`
`Curriculum Vitae – September 1, 2014
`
`
`Sead Muftic
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Professional Profile
`
`
`– Tenure (full) professor of computer security at The Royal Institute of Technology
`
` and visiting / research professor at several international universities
`– International expert for various areas of computer and communication
` networks security (EU, VISA, IADB, Siemens, ENISA, EU/TDL Consortium)
`– Advisor and consultant to several international agencies, banks and associations
` (European Commission, EU/JRC, World Bank, IADB, VISA, Siemens)
`– Experienced entrepreneur and businessman (Chairman, CEO, CTO of several
` start-up, small and large companies)
`
`– M.Sc. degree (1974) and Ph.D. degree (1976) in the area of computer security
`
`– Author of three international books and about 100 published research papers
`
`– Author of three registered U.S. patents
`
`– Invited speaker at many national and international conferences
`
`
`
`
`
`
`Education
`
`1955–1963 Elementary School (Sarajevo, Former Yugoslavia)
`
`1964–1967 High School (Sarajevo, Former Yugoslavia)
`
`1967–1971 University of Sarajevo – Department of Mathematics
`(degree: B.Sc. in Applied Mathematics)
`1971–1973 Professional Education: IBM Systems Engineer
`1973–1974 The Ohio State University, Department of Computer Science
` (M.Sc. in Computer Science – computer security)
`1974–1976 The Ohio State University, Department of Computer Science
` (Ph.D. in Computer Science – computer security)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- 1 -
`
`Intellectual Ventures Ex. 2008
`Compass v. IV
`IPR2014-00724
`
`
`
`Academic Employments (Permanent or Visiting)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2001
`
`2011
`
`1973–1976 The Ohio State University, Computer Science Department
`Research and Teaching Assistant
`1975–1976 The Ohio State University, Department of Mathematics
`Teaching Assistant
`1984–1991 University of Sarajevo, Department for Mathematics
`Professor, Applied Mathematics, Computer and Networks Security
`1991-1993 Computer Science Department, Stockholm University
`Professor, Computer and Networks Security
`1993-2002 Computer Science Department, Stockholm University
`Visiting Professor, Computer and Networks Security
`University of South Europe, Monte Carlo, Monaco
`Visiting Professor, Secure E–commerce Systems
`2002–today Computer Science Department, Royal Institute of Technology
`Professor, Computer and Networks Security
`2000-2005 Computer Science Department, The George Washington University
`Research Professor, Networks and E-commerce Security
`2008-2010 Computer Science Department, Michigan Technical University
`Research Professor, Security for Medical IT
`Computer Science Department, University of Murcia
`Visiting Professor, Computer and Networks Security
`
`
`
`Commercial Employments
`
`
`
`
`1971–1973
`1976–1984
`
`IBM (Former) Yugoslavia - System Engineer
`Institute for Urban Planning – Sarajevo, Former Yugoslavia
`Director, IT Department
`1992–1995 CEO, COST Computer Security Technologies AB (Stockholm, Sweden)
`
`1995–1998 Chairman/CTO, Entegrity Solutions (Silicon Valley, USA)
`
`1998–2000 Chairman/CEO, SETECS AB (Stockholm, Sweden)
`
`2001–2004 President/CEO, SETECS Corporation (Delaware, USA)
`
`2002–today Chairman/President, SETECS, Inc. (Washington DC, USA)
`
`2006–today Chairman/CEO, SETECS Mobile Technologies (Washington DC, USA)
`
`
`
`
`Project Management, Consulting and Advisory Activities
`
`
`
`
`
`
`
`
`
`
`
`
`1985–1990 Director, EU COST-11 Security Research Project
`1992–1993 Participant, EU SYSMAN Research Project
`1993–1995 Participant, EU GAIA Research Project
`1995–1997 Participant, EU ICE-CAR Research Project
`1996
`Evaluator, EU/FP4 Security Project Proposals
`1996
`Evaluator, EU/FP4 Security Project Proposals
`1996-1998 Evaluator, VISA/Master Card SET Business Review Panel
`2001
`PI, DoD/DISA, "Intrusion–Detection System based on Mobile Agents"
`2002
`PI, NSA/LUCITE, “Generic Security Objects” project
`2002-2003 Participant, US Social Security Administration,
`"Channel Convergence" project
`PI, NSA/LUCITE, “Security Management for Secure LINUX” project
`2003
`2003-2004 PI, NSA/LUCITE, “Security Architecture for Group Communications”
`project
`2004-2005 PI, In-Q-Tel, “Security System for Wireless Sensor Networks” project
`2002-2004 Advisor, NOAA/US Government PKI Project
`2004-2005 Member, NIST/US Government PIV Project WG
`2004-2006 Evaluator, NSF Security projects
`
`- 2 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1988
`1994
`
`2005-2006 Consultant, NCUA/US Government PIV cards project
`2005-2008 Member, Advisory Board
`EU / European Network and Information Security Agency (ENISA)
`Consultant, World Bank PKI project
`2005
`Evaluator, SIEMENS Corporate Security R&D Strategy
`2008
`2011-2013 Chairman, Advisory Board
`EU / Trust in Digital Life (TDL) Consortium
`2012-2013 Coordinator, TDL/WG2
`EU / Trust in Digital Life (TDL) Consortium
`Independent Expert, EU/JRC, Secure Digital Identities project
`2014
`
`
`
`
`Memberships in Standardization Bodies and Professional Associations
`
`1986–1988 Member, GSM Working Group on security
`
`1990–2000 Member, ACM
`
`1990–2000 Member, IEEE
`
`1994–1996 Member, New York Academy of Sciences
`
`1995–1998 Member, American Bar Association (ABA) Digital Signature WG
`
`1994–1998 Member, IETF, Internet Security and Privacy WG
`
`
`
`
`Other Professional Activities
`
`
`
`
`Coordinator, EUTECO'88, European Teleinformatics Conference
`Guest Editor, "Computer Communications" Journal,
`special issue on security
`Member, Program Committee, 11th international IFIP/SEC Conference
`Session Chairman, 3rd International Conference on Systems Integration
`
`
`1995
`
`1994
`
`
`
`U.S. Patents
`
`Security Infrastructure for Electronic Commerce Transactions
`5,745,574
`
`Secure Worldwide Electronic Commerce over an Open Network
`5,850,442
`
`Secure System based on Smart Cards
`5,943,423
`
`
`
`
`M.Sc. and Ph.D. Courses (Developed, Responsible and/or Teaching)
`
`
`
`1994
`
`Initiator and Coordinator of the KTH Specialization Program in Security
`KTH “Finger”
`Initiator and Coordinator of the KTH Information and Communication
`Systems Security (ICSS) International M.Sc. Program
`2010-today Member, Coordinating KTH Team for International NordSEC Security
`International M.Sc. Program
`
`
` M.Sc. Courses at Stockholm University
`
`
`2I1278
`Introduction to Computer Security
`2I1273
`Principles of Computer Security
`2I1274
`Security in Standardized Networks and Applications
`2I1272
`Security in Open Distributed Systems
`2I1276
`Java Security
`
`1998-2010
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- 3 -
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` M.Sc. Courses at The George Washington University (GWU)
`
`
`CS 283
`Computer Security Systems 1
`CS 383
`Computer Security Systems 2
`CS 385
`E-Commerce Security
`CS 386
`Java Security Mechanisms
`CS 297
`Design of Distributed Security Systems
`CS 298
`Security for Mobile Agents
`
`
`
` M.Sc. Courses at The Royal Institute of Technology (KTH)
`
`
`IV 2020
`Computer Networks Security
`IK 2000
`Security for Open Distributed Systems
`IK 2001
`Java and E-Commerce Security
`IK 2002
`Security for Mobile and Wireless Networks
`
`
`
`
` Ph.D. (Advanced) Courses at The Royal Institute of Technology (KTH)
`
`
`FID 3001
`Advanced Aspects of Networks Security
`FID 3002
`Advanced Security Architecture for Cloud Computing Environments
`FID 3003
`Advanced Aspects of Generic Security Objects
`FID 3004
`Advanced Security for Mobile and Wireless Networks
`
`
`
`
`
`- 4 -
`
`
`
`
`
`Appendix: Scientific and Research Publications
`
`A.1 Books
`
`My most important publications are six books, two published in Great Britain, one in the USA, and three in
`(former) Yugoslavia:
`
`
`1.
`
`The first book, "Security Mechanisms for Computer Networks" contains the results of
`the first stage of the EU. COST-11 Ter Project. It was published by Ellis Horwood, Ltd. in
`1989 (first edition) and in 1991 (second edition).
`
`The second book, "Security in IBM Systems", was published in 1990 in the USA and it
`contains (a) an overview of security features in IBM systems, and (b) design of an
`integrated security system for IBM systems.
`
`The third book, "Security Architecture for Distributed Systems", contains the re-suits
`of the second stage of the C.E.O. CosT-11 Ter Project. It was published by John Wiley
`in January 1993.
`
`The fourth book is "Introduction to Computer Systems" (1978), published in (former)
`Yugoslavia and used as the textbook for the same computer course.
`
`The fifth book was "Introduction to Computer Security" (1980).
`
`
`2.
`
`
`3.
`
`
`4.
`
`
`5.
`
`6.
`
`The sixth book was "Mathematical Foundations of Computer Science" (1989).
`
`
`
`A.2 Research Papers and Project Reports
`
`Kounelis, I., Baldini, G., Muftic, S., Loeschner J,
` "An Architecture for Secure m-Commerce Applications",
`Proceedings of the SIOT – Secure Internet of Things Conference, 2013, Bucharest 2013
`
`Zhang, F., Kounelis, I., Muftic, S.,
`“Generic, Secure and Modular (GSM) Methodology for Design and Implementation
`of Secure Mobile Applications",
`The Sixth International Conference on Emerging Security Information, Systems and Technologies
`– Securware 2012, Rome, Italy, 2012
`
`Kounelis, I., Zhao, H., Muftic, S.,
`“Secure Middleware for Mobile Phones and UICC Applications”,
`Mobilware – 4th International ICST Conference on Mobile Wireless Middleware, Operating
`Systems, and Applications, London, 2011
`
`Loeschner, J., Kounelis, I., Mahieu, S., Nordvik, J.P., Stirparo, P., Muftic, S.
`"Towards a better understanding of the impact of emerging ICT on the safety and security
`of the Citizen",
`1st SysSec Workshop, SysSec 2011, Amsterdam, The Netherlands, 2011
`
`Feng Zhang, Sead Muftic, Gernot Schmöelzer
`“Secure Service-Oriented Architecture for Mobile Transactions”
`World Congress on Internet Security (WorldCIS-2011), February 21-23, 2011, London, UK
`
`- 5 -
`
` 1
`
`
`
`2
`
`3
`
`4
`
`5
`
`
`
`
`
`
`
`Hao Zhao, Sead Muftic
`“The Concept of a Secure Mobile Wallet”
`Proceedings of the Conference “World Congress on Internet Security” (WorldCIS-2011),
`London, February 2011
`
`Abdul Ghafoor, Sead Muftic, Shahzad Ahmed Mumtaz
`“Security Extensions of Windows Environment based on FIPS 201 (PIV) Smart Card”, accepted
`for publication in the World Congress of Internet Security, London, UK, February 21-23, 2011
`
`Abdul Ghafoor, Sead Muftic
`“CryptoNET: Security Management Protocols”
`Proceeding of The 9th WSEAS International Conference on Data Networks, Communication,
`Computers (DNCOCO-2010), Faro, Portugal, pp. 15-20, November 3-5, 2010
`
`Abdul Ghafoor, Sead Muftic, and Gernot Schmölzer
`“CryptoNET: A Model of Generic Security Provider”’,
`International Journal of Internet Technology and Secured Transactions,
`Vol. 2, Nos. 3/4, pp.321–335, November 2010
`
`Abdul Ghafoor, Sead Muftic
`“Web Contents Protection, Secure Execution and Authorized Distribution”,
`Proceeding of The 5th IEEE International Multi-Conference on Computing in the Global
`Information Technology (ICCGI-2010), pp. 157-162, Valencia, Spain, September 20-25, 2010
`
`Hao Zhao, Sead Muftic, Feng Zhang
`“Secure Mobile Wallet: Anytime, Anywhere Financial Transactions”,
`Cutter IT Journal, Vol 23, No 7, July 2010
`
`Abdul Ghafoor, Sead Muftic
`“CryptoNET: Software Protection and Secure Execution Environment”,
`International Journal of Computer Science and Network Security (IJCSNS),
`pp. 19-26, Vol 10, February 2010
`
` Ghafoor, S. Muftic, G. Schmölzer
`“A Model and Design of a Security Provider for Java Applications”
`Proceeding of The International Conference for Internet Technology and Secured Transactions
`(ICITST-2009), pp. 794-800, London, UK, November 9-12, 2009
`
` Abdul Ghafoor, Sead Muftic
`“CryptoNET: Integrated Secure Workstation”
`International Journal of Advanced Science and Technology, (IJAST),
`Vol 12, pp. 1-10, November 2009
`
`Giambruno A, Shibli A, Muftic S, Lioy A
`“MagicNET: XACML Authorization Policies for Mobile Agents”
`Proceedings of the 4th IEEE International Conference for Internet Technology and Secured
`Transactions (ICITST-2009) November 9-12, 2009, London, UK
`
`A. Ghafoor, S. Muftic, G. Schmölzer
`“CryptoNET: Secure Federation Protocol and Authorization Policies for SMI”, published in the
`proceeding of The International Conference on Risks and Security of Internet and Systems 2009
`(CRiSIS2009), pp. 19-26, Toulouse, France, October 19-22, 2009
`
` Shibli A, Giambruno A, Muftic S, Lioy A
`“MagicNET: Security System for Development, Validation and Adoption of Mobile Agents”
`Proceedings of The 3rd IEEE International Conference on Network & System Security,
`Gold Coast Australia, October 19-21, 2009
`
`
`6
`
` 7
`
`
`
` 8
`
`
`
` 9
`
`
`
`
`10
`
`
`11
`
`
`12
`
`13
`
`14
`
`15
`
`16
`
`17
`
`- 6 -
`
`
`
`18
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`26
`
`27
`
`Shibli A and Muftic S
`“MagicNET: Security Architecture for Authorization of Mobile Agents”
`Proceedings of The 3rd International Conference on Internet Technologies & Applications,
`Wrexham, North Wales, UK, September 8-11, 2009
`
`Amila Karunanayake, Kasun De Zoysa, Sead Muftic, Feng Zhang
`”Mobile ATM for Developing Countries”, Demonstration at the 7th ACM/USENIX International
`Conference on Mobile Systems, Applications, and Services, ACM, June 2009, Kraków, Poland
`
`A. Ghafoor, S. Muftic, and G. Schmölzer
`“CryptoNET: Design and Implementation of the Secure Email System”
`Proceeding of International Workshop on Security and Communication Networks (IWSCN2009)
`pp.75-80, Trondheim, Norway, May 20-22, 2009
`
`Shibli A and Muftic S
`“MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents”
`Proceedings of The International Workshop on Security and Communication Networks,
`May 20-22, 2009, Trondheim, Norway
`
`Shibli A, Mwakalinga J and Muftic S,
`“MagicNET: The Human Immune System and Network Security System”
`International Journal of Computer Science and Network Security,
`Vol 9, No 1, pp 87-94, February 1, 2009
`
`Feng Zhang, Sead Muftic, Kasun DeZoysa
`“SAFE System: Applications for Financial Environments Using Mobile Phones”
`Proceedings of IADIS International Conference IADIS e-Society,
`February 2009, Barcelona, Spain
`
`Shibli A and Muftic S
`“MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile
`Agents”
`Proceedings of The 11th IEEE International Conference on Advanced Communication
`Technology. - Phoenix Park, Korea, February 15-18, 2009
`
`Shibli A, Pasquale S and Muftic S
`“Vulnerability Analysis and Patches Management using Secure Mobile Agents”
`Proceedings of The 11th IEEE International Conference on Advanced Communication
`Technology. - Phoenix Park Korea, February 15-18, 2009
`
`Amila Karunanayake, Kasun DeZoysa, Sead Muftic, Feng Zhang
`“Experiences on Mobile-ATM Deployment in a Developing Country”
`Proceedings of The 1st International Conference on M4D Mobile Communication Technology for
`Development (M4D 2008, General Tracks): 11–12 December, 2008, Karlstad University, Sweden
`
`S. Muftic
`“CryptoNET and MagicNET Systems: Eliminating Human Factor from Security Equation”
`Invited Speaker and Paper in Proceedings of ICITS Conference
`Dublin, Ireland, June 23–26, 2008
`
`
`28 C. C. Chang, S. Muftic, D. J. Nagel
`“Cryptographic Algorithms for Wireless Sensor Nodes”
`Proceedings of the First ACM Conference on Wireless Network Security
`(ACM WiSec 2008), Alexandria, Virginia, March 2008
`
`- 7 -
`
`
`
`29 M. Alhamouri, S. Muftic
`“A Design of an Access Control Model for Multilevel-Security Documents”
`Proceedings of ICACT 2008, 10th Int’l Conference on Advanced Communication
`Technology, Phoenix Park, Korea, February 2008
`
`
`30 C. C. Chang, D. J. Nagel, S. Muftic
`“Security in Operational Wireless Sensor Networks”
`Proceeding of the Fifth IEEE Consumer Communications & Networking Conference (IEEE CCNC
`2008), Las Vegas, Nevada, January 2008
`
`
`31 C. C. Chang, S. Arafa, S. Muftic
`“Key Establishment Protocol for Wireless Sensor Networks”
`Proceeding of 1st International Workshop on Mobile Ad hoc and Sensor Systems for Global and
`Homeland Security (MASS-GHS 2007), Pisa, Italy, October 2007
`
`
`32 C. C. Chang, D. J. Nagel, S. Muftic
`“Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security
`Algorithms”
`Proceeding of The 3rd IEEE International Workshop on Wireless and Sensor Networks Security
`(IEEE WSNS 2007), Pisa, Italy, October 2007
`
`
`33 C. C. Chang, D. J. Nagel, S. Muftic
`“Balancing Security and Energy Consumption in Wireless Sensor Networks”
`Proceeding of The 3rd International Conference on Mobile Ad-hoc and Sensor Networks (MSN
`2007), Beijing, China, December 2007
`
`
`34 M. Alhamouri, S. Muftic
`“Management of Groups and Group Keys in Multi-Level Security Environments”
`(LNCS) Lecture Notes in Computer Science: Computer Safety, Reliability, and Security.
`SpringerLink, Volume 4680/2007, Pages 75-80, September 22, 2007
`
`
`35 C. C. Chang, S. Muftic, D. J. Nagel
`“Measurement of Energy Costs of Security in Wireless Sensor Nodes”
`Proceeding of 16th IEEE International Conference on Computer Communications and Networks
`(IEEE ICCCN 2006), Honolulu, Hawaii, Aug 2007
`
`
`36 A. Shibli, S. Muftic
`“Building Secure Systems Using Mobile Agents”
`Proceedings of the 4th International Workshop on Multi-Agent Systems and
`Semantic Grid (MASSG06), Rawalpindi, Pakistan, December 16, 2006
`
`
`37 M. Alhamouri, S. Muftic
`“A Model for Creating Multi-level-security Documents and Access Control Policies”
`Proceedings of the 8th International Symposium on Systems and Information Security, Sao Paulo,
`Brazil, November 2006
`
`
`38 S. Muftic, C. C. Chang
`“Security in Wireless Sensor Networks: Status, Problems, Current Technologies and Trends”
`ENISA Quarterly, March 2006
`
`
`39 Y. Cheng, S. Muftic
`“Efficient Authentication in Wireless Mobile Communications”
` Proceedings of the 2003 Wireless Personal Multimedia Communications Conference,
`
`Tokyo, Japan, November 2003
`
`40 Y. Cheng, S. Muftic
`“Maintaining Security Associations for Seamless Mobile WPN”
` Proceedings of the CIC'2003 Conference, Seoul, South Korea, Oct 28–31, October 2003
`
`- 8 -
`
`
`
`
`41 Morogan, M.C., Muftic, S.
`“Access Control for Documents in Ad–Hoc Networks”
` Proceedings of the DMS 03 Conference, Miami, US, September 2003
`
`42
`
`S. Muftic
`“Intrusion Prevention System based on Mobile Agents”
` Proceedings of the 2003 Research Summit, Virginia Institute for Defense and
`
`Homeland Security, Washington, DC, June 2003
`
`43 S. Muftic et al.
`“GSAKMP: Design and Implementation of a GSA System”
` CSPRI Project Report, NSA/LUCITE Project, Washington, DC., USA, March 2003
`
`44 Morogan, M.C., Muftic, S.
`“Certificate Management in Ad–Hoc Networks”
` Proceedings of the IEEE 2003 Symposium on Applications and the Internet
`Workshops, Orlando, Florida, USA, October 2002
`
`
`45 S. Muftic et al.
`“SILK: Security Integrated in Linux Kernel”
` CSPRI Project Report, DARPA/SELinux Project, Washington, DC. USA, September 2002
`
`46 DeZoysa, K., Muftic, S
`“Bi-directional Web Document Protection System for Serious E-commerce Applications”
` Proceedings, Workshop on Trusted Computing Paradigms, International Conference
`on Parallel Processing, Vancouver, British Columbia, Canada, August 2002
`
`
`47 B. Taylor, S. Muftic
`“Remote Method Security in a Distributed Processing Architecture
`supporting Generic Secure Objects”
` Proceedings, Annual POWID Conference, San Diego, USA, March 2002
`
`48 S. Muftic et al.
`“IDSMA: Intrusion Detection System based on Mobile Agents”
` Project Report, LUCITE/DISA Project, Washington, DC., USA, September 2001
`
`49 S. Muftic et al.
`
`“VANEL: The System for Analysis and Elimination of Vulnerabilities”
`
`Proceedings of the DoD/DISA Workshop, Washington, DC. USA, April 2001
`
`50 S. Muftic et al.
`“Properties, Methods, Protocols, and Architectures of Generic Secure Objects”
` Project Report, LUCITE/NRO Project, Washington, DC., USA, October 2001
`
`51 S. Muftic et al.
`“Overview and Analysis of existing Standards and Technologies relevant for Generic Secure
`Objects”
` Project Report, LUCITE/NRO Project, Washington, DC., USA, October 2001
`
`52 Yi Cheng, S. Muftic
`“Overview and Analysis of Security in Wireless Mobile Communications”
` Annual PCC Conference, Stockholm, Sweden, April 2000
`
`53 S. Muftic, Matei Ciobanu – Morogan
`“Java Security Infrastructure for Global Electronic Commerce”
` Proceedings of the STEP’99 Conference, Pittsburgh, August 1999
`
`
`- 9 -
`
`
`
`54 S. Muftic, Matei Ciobanu – Morogan
`“SETECS System for Global Electronic Commerce”
` EU EMMSEC’99 Conference, Stockholm, June 1999
`
`55 Yi Cheng, S. Muftic
`“Security Architecture for Mobile Agents”
` EU ECMAST’99 Conference, Madrid, May 1999
`
`56 S. Muftic, Matei Ciobanu – Morogan, Yi Cheng
`“Security System for Mobile Agents and Java Applications”
` PCC Conference, Stockholm, Sweden, November 1998
`
`57 S. Muftic, Matei Ciobanu – Morogan
`“SETECS: The System for Secure Business Transactions”
` Greek National Computer Conference, Samos, September 1998
`
`58 S. Muftic
`“GAIA Secure Payment System”
` Project Report, EU GAIA Project Report, June 1997
`
`59 S. Muftic
`“COST Certification Infrastructure”
` Project Report, EU ICE-TEL Project Report, September 1997
`
`60 S. Muftic
`“Implementation of the Comprehensive Integrated Security System for Computer Networks”
` Proceedings, Annual SiRen Conference, Goteborg, May 1995
`
`61 S. Muftic
` “Creating Global Cryptographic Infrastructures”
` National Crypto Conference, October 1995, Washington, DC, USA
`
`62 S. Muftic
` “Functional and Operational Security System for Open Distributed Environments”
` Proceedings, II'tP/SEC'95, May 1995, Cape Town, South Africa
`
`63
`
`S. Muftic
` “Comprehensive and Integrated Security System: Design Principles and Operational Results”
`Proceedings, ICSI'94, Int'l Conf. on Sys Integration, Sao Paolo, August 1994
`
`
`
`64
`
`
`
`65
`
`
`
`66 S. Muftic and X. Jin
`
`“Integrated LAN Security System”
`
`INTEROP'94, Paris, May 1994
`
`67 S. Muftic, N. Kapidzic, A. Davidson
`
`“The Structure and Functioning of the COST PEM System”
`
`Proceedings, IEIP/SEC'94, Curacao, May 1994
`
`S. Muftic
`“Editorial as the Guest Editor”
`Computer Communications Journal, Special Issue on Security, June 1994
`
`S. Muftic and M. Sloman
`“Security Architecture for Distributed Systems”
`Computer Communications Journal, Special Issue on Security, June 1994
`
`- 10 -
`
`
`
`
`68
`
`
`
`69
`
`
`
`
`70
`
`
`
`
`71
`
`
`
`
`
`72
`
`
`
`73
`
`
`
`74
`
`
`
`
`75
`
`S. Muftic
`“Security Architecture for ODP System”
`Final Results of the COST-11 "Security" Project
`
`S. Muftic
`“Implementation of the Generalized Security System for Network EDI Applications”
`Proceedings, 7th European Conference on IS, Security, Control and Audit
`November 16 - 18,1992, Brussels, Belgium
`
`S. Muftic
`“Security Requirements for Open Distributed Systems”
`Proceedings, 7th Annual Conference on Computer Assurance,
`June 15-18, 1992, Washington, USA
`
`S. Muftic
`“Implementation of the Comprehensive Integrated Security System for Computer Networks”
`Proceedings, 3rd Joint European Computer Networks Conference
`May 10 - 15,1992, Innsbruck, Austria
`(also in Computer Networks & ISDN Systems, Vol. 25, No 45, Nov 1992)
`
`S. Muftic and E. Hatunic
`“CISS: Generalised Security Libraries”
`COMPUTERS & SECURITY Journal, Vol. 11, No. 7, 1992
`
`S. Muftic
`“Implementation of Security in ODP Systems by Generalized Security Servers”
`Proceedings, CEO COST-225 Workshop, Rome, Sept 1991
`
`S. Muftic
`“Comprehensive Integrated Security System”
`(Final Results of the CEC COST-11 Ter "Security" Project)
`COMPUTER NETWORKS & ISDN SYSTEMS Journal (1991)
`
`S. Muftic
`“Conceptual Model of the Comprehensive Integrated Security System (CISS)”
`Proceedings, Symposium on Computer Security, Rome, November 22~23, 1990
`
`S. Muftic
`“Transaction Protection by Antennas”
`COMPUTERS & SECURITY Journal, Vol. 9, No. 3, May 1990
`
`S. Muftic
`“Security in Open Distributed Processing (ODP) Systems”
`Proceedings, International Conference IEIP/SEC'90, Helsinki, May 1990
`
`S. Muftic
`“Design of Parallel Security Algorithms and Protocols”
`Internal Report, EU COST-11 Ter Security Project, April 1990
`
`S. Muftic
`“Extended OSI Security Architecture”
`COMPUTER NETWORKS & ISDN SYSTEMS Journal,
`Vol. 17, No. 3, September 1989
`
`
`
`76
`
`
`
`77
`
`
`
`78
`
`
`
`79
`
`
`
`
`S. Muftic
`80
`“Integration of Network Security Mechanisms”
`
` Proceedings, EUTECO'88, CEO European Conference, Vienna, April 1988
`
`- 11 -
`
`
`
` S. Muftic
`“Security Mechanisms for Computer Networks”
`(Current Results of the CEC COST-11 Ten Project)
`COMPUTER NETWORKS & ISDN SYSTEMS Journal, Vol. 15, No. 1, January 1988
`
`S. Muftic, G. Babic
`“Security Features of the ENERGONET Network”
`Proceedings, CCDC'8T, International Conference, New Delhi, October 1987
`
`S. Muftic
`“Architectural Issues related to Security and Management”
`Proceedings, EU COST-11 Conference, Bonn, March 1987
`
`
`81
`
`
`
`
`82
`
`
`
`83
`
`
`
`S. Muftic
`84
`“Security Mechanisms for Computer Networks”
`
`(A Program of the CEC COST-11 Ter Project)
`
` COMPUTER NETWORKS & ISDN SYSTEMS Journal, Vol. 12, No. 5, Oct.ober1986
`
`85
`
`
`
`86
`
`
`
`
`19762112
`011615
`
`S. Muftic
`“Secure Exchange of Sensitive Data in A Computer Network”
`Proceedings, International Conference IEIP/SEC'86, Monte Carlo, May 1986
`
`S. Muftic, P.11. Underhill
`“Security in Computer Networks”
`Proceedings, EUTECO-83, EU European Conference, Varese, Oct. 1983
`
`- 12 -
`
`