Main topic: SOA and biometrics.
Interview with Jan Kameníček and Peter Weber
Jan Kameníček graduated from the Technical University in Prague. He started his career at Digital Equipment Corp. He became the general manager of HP Czech Republic in August 2008. Peter Weber graduated from Military Technical Academy in Brno (today the University of Defense). He was the general manager of Digital Equipment, Slovakia and subsequently the director of Compaq Computer Slovakia. Currently he is the general manager of HP Slovakia. This interview was prepared for DSM by its editor-in-chief, Jaroslav Dočkal, and Martina Vyskočová, manager of the Slovak representation of DSM.
Referential SOA Architecture
The article deals with referential SOA (Service-Oriented Architecture), its basic components and concepts. Through an example of the design and implementation of a new application, it also highlights certain advantages and differences compared to the conventional approach.
To Who Serves SOA?
The article explains how Service-Oriented Architecture can help business by flexibly supporting business processes. The author summarizes the typical factors that are enabled by building an IT infrastructure based on SOA and the various problems that are alleviated by this approach. The article stresses the common goals and efforts of IT and business.
Detection of Viability
Martin Drahanský, Dana lodrová, Filip Orság, Eva Březinová
The article describes two newly patented methods for detecting the viability of biometric systems using fi nger-print scanning. The fi rst is based on the use of a camera with a macro-objective; the other assumes the use of a laser module to measure distance. Both use a special optical bench. The article focuses mainly on a side-by-side comparison of both methods. The text also mentions skin diseases that can prevent the recognition of an authorized user.
Healthy Ill E-passport
The article describes incidents related to the security of e-passports that cast doubt on the security of the whole system of e-passports. The article analyzes all the incidents and their causes, and possible remedies for each problem.
Concealment of Data in File Systems
The article describes the concealment of data using steganographic file systems. It contains an explanation of functional principals that do not rely on a previous detailed knowledge of the organization. It proceeds iteratively from a clean disk and simple fi le system to a more complex stegosystem, for example TrueCrypt. The theory is supplemented by a practical description of plausible deniability of data stored in a similar security system.
Practical Diffi culties of PKI – Part II.
Daniel Kouřil, Michal Procházka
The article summarizes several years of experience with PKI implementation in a large distributed environment, a so-called grid. A number of problems that are discussed in the article are not apparent in smaller systems. They only express themselves only when the complexity of the infrastructure exceeds a certain level.
Information Systems Crime and the New Criminal Code
The new Penal Code, Act No. 40/2009 Coll. of Laws becomes effective on 1 January 2010. This Act amends the basic principles of criminal liability and contains many new facts. It also applies the crime in the area of information systems where it is linked to the Council of Europe Convention on cyber crime and creates the possibility of recourse against offenders who were not yet punishable under the previous law.