko; Tatjana Welzer Družovec; Muhamed Turkanović. Applying k-vertex cardinality constraints on a Neo4j graph database. Future Generation Computer Systems 2020, 115, 459 -474.
AMA StyleMartina Šestak, Marjan Heričko, Tatjana Welzer Družovec, Muhamed Turkanović. Applying k-vertex cardinality constraints on a Neo4j graph database. Future Generation Computer Systems. 2020; 115 ():459-474.
Chicago/Turabian StyleMartina Šestak; Marjan Heričko; Tatjana Welzer Družovec; Muhamed Turkanović. 2020. "Applying k-vertex cardinality constraints on a Neo4j graph database." Future Generation Computer Systems 115, no. : 459-474.
Currently, developers and researchers are dedicated to finding better ways to achieve greater scalability of various blockchain platforms. Focused on the Ethereum blockchain platform, the state channels are currently the only maturely researched and implemented a solution for achieving scalability. However, there are still several problems, such as transparency of state channel networks, transaction traceability, and the incapability that the off-chain state is transferred back on the blockchain network in an ad-hoc manner. To solve the aforementioned problems, we propose a novel state channel solution in the form of a State Channel as a Service, which, although off-chain, still incorporates a secure distributed and decentralized network. This solves the challenge of transparency and traceability while giving users the confidence that only the valid last off-chain state is transferred back on the blockchain network. With the proposed solution, there is no need for users to monitor state channel activities for possible malicious actions. Implementation was performed in the form of a payment channel system, presenting a potential use case for the SCaaS. Furthermore, we performed a security and performance analysis, which shows that the solution is secure and by a factor of 12 more efficient than the classical on-chain payment systems. To evaluate and prove the contributions of the proposed solution, quantitative, and qualitative comparisons with selected related works (i.e., Raiden and Celer) were also performed.
Blaz Podgorelec; Marjan Herieko; Muhamed Turkanovic. State Channel as a Service Based on a Distributed and Decentralized Web. IEEE Access 2020, 8, 64678 -64691.
AMA StyleBlaz Podgorelec, Marjan Herieko, Muhamed Turkanovic. State Channel as a Service Based on a Distributed and Decentralized Web. IEEE Access. 2020; 8 (99):64678-64691.
Chicago/Turabian StyleBlaz Podgorelec; Marjan Herieko; Muhamed Turkanovic. 2020. "State Channel as a Service Based on a Distributed and Decentralized Web." IEEE Access 8, no. 99: 64678-64691.
The basis of blockchain-related data, stored in distributed ledgers, are digitally signed transactions. Data can be stored on the blockchain ledger only after a digital signing process is performed by a user with a blockchain-based digital identity. However, this process is time-consuming and not user-friendly, which is one of the reasons blockchain technology is not fully accepted. In this paper, we propose a machine learning-based method, which introduces automated signing of blockchain transactions, while including also a personalized identification of anomalous transactions. In order to evaluate the proposed method, an experiment and analysis were performed on data from the Ethereum public main network. The analysis shows promising results and paves the road for a possible future integration of such a method in dedicated digital signing software for blockchain transactions.
Blaž Podgorelec; Muhamed Turkanović; Sašo Karakatič. A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection. Sensors 2019, 20, 147 .
AMA StyleBlaž Podgorelec, Muhamed Turkanović, Sašo Karakatič. A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection. Sensors. 2019; 20 (1):147.
Chicago/Turabian StyleBlaž Podgorelec; Muhamed Turkanović; Sašo Karakatič. 2019. "A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection." Sensors 20, no. 1: 147.
Students taking a Databases Course have different pre-knowledge of Conceptual Database Modelling. At the beginning of the course, they were asked to self-evaluate their knowledge of database design concepts. We have compared the results of self-evaluation of students with Technical and General High School education, as well as the results they achieved at the final exam. All together 132 students have collaborated in both parts of the survey. The results show that the students with a technical background have a better pre-knowledge of database design constructs, but, on the other hand, received lower results in the exam where the knowledge on Database Modelling was tested.
Lili Nemec Zlatolas; Aida Kamišalić; Muhamed Turkanović. Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling. Communications in Computer and Information Science 2019, 45 -51.
AMA StyleLili Nemec Zlatolas, Aida Kamišalić, Muhamed Turkanović. Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling. Communications in Computer and Information Science. 2019; ():45-51.
Chicago/Turabian StyleLili Nemec Zlatolas; Aida Kamišalić; Muhamed Turkanović. 2019. "Correlation Between Students’ Background and the Knowledge on Conceptual Database Modelling." Communications in Computer and Information Science , no. : 45-51.
Vid Keršič; Muhamed Turkanović. Uporaba platforme IOTA za zbiranje IOT podatkov. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .
AMA StyleVid Keršič, Muhamed Turkanović. Uporaba platforme IOTA za zbiranje IOT podatkov. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.
Chicago/Turabian StyleVid Keršič; Muhamed Turkanović. 2019. "Uporaba platforme IOTA za zbiranje IOT podatkov." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.
Blaž Podgorelec; Muhamed Turkanović. ZKP (Zero‐Knowledge Proof) pod drobnogledom. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .
AMA StyleBlaž Podgorelec, Muhamed Turkanović. ZKP (Zero‐Knowledge Proof) pod drobnogledom. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.
Chicago/Turabian StyleBlaž Podgorelec; Muhamed Turkanović. 2019. "ZKP (Zero‐Knowledge Proof) pod drobnogledom." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.
Patrik Rek; Muhamed Turkanović. Orodja za podporo celovitemu razvoju decentraliziranih aplikacij. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .
AMA StylePatrik Rek, Muhamed Turkanović. Orodja za podporo celovitemu razvoju decentraliziranih aplikacij. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.
Chicago/Turabian StylePatrik Rek; Muhamed Turkanović. 2019. "Orodja za podporo celovitemu razvoju decentraliziranih aplikacij." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.
Blaž Podgorelec; Patrik Rek; Miha Strehar; Muhamed Turkanović. Vzpostavitev konzorcijskega omrežja Ethereum. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .
AMA StyleBlaž Podgorelec, Patrik Rek, Miha Strehar, Muhamed Turkanović. Vzpostavitev konzorcijskega omrežja Ethereum. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.
Chicago/Turabian StyleBlaž Podgorelec; Patrik Rek; Miha Strehar; Muhamed Turkanović. 2019. "Vzpostavitev konzorcijskega omrežja Ethereum." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.
Aida Kamišalić; Muhamed Turkanović. Možnosti in izzivi uporabe protokola IPFS. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 2019, 1 .
AMA StyleAida Kamišalić, Muhamed Turkanović. Možnosti in izzivi uporabe protokola IPFS. OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019. 2019; ():1.
Chicago/Turabian StyleAida Kamišalić; Muhamed Turkanović. 2019. "Možnosti in izzivi uporabe protokola IPFS." OTS 2019 Sodobne informacijske tehnologije in storitve: Zbornik štiriindvajsete konference, Maribor, 18. in 19. junij 2019 , no. : 1.
Blockchain technology is showing its potential to disrupt established business processes. Four types of blockchain initiatives have been identified: Record keeper, efficiency play, digital asset market, and blockchain disruptor. Many different applications have also been emerging within the educational domain, following a student or institution-centric approach. Student-centric solutions simplify the validation process of received credentials, while institution-centric solutions facilitate mainly operational activities of educational institutions. In this paper, we present several use cases addressing different aspects within the educational domain, such as streamlining the process of diploma verification, virtual lifetime learning passport, securing the issued certificates permanently, verifying the accreditation process, automatic recognition of credits, etc. A preliminary review and analysis of identified projects and initiatives show that most of them follow a student-centric approach while facilitating record-keeping.
Aida Kamišalić; Muhamed Turkanović; Saša Mrdović; Marjan Heričko. A Preliminary Review of Blockchain-Based Solutions in Higher Education. Information and Communication Technologies in Education, Research, and Industrial Applications 2019, 114 -124.
AMA StyleAida Kamišalić, Muhamed Turkanović, Saša Mrdović, Marjan Heričko. A Preliminary Review of Blockchain-Based Solutions in Higher Education. Information and Communication Technologies in Education, Research, and Industrial Applications. 2019; ():114-124.
Chicago/Turabian StyleAida Kamišalić; Muhamed Turkanović; Saša Mrdović; Marjan Heričko. 2019. "A Preliminary Review of Blockchain-Based Solutions in Higher Education." Information and Communication Technologies in Education, Research, and Industrial Applications , no. : 114-124.
Blockchain technology enables the creation of a decentralized and distributed environment in which transactions and data are not controlled by a central authority. Simultaneously transactions are secure, ubiquitous and trustworthy due to the used cryptographic principles. In this paper, we present a global decentralized blockchain-based platform and ecosystem called EduCTX. The platform enables managing, assigning and presenting credentials for individuals and educational institutions as well as other potential stakeholders such as companies, institutions and organizations. Further it enables the development of own digital services, which offers organizations the opportunity to automate the evaluation of individuals' skills and knowledge. The EduCTX platform is implemented on the blockchain platform Ethereum on a consortium-based network of Ethereum run nodes. The platform enables a globally efficient, simplified and ubiquitous environment to avoid language and administrative barriers.
Marko Holbl; Aida Kamisalic; Muhamed Turkanovic; Marko Kompara; Blaz Podgorelec; Marjan Hericko. EduCTX: An Ecosystem for Managing Digital Micro-Credentials. 2018 28th EAEEIE Annual Conference (EAEEIE) 2018, 1 -9.
AMA StyleMarko Holbl, Aida Kamisalic, Muhamed Turkanovic, Marko Kompara, Blaz Podgorelec, Marjan Hericko. EduCTX: An Ecosystem for Managing Digital Micro-Credentials. 2018 28th EAEEIE Annual Conference (EAEEIE). 2018; ():1-9.
Chicago/Turabian StyleMarko Holbl; Aida Kamisalic; Muhamed Turkanovic; Marko Kompara; Blaz Podgorelec; Marjan Hericko. 2018. "EduCTX: An Ecosystem for Managing Digital Micro-Credentials." 2018 28th EAEEIE Annual Conference (EAEEIE) , no. : 1-9.
Wearable devices have recently received considerable interest due to their great promise for a plethora of applications. Increased research efforts are oriented towards a non-invasive monitoring of human health as well as activity parameters. A wide range of wearable sensors are being developed for real-time non-invasive monitoring. This paper provides a comprehensive review of sensors used in wrist-wearable devices, methods used for the visualization of parameters measured as well as methods used for intelligent analysis of data obtained from wrist-wearable devices. In line with this, the main features of commercial wrist-wearable devices are presented. As a result of this review, a taxonomy of sensors, functionalities, and methods used in non-invasive wrist-wearable devices was assembled.
Aida Kamišalić; Iztok Fister; Muhamed Turkanović; Sašo Karakatič. Sensors and Functionalities of Non-Invasive Wrist-Wearable Devices: A Review. Sensors 2018, 18, 1714 .
AMA StyleAida Kamišalić, Iztok Fister, Muhamed Turkanović, Sašo Karakatič. Sensors and Functionalities of Non-Invasive Wrist-Wearable Devices: A Review. Sensors. 2018; 18 (6):1714.
Chicago/Turabian StyleAida Kamišalić; Iztok Fister; Muhamed Turkanović; Sašo Karakatič. 2018. "Sensors and Functionalities of Non-Invasive Wrist-Wearable Devices: A Review." Sensors 18, no. 6: 1714.
Blockchain technology enables the creation of a decentralized environment where transactions and data are not under the control of any third party organization. Any transaction ever completed is recorded in a public ledger in a verifiable and permanent way. Based on blockchain technology, we propose a global higher education credit platform, named EduCTX. This platform is based on the concept of the European Credit Transfer and Accumulation System (ECTS). It constitutes a globally trusted, decentralized higher education credit and grading system that can offer a globally unified viewpoint for students and higher education institutions (HEIs), as well as for other potential stakeholders such as companies, institutions and organizations. As a proof of concept, we present a prototype implementation of the environment, based on the open-source Ark Blockchain Platform. Based on a globally distributed peer-topeer network, EduCTX will process, manage and control ECTX tokens, which represent credits that students gain for completed courses such as ECTS. HEIs are the peers of the blockchain network. The platform is a first step towards a more transparent and technologically advanced form of higher education systems. The EduCTX platform represents the basis of the EduCTX initiative which anticipates that various HEIs would join forces in order to create a globally efficient, simplified and ubiquitous environment in order to avoid language and administrative barriers. Therefore we invite and encourage HEIs to join the EduCTX initiative and the EduCTX blockchain network.
Muhamed Turkanovic; Marko Holbl; Kristjan Kosic; Marjan Hericko; Aida Kamisalic. EduCTX: A Blockchain-Based Higher Education Credit Platform. IEEE Access 2018, 6, 5112 -5127.
AMA StyleMuhamed Turkanovic, Marko Holbl, Kristjan Kosic, Marjan Hericko, Aida Kamisalic. EduCTX: A Blockchain-Based Higher Education Credit Platform. IEEE Access. 2018; 6 (99):5112-5127.
Chicago/Turabian StyleMuhamed Turkanovic; Marko Holbl; Kristjan Kosic; Marjan Hericko; Aida Kamisalic. 2018. "EduCTX: A Blockchain-Based Higher Education Credit Platform." IEEE Access 6, no. 99: 5112-5127.
Muhamed Turkanović; Aida Kamišalić Latifič. Od velepodatkov do pametnih in hitrih podatkov. Sodobne tehnologije in storitve 2017, 115 -127.
AMA StyleMuhamed Turkanović, Aida Kamišalić Latifič. Od velepodatkov do pametnih in hitrih podatkov. Sodobne tehnologije in storitve. 2017; ():115-127.
Chicago/Turabian StyleMuhamed Turkanović; Aida Kamišalić Latifič. 2017. "Od velepodatkov do pametnih in hitrih podatkov." Sodobne tehnologije in storitve , no. : 115-127.
The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working on new techniques and efficient approaches on how to integrate WSN better into the IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanović et al.’s proposed a highly efficient and novel user authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the IOT notion. Their scheme presented a novel approach where a user from the IOT can authenticate with a specific sensor node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfortunately we have found that Turkanović et al.’s scheme has some security shortcomings and is susceptible to some cryptographic attacks. This paper focuses on overcoming the security weaknesses of Turkanović et al.’s scheme, by proposing a new and improved UAKAS. The proposed scheme enables the same functionality but improves the security level and enables the HWSN to dynamically grow without influencing any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools confirm the security properties of the proposed scheme.
Mohammad Sabzinejad Farash; Muhamed Turkanović; Saru Kumari; Marko Hölbl. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks 2016, 36, 152 -176.
AMA StyleMohammad Sabzinejad Farash, Muhamed Turkanović, Saru Kumari, Marko Hölbl. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks. 2016; 36 ():152-176.
Chicago/Turabian StyleMohammad Sabzinejad Farash; Muhamed Turkanović; Saru Kumari; Marko Hölbl. 2016. "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment." Ad Hoc Networks 36, no. : 152-176.
Muhamed Turkanović; Boštjan Brumen; Marko Hölbl. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks 2014, 20, 96 -112.
AMA StyleMuhamed Turkanović, Boštjan Brumen, Marko Hölbl. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks. 2014; 20 ():96-112.
Chicago/Turabian StyleMuhamed Turkanović; Boštjan Brumen; Marko Hölbl. 2014. "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion." Ad Hoc Networks 20, no. : 96-112.
Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of the applicative use of quantum principles in WSN. The outcome of the analysis elaborates a summary about the inadequacy of applicative use of quantum cryptography in WSN and presents an overview of all possible applicative challenges and problems while designing quantum-based security systems for WSN. Since WSNs are highly complex frameworks, with many restrictions and constraints, every security system has to be fully compatible and worthwhile. The aim of the paper was to contribute a verdict about this topic, backed up by equitable facts.
Muhamed Turkanović; Marko Hölbl. The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks. Quantum Information Processing 2014, 13, 2255 -2275.
AMA StyleMuhamed Turkanović, Marko Hölbl. The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks. Quantum Information Processing. 2014; 13 (10):2255-2275.
Chicago/Turabian StyleMuhamed Turkanović; Marko Hölbl. 2014. "The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks." Quantum Information Processing 13, no. 10: 2255-2275.
Xue et al. recently proposed an innovative mutual authentication and key agreement scheme for wireless sensor networks based on temporal credential using smart cards. However, in this paper we demonstrate that their scheme is vulnerable to password guessing attacks, node capture attacks and denial-of-service attacks. Furthermore we show that their scheme has some inconsistencies which make it less secure and more computationally costly than originally presented.
Muhamed Turkanović; Marko Hölbl. Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”. Wireless Personal Communications 2013, 77, 907 -922.
AMA StyleMuhamed Turkanović, Marko Hölbl. Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”. Wireless Personal Communications. 2013; 77 (2):907-922.
Chicago/Turabian StyleMuhamed Turkanović; Marko Hölbl. 2013. "Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”." Wireless Personal Communications 77, no. 2: 907-922.
User authentication is an important issue in wireless sensor networks (WSN). Das et al. recently proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks (HWSN), which provides high security and a simple authentication approach. In this paper we present a flaw in Das et al.’s scheme that makes it infeasible for real-life implementation. Additionally, we demonstrate that Das et al.’s scheme has redundant elements. To overcome these imperfections we propose an enhanced user authentication scheme based on Das et al.’s, which is both efficient and secure.DOI: http://dx.doi.org/10.5755/j01.eee.19.6.2038
Muhamed Turkanović; Marko Holbl. An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks. Elektronika ir Elektrotechnika 2013, 19, 109-116 .
AMA StyleMuhamed Turkanović, Marko Holbl. An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks. Elektronika ir Elektrotechnika. 2013; 19 (6):109-116.
Chicago/Turabian StyleMuhamed Turkanović; Marko Holbl. 2013. "An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks." Elektronika ir Elektrotechnika 19, no. 6: 109-116.