throbber
Prof. Sead Muftic, M.Sc., Ph.D.
`
`Curriculum Vitae – September 1, 2014
`
`
`Sead Muftic
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Professional Profile
`
`
`– Tenure (full) professor of computer security at The Royal Institute of Technology
`
` and visiting / research professor at several international universities
`– International expert for various areas of computer and communication
` networks security (EU, VISA, IADB, Siemens, ENISA, EU/TDL Consortium)
`– Advisor and consultant to several international agencies, banks and associations
` (European Commission, EU/JRC, World Bank, IADB, VISA, Siemens)
`– Experienced entrepreneur and businessman (Chairman, CEO, CTO of several
` start-up, small and large companies)
`
`– M.Sc. degree (1974) and Ph.D. degree (1976) in the area of computer security
`
`– Author of three international books and about 100 published research papers
`
`– Author of three registered U.S. patents
`
`– Invited speaker at many national and international conferences
`
`
`
`
`
`
`Education
`
`1955–1963 Elementary School (Sarajevo, Former Yugoslavia)
`
`1964–1967 High School (Sarajevo, Former Yugoslavia)
`
`1967–1971 University of Sarajevo – Department of Mathematics
`(degree: B.Sc. in Applied Mathematics)
`1971–1973 Professional Education: IBM Systems Engineer
`1973–1974 The Ohio State University, Department of Computer Science
` (M.Sc. in Computer Science – computer security)
`1974–1976 The Ohio State University, Department of Computer Science
` (Ph.D. in Computer Science – computer security)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- 1 -
`
`Intellectual Ventures Ex. 2008
`Compass v. IV
`IPR2014-00724
`
`

`

`Academic Employments (Permanent or Visiting)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2001
`
`2011
`
`1973–1976 The Ohio State University, Computer Science Department
`Research and Teaching Assistant
`1975–1976 The Ohio State University, Department of Mathematics
`Teaching Assistant
`1984–1991 University of Sarajevo, Department for Mathematics
`Professor, Applied Mathematics, Computer and Networks Security
`1991-1993 Computer Science Department, Stockholm University
`Professor, Computer and Networks Security
`1993-2002 Computer Science Department, Stockholm University
`Visiting Professor, Computer and Networks Security
`University of South Europe, Monte Carlo, Monaco
`Visiting Professor, Secure E–commerce Systems
`2002–today Computer Science Department, Royal Institute of Technology
`Professor, Computer and Networks Security
`2000-2005 Computer Science Department, The George Washington University
`Research Professor, Networks and E-commerce Security
`2008-2010 Computer Science Department, Michigan Technical University
`Research Professor, Security for Medical IT
`Computer Science Department, University of Murcia
`Visiting Professor, Computer and Networks Security
`
`
`
`Commercial Employments
`
`
`
`
`1971–1973
`1976–1984
`
`IBM (Former) Yugoslavia - System Engineer
`Institute for Urban Planning – Sarajevo, Former Yugoslavia
`Director, IT Department
`1992–1995 CEO, COST Computer Security Technologies AB (Stockholm, Sweden)
`
`1995–1998 Chairman/CTO, Entegrity Solutions (Silicon Valley, USA)
`
`1998–2000 Chairman/CEO, SETECS AB (Stockholm, Sweden)
`
`2001–2004 President/CEO, SETECS Corporation (Delaware, USA)
`
`2002–today Chairman/President, SETECS, Inc. (Washington DC, USA)
`
`2006–today Chairman/CEO, SETECS Mobile Technologies (Washington DC, USA)
`
`
`
`
`Project Management, Consulting and Advisory Activities
`
`
`
`
`
`
`
`
`
`
`
`
`1985–1990 Director, EU COST-11 Security Research Project
`1992–1993 Participant, EU SYSMAN Research Project
`1993–1995 Participant, EU GAIA Research Project
`1995–1997 Participant, EU ICE-CAR Research Project
`1996
`Evaluator, EU/FP4 Security Project Proposals
`1996
`Evaluator, EU/FP4 Security Project Proposals
`1996-1998 Evaluator, VISA/Master Card SET Business Review Panel
`2001
`PI, DoD/DISA, "Intrusion–Detection System based on Mobile Agents"
`2002
`PI, NSA/LUCITE, “Generic Security Objects” project
`2002-2003 Participant, US Social Security Administration,
`"Channel Convergence" project
`PI, NSA/LUCITE, “Security Management for Secure LINUX” project
`2003
`2003-2004 PI, NSA/LUCITE, “Security Architecture for Group Communications”
`project
`2004-2005 PI, In-Q-Tel, “Security System for Wireless Sensor Networks” project
`2002-2004 Advisor, NOAA/US Government PKI Project
`2004-2005 Member, NIST/US Government PIV Project WG
`2004-2006 Evaluator, NSF Security projects
`
`- 2 -
`
`
`
`
`
`
`
`
`
`

`

`
`
`
`
`
`
`
`
`
`1988
`1994
`
`2005-2006 Consultant, NCUA/US Government PIV cards project
`2005-2008 Member, Advisory Board
`EU / European Network and Information Security Agency (ENISA)
`Consultant, World Bank PKI project
`2005
`Evaluator, SIEMENS Corporate Security R&D Strategy
`2008
`2011-2013 Chairman, Advisory Board
`EU / Trust in Digital Life (TDL) Consortium
`2012-2013 Coordinator, TDL/WG2
`EU / Trust in Digital Life (TDL) Consortium
`Independent Expert, EU/JRC, Secure Digital Identities project
`2014
`
`
`
`
`Memberships in Standardization Bodies and Professional Associations
`
`1986–1988 Member, GSM Working Group on security
`
`1990–2000 Member, ACM
`
`1990–2000 Member, IEEE
`
`1994–1996 Member, New York Academy of Sciences
`
`1995–1998 Member, American Bar Association (ABA) Digital Signature WG
`
`1994–1998 Member, IETF, Internet Security and Privacy WG
`
`
`
`
`Other Professional Activities
`
`
`
`
`Coordinator, EUTECO'88, European Teleinformatics Conference
`Guest Editor, "Computer Communications" Journal,
`special issue on security
`Member, Program Committee, 11th international IFIP/SEC Conference
`Session Chairman, 3rd International Conference on Systems Integration
`
`
`1995
`
`1994
`
`
`
`U.S. Patents
`
`Security Infrastructure for Electronic Commerce Transactions
`5,745,574
`
`Secure Worldwide Electronic Commerce over an Open Network
`5,850,442
`
`Secure System based on Smart Cards
`5,943,423
`
`
`
`
`M.Sc. and Ph.D. Courses (Developed, Responsible and/or Teaching)
`
`
`
`1994
`
`Initiator and Coordinator of the KTH Specialization Program in Security
`KTH “Finger”
`Initiator and Coordinator of the KTH Information and Communication
`Systems Security (ICSS) International M.Sc. Program
`2010-today Member, Coordinating KTH Team for International NordSEC Security
`International M.Sc. Program
`
`
` M.Sc. Courses at Stockholm University
`
`
`2I1278
`Introduction to Computer Security
`2I1273
`Principles of Computer Security
`2I1274
`Security in Standardized Networks and Applications
`2I1272
`Security in Open Distributed Systems
`2I1276
`Java Security
`
`1998-2010
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- 3 -
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` M.Sc. Courses at The George Washington University (GWU)
`
`
`CS 283
`Computer Security Systems 1
`CS 383
`Computer Security Systems 2
`CS 385
`E-Commerce Security
`CS 386
`Java Security Mechanisms
`CS 297
`Design of Distributed Security Systems
`CS 298
`Security for Mobile Agents
`
`
`
` M.Sc. Courses at The Royal Institute of Technology (KTH)
`
`
`IV 2020
`Computer Networks Security
`IK 2000
`Security for Open Distributed Systems
`IK 2001
`Java and E-Commerce Security
`IK 2002
`Security for Mobile and Wireless Networks
`
`
`
`
` Ph.D. (Advanced) Courses at The Royal Institute of Technology (KTH)
`
`
`FID 3001
`Advanced Aspects of Networks Security
`FID 3002
`Advanced Security Architecture for Cloud Computing Environments
`FID 3003
`Advanced Aspects of Generic Security Objects
`FID 3004
`Advanced Security for Mobile and Wireless Networks
`
`
`
`
`
`- 4 -
`
`

`

`
`
`Appendix: Scientific and Research Publications
`
`A.1 Books
`
`My most important publications are six books, two published in Great Britain, one in the USA, and three in
`(former) Yugoslavia:
`
`
`1.
`
`The first book, "Security Mechanisms for Computer Networks" contains the results of
`the first stage of the EU. COST-11 Ter Project. It was published by Ellis Horwood, Ltd. in
`1989 (first edition) and in 1991 (second edition).
`
`The second book, "Security in IBM Systems", was published in 1990 in the USA and it
`contains (a) an overview of security features in IBM systems, and (b) design of an
`integrated security system for IBM systems.
`
`The third book, "Security Architecture for Distributed Systems", contains the re-suits
`of the second stage of the C.E.O. CosT-11 Ter Project. It was published by John Wiley
`in January 1993.
`
`The fourth book is "Introduction to Computer Systems" (1978), published in (former)
`Yugoslavia and used as the textbook for the same computer course.
`
`The fifth book was "Introduction to Computer Security" (1980).
`
`
`2.
`
`
`3.
`
`
`4.
`
`
`5.
`
`6.
`
`The sixth book was "Mathematical Foundations of Computer Science" (1989).
`
`
`
`A.2 Research Papers and Project Reports
`
`Kounelis, I., Baldini, G., Muftic, S., Loeschner J,
` "An Architecture for Secure m-Commerce Applications",
`Proceedings of the SIOT – Secure Internet of Things Conference, 2013, Bucharest 2013
`
`Zhang, F., Kounelis, I., Muftic, S.,
`“Generic, Secure and Modular (GSM) Methodology for Design and Implementation
`of Secure Mobile Applications",
`The Sixth International Conference on Emerging Security Information, Systems and Technologies
`– Securware 2012, Rome, Italy, 2012
`
`Kounelis, I., Zhao, H., Muftic, S.,
`“Secure Middleware for Mobile Phones and UICC Applications”,
`Mobilware – 4th International ICST Conference on Mobile Wireless Middleware, Operating
`Systems, and Applications, London, 2011
`
`Loeschner, J., Kounelis, I., Mahieu, S., Nordvik, J.P., Stirparo, P., Muftic, S.
`"Towards a better understanding of the impact of emerging ICT on the safety and security
`of the Citizen",
`1st SysSec Workshop, SysSec 2011, Amsterdam, The Netherlands, 2011
`
`Feng Zhang, Sead Muftic, Gernot Schmöelzer
`“Secure Service-Oriented Architecture for Mobile Transactions”
`World Congress on Internet Security (WorldCIS-2011), February 21-23, 2011, London, UK
`
`- 5 -
`
` 1
`
`
`
`2
`
`3
`
`4
`
`5
`
`
`
`
`
`

`

`Hao Zhao, Sead Muftic
`“The Concept of a Secure Mobile Wallet”
`Proceedings of the Conference “World Congress on Internet Security” (WorldCIS-2011),
`London, February 2011
`
`Abdul Ghafoor, Sead Muftic, Shahzad Ahmed Mumtaz
`“Security Extensions of Windows Environment based on FIPS 201 (PIV) Smart Card”, accepted
`for publication in the World Congress of Internet Security, London, UK, February 21-23, 2011
`
`Abdul Ghafoor, Sead Muftic
`“CryptoNET: Security Management Protocols”
`Proceeding of The 9th WSEAS International Conference on Data Networks, Communication,
`Computers (DNCOCO-2010), Faro, Portugal, pp. 15-20, November 3-5, 2010
`
`Abdul Ghafoor, Sead Muftic, and Gernot Schmölzer
`“CryptoNET: A Model of Generic Security Provider”’,
`International Journal of Internet Technology and Secured Transactions,
`Vol. 2, Nos. 3/4, pp.321–335, November 2010
`
`Abdul Ghafoor, Sead Muftic
`“Web Contents Protection, Secure Execution and Authorized Distribution”,
`Proceeding of The 5th IEEE International Multi-Conference on Computing in the Global
`Information Technology (ICCGI-2010), pp. 157-162, Valencia, Spain, September 20-25, 2010
`
`Hao Zhao, Sead Muftic, Feng Zhang
`“Secure Mobile Wallet: Anytime, Anywhere Financial Transactions”,
`Cutter IT Journal, Vol 23, No 7, July 2010
`
`Abdul Ghafoor, Sead Muftic
`“CryptoNET: Software Protection and Secure Execution Environment”,
`International Journal of Computer Science and Network Security (IJCSNS),
`pp. 19-26, Vol 10, February 2010
`
` Ghafoor, S. Muftic, G. Schmölzer
`“A Model and Design of a Security Provider for Java Applications”
`Proceeding of The International Conference for Internet Technology and Secured Transactions
`(ICITST-2009), pp. 794-800, London, UK, November 9-12, 2009
`
` Abdul Ghafoor, Sead Muftic
`“CryptoNET: Integrated Secure Workstation”
`International Journal of Advanced Science and Technology, (IJAST),
`Vol 12, pp. 1-10, November 2009
`
`Giambruno A, Shibli A, Muftic S, Lioy A
`“MagicNET: XACML Authorization Policies for Mobile Agents”
`Proceedings of the 4th IEEE International Conference for Internet Technology and Secured
`Transactions (ICITST-2009) November 9-12, 2009, London, UK
`
`A. Ghafoor, S. Muftic, G. Schmölzer
`“CryptoNET: Secure Federation Protocol and Authorization Policies for SMI”, published in the
`proceeding of The International Conference on Risks and Security of Internet and Systems 2009
`(CRiSIS2009), pp. 19-26, Toulouse, France, October 19-22, 2009
`
` Shibli A, Giambruno A, Muftic S, Lioy A
`“MagicNET: Security System for Development, Validation and Adoption of Mobile Agents”
`Proceedings of The 3rd IEEE International Conference on Network & System Security,
`Gold Coast Australia, October 19-21, 2009
`
`
`6
`
` 7
`
`
`
` 8
`
`
`
` 9
`
`
`
`
`10
`
`
`11
`
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`- 6 -
`
`

`

`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`Shibli A and Muftic S
`“MagicNET: Security Architecture for Authorization of Mobile Agents”
`Proceedings of The 3rd International Conference on Internet Technologies & Applications,
`Wrexham, North Wales, UK, September 8-11, 2009
`
`Amila Karunanayake, Kasun De Zoysa, Sead Muftic, Feng Zhang
`”Mobile ATM for Developing Countries”, Demonstration at the 7th ACM/USENIX International
`Conference on Mobile Systems, Applications, and Services, ACM, June 2009, Kraków, Poland
`
`A. Ghafoor, S. Muftic, and G. Schmölzer
`“CryptoNET: Design and Implementation of the Secure Email System”
`Proceeding of International Workshop on Security and Communication Networks (IWSCN2009)
`pp.75-80, Trondheim, Norway, May 20-22, 2009
`
`Shibli A and Muftic S
`“MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents”
`Proceedings of The International Workshop on Security and Communication Networks,
`May 20-22, 2009, Trondheim, Norway
`
`Shibli A, Mwakalinga J and Muftic S,
`“MagicNET: The Human Immune System and Network Security System”
`International Journal of Computer Science and Network Security,
`Vol 9, No 1, pp 87-94, February 1, 2009
`
`Feng Zhang, Sead Muftic, Kasun DeZoysa
`“SAFE System: Applications for Financial Environments Using Mobile Phones”
`Proceedings of IADIS International Conference IADIS e-Society,
`February 2009, Barcelona, Spain
`
`Shibli A and Muftic S
`“MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile
`Agents”
`Proceedings of The 11th IEEE International Conference on Advanced Communication
`Technology. - Phoenix Park, Korea, February 15-18, 2009
`
`Shibli A, Pasquale S and Muftic S
`“Vulnerability Analysis and Patches Management using Secure Mobile Agents”
`Proceedings of The 11th IEEE International Conference on Advanced Communication
`Technology. - Phoenix Park Korea, February 15-18, 2009
`
`Amila Karunanayake, Kasun DeZoysa, Sead Muftic, Feng Zhang
`“Experiences on Mobile-ATM Deployment in a Developing Country”
`Proceedings of The 1st International Conference on M4D Mobile Communication Technology for
`Development (M4D 2008, General Tracks): 11–12 December, 2008, Karlstad University, Sweden
`
`S. Muftic
`“CryptoNET and MagicNET Systems: Eliminating Human Factor from Security Equation”
`Invited Speaker and Paper in Proceedings of ICITS Conference
`Dublin, Ireland, June 23–26, 2008
`
`
`28 C. C. Chang, S. Muftic, D. J. Nagel
`“Cryptographic Algorithms for Wireless Sensor Nodes”
`Proceedings of the First ACM Conference on Wireless Network Security
`(ACM WiSec 2008), Alexandria, Virginia, March 2008
`
`- 7 -
`
`

`

`29 M. Alhamouri, S. Muftic
`“A Design of an Access Control Model for Multilevel-Security Documents”
`Proceedings of ICACT 2008, 10th Int’l Conference on Advanced Communication
`Technology, Phoenix Park, Korea, February 2008
`
`
`30 C. C. Chang, D. J. Nagel, S. Muftic
`“Security in Operational Wireless Sensor Networks”
`Proceeding of the Fifth IEEE Consumer Communications & Networking Conference (IEEE CCNC
`2008), Las Vegas, Nevada, January 2008
`
`
`31 C. C. Chang, S. Arafa, S. Muftic
`“Key Establishment Protocol for Wireless Sensor Networks”
`Proceeding of 1st International Workshop on Mobile Ad hoc and Sensor Systems for Global and
`Homeland Security (MASS-GHS 2007), Pisa, Italy, October 2007
`
`
`32 C. C. Chang, D. J. Nagel, S. Muftic
`“Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security
`Algorithms”
`Proceeding of The 3rd IEEE International Workshop on Wireless and Sensor Networks Security
`(IEEE WSNS 2007), Pisa, Italy, October 2007
`
`
`33 C. C. Chang, D. J. Nagel, S. Muftic
`“Balancing Security and Energy Consumption in Wireless Sensor Networks”
`Proceeding of The 3rd International Conference on Mobile Ad-hoc and Sensor Networks (MSN
`2007), Beijing, China, December 2007
`
`
`34 M. Alhamouri, S. Muftic
`“Management of Groups and Group Keys in Multi-Level Security Environments”
`(LNCS) Lecture Notes in Computer Science: Computer Safety, Reliability, and Security.
`SpringerLink, Volume 4680/2007, Pages 75-80, September 22, 2007
`
`
`35 C. C. Chang, S. Muftic, D. J. Nagel
`“Measurement of Energy Costs of Security in Wireless Sensor Nodes”
`Proceeding of 16th IEEE International Conference on Computer Communications and Networks
`(IEEE ICCCN 2006), Honolulu, Hawaii, Aug 2007
`
`
`36 A. Shibli, S. Muftic
`“Building Secure Systems Using Mobile Agents”
`Proceedings of the 4th International Workshop on Multi-Agent Systems and
`Semantic Grid (MASSG06), Rawalpindi, Pakistan, December 16, 2006
`
`
`37 M. Alhamouri, S. Muftic
`“A Model for Creating Multi-level-security Documents and Access Control Policies”
`Proceedings of the 8th International Symposium on Systems and Information Security, Sao Paulo,
`Brazil, November 2006
`
`
`38 S. Muftic, C. C. Chang
`“Security in Wireless Sensor Networks: Status, Problems, Current Technologies and Trends”
`ENISA Quarterly, March 2006
`
`
`39 Y. Cheng, S. Muftic
`“Efficient Authentication in Wireless Mobile Communications”
` Proceedings of the 2003 Wireless Personal Multimedia Communications Conference,
`
`Tokyo, Japan, November 2003
`
`40 Y. Cheng, S. Muftic
`“Maintaining Security Associations for Seamless Mobile WPN”
` Proceedings of the CIC'2003 Conference, Seoul, South Korea, Oct 28–31, October 2003
`
`- 8 -
`
`

`

`
`41 Morogan, M.C., Muftic, S.
`“Access Control for Documents in Ad–Hoc Networks”
` Proceedings of the DMS 03 Conference, Miami, US, September 2003
`
`42
`
`S. Muftic
`“Intrusion Prevention System based on Mobile Agents”
` Proceedings of the 2003 Research Summit, Virginia Institute for Defense and
`
`Homeland Security, Washington, DC, June 2003
`
`43 S. Muftic et al.
`“GSAKMP: Design and Implementation of a GSA System”
` CSPRI Project Report, NSA/LUCITE Project, Washington, DC., USA, March 2003
`
`44 Morogan, M.C., Muftic, S.
`“Certificate Management in Ad–Hoc Networks”
` Proceedings of the IEEE 2003 Symposium on Applications and the Internet
`Workshops, Orlando, Florida, USA, October 2002
`
`
`45 S. Muftic et al.
`“SILK: Security Integrated in Linux Kernel”
` CSPRI Project Report, DARPA/SELinux Project, Washington, DC. USA, September 2002
`
`46 DeZoysa, K., Muftic, S
`“Bi-directional Web Document Protection System for Serious E-commerce Applications”
` Proceedings, Workshop on Trusted Computing Paradigms, International Conference
`on Parallel Processing, Vancouver, British Columbia, Canada, August 2002
`
`
`47 B. Taylor, S. Muftic
`“Remote Method Security in a Distributed Processing Architecture
`supporting Generic Secure Objects”
` Proceedings, Annual POWID Conference, San Diego, USA, March 2002
`
`48 S. Muftic et al.
`“IDSMA: Intrusion Detection System based on Mobile Agents”
` Project Report, LUCITE/DISA Project, Washington, DC., USA, September 2001
`
`49 S. Muftic et al.
`
`“VANEL: The System for Analysis and Elimination of Vulnerabilities”
`
`Proceedings of the DoD/DISA Workshop, Washington, DC. USA, April 2001
`
`50 S. Muftic et al.
`“Properties, Methods, Protocols, and Architectures of Generic Secure Objects”
` Project Report, LUCITE/NRO Project, Washington, DC., USA, October 2001
`
`51 S. Muftic et al.
`“Overview and Analysis of existing Standards and Technologies relevant for Generic Secure
`Objects”
` Project Report, LUCITE/NRO Project, Washington, DC., USA, October 2001
`
`52 Yi Cheng, S. Muftic
`“Overview and Analysis of Security in Wireless Mobile Communications”
` Annual PCC Conference, Stockholm, Sweden, April 2000
`
`53 S. Muftic, Matei Ciobanu – Morogan
`“Java Security Infrastructure for Global Electronic Commerce”
` Proceedings of the STEP’99 Conference, Pittsburgh, August 1999
`
`
`- 9 -
`
`

`

`54 S. Muftic, Matei Ciobanu – Morogan
`“SETECS System for Global Electronic Commerce”
` EU EMMSEC’99 Conference, Stockholm, June 1999
`
`55 Yi Cheng, S. Muftic
`“Security Architecture for Mobile Agents”
` EU ECMAST’99 Conference, Madrid, May 1999
`
`56 S. Muftic, Matei Ciobanu – Morogan, Yi Cheng
`“Security System for Mobile Agents and Java Applications”
` PCC Conference, Stockholm, Sweden, November 1998
`
`57 S. Muftic, Matei Ciobanu – Morogan
`“SETECS: The System for Secure Business Transactions”
` Greek National Computer Conference, Samos, September 1998
`
`58 S. Muftic
`“GAIA Secure Payment System”
` Project Report, EU GAIA Project Report, June 1997
`
`59 S. Muftic
`“COST Certification Infrastructure”
` Project Report, EU ICE-TEL Project Report, September 1997
`
`60 S. Muftic
`“Implementation of the Comprehensive Integrated Security System for Computer Networks”
` Proceedings, Annual SiRen Conference, Goteborg, May 1995
`
`61 S. Muftic
` “Creating Global Cryptographic Infrastructures”
` National Crypto Conference, October 1995, Washington, DC, USA
`
`62 S. Muftic
` “Functional and Operational Security System for Open Distributed Environments”
` Proceedings, II'tP/SEC'95, May 1995, Cape Town, South Africa
`
`63
`
`S. Muftic
` “Comprehensive and Integrated Security System: Design Principles and Operational Results”
`Proceedings, ICSI'94, Int'l Conf. on Sys Integration, Sao Paolo, August 1994
`
`
`
`64
`
`
`
`65
`
`
`
`66 S. Muftic and X. Jin
`
`“Integrated LAN Security System”
`
`INTEROP'94, Paris, May 1994
`
`67 S. Muftic, N. Kapidzic, A. Davidson
`
`“The Structure and Functioning of the COST PEM System”
`
`Proceedings, IEIP/SEC'94, Curacao, May 1994
`
`S. Muftic
`“Editorial as the Guest Editor”
`Computer Communications Journal, Special Issue on Security, June 1994
`
`S. Muftic and M. Sloman
`“Security Architecture for Distributed Systems”
`Computer Communications Journal, Special Issue on Security, June 1994
`
`- 10 -
`
`

`

`
`68
`
`
`
`69
`
`
`
`
`70
`
`
`
`
`71
`
`
`
`
`
`72
`
`
`
`73
`
`
`
`74
`
`
`
`
`75
`
`S. Muftic
`“Security Architecture for ODP System”
`Final Results of the COST-11 "Security" Project
`
`S. Muftic
`“Implementation of the Generalized Security System for Network EDI Applications”
`Proceedings, 7th European Conference on IS, Security, Control and Audit
`November 16 - 18,1992, Brussels, Belgium
`
`S. Muftic
`“Security Requirements for Open Distributed Systems”
`Proceedings, 7th Annual Conference on Computer Assurance,
`June 15-18, 1992, Washington, USA
`
`S. Muftic
`“Implementation of the Comprehensive Integrated Security System for Computer Networks”
`Proceedings, 3rd Joint European Computer Networks Conference
`May 10 - 15,1992, Innsbruck, Austria
`(also in Computer Networks & ISDN Systems, Vol. 25, No 45, Nov 1992)
`
`S. Muftic and E. Hatunic
`“CISS: Generalised Security Libraries”
`COMPUTERS & SECURITY Journal, Vol. 11, No. 7, 1992
`
`S. Muftic
`“Implementation of Security in ODP Systems by Generalized Security Servers”
`Proceedings, CEO COST-225 Workshop, Rome, Sept 1991
`
`S. Muftic
`“Comprehensive Integrated Security System”
`(Final Results of the CEC COST-11 Ter "Security" Project)
`COMPUTER NETWORKS & ISDN SYSTEMS Journal (1991)
`
`S. Muftic
`“Conceptual Model of the Comprehensive Integrated Security System (CISS)”
`Proceedings, Symposium on Computer Security, Rome, November 22~23, 1990
`
`S. Muftic
`“Transaction Protection by Antennas”
`COMPUTERS & SECURITY Journal, Vol. 9, No. 3, May 1990
`
`S. Muftic
`“Security in Open Distributed Processing (ODP) Systems”
`Proceedings, International Conference IEIP/SEC'90, Helsinki, May 1990
`
`S. Muftic
`“Design of Parallel Security Algorithms and Protocols”
`Internal Report, EU COST-11 Ter Security Project, April 1990
`
`S. Muftic
`“Extended OSI Security Architecture”
`COMPUTER NETWORKS & ISDN SYSTEMS Journal,
`Vol. 17, No. 3, September 1989
`
`
`
`76
`
`
`
`77
`
`
`
`78
`
`
`
`79
`
`
`
`
`S. Muftic
`80
`“Integration of Network Security Mechanisms”
`
` Proceedings, EUTECO'88, CEO European Conference, Vienna, April 1988
`
`- 11 -
`
`

`

` S. Muftic
`“Security Mechanisms for Computer Networks”
`(Current Results of the CEC COST-11 Ten Project)
`COMPUTER NETWORKS & ISDN SYSTEMS Journal, Vol. 15, No. 1, January 1988
`
`S. Muftic, G. Babic
`“Security Features of the ENERGONET Network”
`Proceedings, CCDC'8T, International Conference, New Delhi, October 1987
`
`S. Muftic
`“Architectural Issues related to Security and Management”
`Proceedings, EU COST-11 Conference, Bonn, March 1987
`
`
`81
`
`
`
`
`82
`
`
`
`83
`
`
`
`S. Muftic
`84
`“Security Mechanisms for Computer Networks”
`
`(A Program of the CEC COST-11 Ter Project)
`
` COMPUTER NETWORKS & ISDN SYSTEMS Journal, Vol. 12, No. 5, Oct.ober1986
`
`85
`
`
`
`86
`
`
`
`
`19762112
`011615
`
`S. Muftic
`“Secure Exchange of Sensitive Data in A Computer Network”
`Proceedings, International Conference IEIP/SEC'86, Monte Carlo, May 1986
`
`S. Muftic, P.11. Underhill
`“Security in Computer Networks”
`Proceedings, EUTECO-83, EU European Conference, Varese, Oct. 1983
`
`- 12 -
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket