. . "RIV/61989100:27240/12:86084948!RIV13-MSM-27240___" . "1"^^ . . "Security Infrastructures: Towards the INDECT System Security"@en . . "27240" . . "978-3-642-30720-1" . "000306990300030" . "RIV/61989100:27240/12:86084948" . . "Niemiec, Marcin" . . . . "Security Infrastructures: Towards the INDECT System Security" . . . "P(7E09021)" . . . "Machn\u00EDk, Petr" . "12"^^ . "Communications in Computer and Information Science. Volume 287" . . . "Krakov" . "2012-05-31+02:00"^^ . . "Uruena, Manuel" . "[60F8A7B3589D]" . "Springer-Verlag" . "Virtual Private Network (VPN); Transport Layer Security (TLS); symmetric block ciphers; smartcard; Public Key Infrastructure (PKI); certificates; application security; access control"@en . . "167179" . . . . "5"^^ . "10.1007/978-3-642-30721-8_30" . "Security Infrastructures: Towards the INDECT System Security"@en . "This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) \u2013 a new cryptography algorithm that is being integrated in OpenSSL/OpenVPN libraries, and how TLS/SSL and X.509 certificates stored in smart-cards are employed to protect INDECT applications and to implement the access control of the INDECT Portal. All the proposed mechanisms have been designed to work together as the security foundation of all systems being developed by the INDECT project."@en . . . "Maestro, Gema" . "1865-0929" . "Security Infrastructures: Towards the INDECT System Security" . "Stoianov, Nikolai" . "This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) \u2013 a new cryptography algorithm that is being integrated in OpenSSL/OpenVPN libraries, and how TLS/SSL and X.509 certificates stored in smart-cards are employed to protect INDECT applications and to implement the access control of the INDECT Portal. All the proposed mechanisms have been designed to work together as the security foundation of all systems being developed by the INDECT project." . "Heidelberg" .