Integrated security infrastructures for law enforcement agencies
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F15%3A86096786" target="_blank" >RIV/61989100:27240/15:86096786 - isvavai.cz</a>
Výsledek na webu
<a href="http://dx.doi.org/10.1007/s11042-013-1532-7" target="_blank" >http://dx.doi.org/10.1007/s11042-013-1532-7</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/s11042-013-1532-7" target="_blank" >10.1007/s11042-013-1532-7</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Integrated security infrastructures for law enforcement agencies
Popis výsledku v původním jazyce
This paper provides an overview of the security architecture for Law Enforcement Agencies (LEAs) designed by the INDECT project, and in particular the security infrastructures that have been deployed so far. These security infrastructures can be organized in the following main areas: Public Key Infrastructure (PKI) and user management, communications security, and new cryptographic algorithms. This paper presents the new ideas, architectures and deployed testbeds for these areas. In particular, it explains the inner structure of the INDECT PKI employed for federated identity management, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) - a novel cryptographic algorithm that has being integrated into OpenSSL library,and how IBC-enabled TLS/SSL sessions and X.509 certificates are employed to protect INDECT applications. All proposed mechanisms have been designed to work in an integrated fashion as the security foundation of all systems being developed
Název v anglickém jazyce
Integrated security infrastructures for law enforcement agencies
Popis výsledku anglicky
This paper provides an overview of the security architecture for Law Enforcement Agencies (LEAs) designed by the INDECT project, and in particular the security infrastructures that have been deployed so far. These security infrastructures can be organized in the following main areas: Public Key Infrastructure (PKI) and user management, communications security, and new cryptographic algorithms. This paper presents the new ideas, architectures and deployed testbeds for these areas. In particular, it explains the inner structure of the INDECT PKI employed for federated identity management, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) - a novel cryptographic algorithm that has being integrated into OpenSSL library,and how IBC-enabled TLS/SSL sessions and X.509 certificates are employed to protect INDECT applications. All proposed mechanisms have been designed to work in an integrated fashion as the security foundation of all systems being developed
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
V - Vyzkumna aktivita podporovana z jinych verejnych zdroju
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
Multimedia Tools and Applications
ISSN
1380-7501
e-ISSN
—
Svazek periodika
74
Číslo periodika v rámci svazku
12
Stát vydavatele periodika
NL - Nizozemsko
Počet stran výsledku
16
Strana od-do
4453-4468
Kód UT WoS článku
000356168600016
EID výsledku v databázi Scopus
2-s2.0-84930871535