All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Security architecture for law enforcement agencies

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F16%3A86100030" target="_blank" >RIV/61989100:27240/16:86100030 - isvavai.cz</a>

  • Result on the web

    <a href="http://link.springer.com/article/10.1007/s11042-014-2386-3" target="_blank" >http://link.springer.com/article/10.1007/s11042-014-2386-3</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/s11042-014-2386-3" target="_blank" >10.1007/s11042-014-2386-3</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Security architecture for law enforcement agencies

  • Original language description

    In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies. However, police information and communication technology (ICT) systems have stringent security requirements that may delay the deployment of these new applications, since necessary security measures must be implemented first. This paper presents an integrated security architecture for LEAs that is able to provide common security services to novel and legacy ICT applications, while fulfilling the high security requirements of police forces. By reusing the security services provided by this architecture, new systems do not have to implement custom security mechanisms themselves, and can be easily integrated into existing police ICT infrastructures. The proposed LEA security architecture features state-of-the-art technologies, such as encrypted communications at network and application levels, or multi-factor authentication based on certificates stored in smart cards.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/EE2.3.20.0217" target="_blank" >EE2.3.20.0217: The Development of Excellence of the Telecommunication Research Team in Relation to International Cooperation</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2016

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Multimedia Tools and Applications

  • ISSN

    1380-7501

  • e-ISSN

  • Volume of the periodical

    75

  • Issue of the periodical within the volume

    17

  • Country of publishing house

    NL - THE KINGDOM OF THE NETHERLANDS

  • Number of pages

    24

  • Pages from-to

    10709-10732

  • UT code for WoS article

    000382678800030

  • EID of the result in the Scopus database

    2-s2.0-84912569644