Attributes | Values |
---|
rdf:type
| |
Description
| - In order to carry its duties to serve and protect, the Police must deploy new tools and applications to maintain the pace of technology evolution. The INDECT project is developing such novel investigation tools for European Police forces. However Police ICT systems have stringent security requirements that may delay the deployment of these new applications to first implement the required security measures. This paper presents an integrated security architecture that is able to provide common security services to both, novel and legacy ICT applications, while fulfilling the high security requirements of Police forces. By reusing the security services provided by this architecture, new systems do not have to implement custom security mechanisms themselves, and may be easily integrated into the existing Police ICT infrastructure. The proposed INDECT security architecture features state-of-the-art technologies, like encrypted communications at network and application levels, or multi-factor authentication based on certificates stored in Smart Cards.
- In order to carry its duties to serve and protect, the Police must deploy new tools and applications to maintain the pace of technology evolution. The INDECT project is developing such novel investigation tools for European Police forces. However Police ICT systems have stringent security requirements that may delay the deployment of these new applications to first implement the required security measures. This paper presents an integrated security architecture that is able to provide common security services to both, novel and legacy ICT applications, while fulfilling the high security requirements of Police forces. By reusing the security services provided by this architecture, new systems do not have to implement custom security mechanisms themselves, and may be easily integrated into the existing Police ICT infrastructure. The proposed INDECT security architecture features state-of-the-art technologies, like encrypted communications at network and application levels, or multi-factor authentication based on certificates stored in Smart Cards. (en)
|
Title
| - INDECT Security Architecture
- INDECT Security Architecture (en)
|
skos:prefLabel
| - INDECT Security Architecture
- INDECT Security Architecture (en)
|
skos:notation
| - RIV/61989100:27240/13:86092674!RIV15-MSM-27240___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/61989100:27240/13:86092674
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Security; Police ICT systems; INDECT Project (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Communications in Computer and Information Science. Volume 368
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Machník, Petr
- Niemiec, Marcin
- Stoianov, Nikolai
- Uruena, Manuel
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open...ain/vavai/riv/wos
| |
http://linked.open.../riv/zahajeniAkce
| |
issn
| |
number of pages
| |
http://bibframe.org/vocab/doi
| - 10.1007/978-3-642-38559-9_24
|
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |