This HTML5 document contains 52 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n17http://purl.org/net/nknouf/ns/bibtex#
n8http://localhost/temp/predkladatel/
n23http://linked.opendata.cz/resource/domain/vavai/projekt/
n14http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n18http://linked.opendata.cz/resource/domain/vavai/subjekt/
n7http://linked.opendata.cz/ontology/domain/vavai/
n10https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n21http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n13http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F61989100%3A27240%2F12%3A86084948%21RIV13-MSM-27240___/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n22http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n9http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F61989100%3A27240%2F12%3A86084948%21RIV13-MSM-27240___
rdf:type
n7:Vysledek skos:Concept
dcterms:description
This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) – a new cryptography algorithm that is being integrated in OpenSSL/OpenVPN libraries, and how TLS/SSL and X.509 certificates stored in smart-cards are employed to protect INDECT applications and to implement the access control of the INDECT Portal. All the proposed mechanisms have been designed to work together as the security foundation of all systems being developed by the INDECT project. This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) – a new cryptography algorithm that is being integrated in OpenSSL/OpenVPN libraries, and how TLS/SSL and X.509 certificates stored in smart-cards are employed to protect INDECT applications and to implement the access control of the INDECT Portal. All the proposed mechanisms have been designed to work together as the security foundation of all systems being developed by the INDECT project.
dcterms:title
Security Infrastructures: Towards the INDECT System Security Security Infrastructures: Towards the INDECT System Security
skos:prefLabel
Security Infrastructures: Towards the INDECT System Security Security Infrastructures: Towards the INDECT System Security
skos:notation
RIV/61989100:27240/12:86084948!RIV13-MSM-27240___
n7:predkladatel
n18:orjk%3A27240
n3:aktivita
n22:P
n3:aktivity
P(7E09021)
n3:dodaniDat
n9:2013
n3:domaciTvurceVysledku
n14:7582005
n3:druhVysledku
n19:D
n3:duvernostUdaju
n11:S
n3:entitaPredkladatele
n13:predkladatel
n3:idSjednocenehoVysledku
167179
n3:idVysledku
RIV/61989100:27240/12:86084948
n3:jazykVysledku
n16:eng
n3:klicovaSlova
Virtual Private Network (VPN); Transport Layer Security (TLS); symmetric block ciphers; smartcard; Public Key Infrastructure (PKI); certificates; application security; access control
n3:klicoveSlovo
n4:application%20security n4:symmetric%20block%20ciphers n4:Virtual%20Private%20Network%20%28VPN%29 n4:access%20control n4:Public%20Key%20Infrastructure%20%28PKI%29 n4:Transport%20Layer%20Security%20%28TLS%29 n4:smartcard n4:certificates
n3:kontrolniKodProRIV
[60F8A7B3589D]
n3:mistoKonaniAkce
Krakov
n3:mistoVydani
Heidelberg
n3:nazevZdroje
Communications in Computer and Information Science. Volume 287
n3:obor
n12:JC
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
5
n3:projekt
n23:7E09021
n3:rokUplatneniVysledku
n9:2012
n3:tvurceVysledku
Niemiec, Marcin Machník, Petr Uruena, Manuel Maestro, Gema Stoianov, Nikolai
n3:typAkce
n20:WRD
n3:wos
000306990300030
n3:zahajeniAkce
2012-05-31+02:00
s:issn
1865-0929
s:numberOfPages
12
n21:doi
10.1007/978-3-642-30721-8_30
n17:hasPublisher
Springer-Verlag
n10:isbn
978-3-642-30720-1
n8:organizacniJednotka
27240