Security architecture for law enforcement agencies
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F16%3A86100030" target="_blank" >RIV/61989100:27240/16:86100030 - isvavai.cz</a>
Výsledek na webu
<a href="http://link.springer.com/article/10.1007/s11042-014-2386-3" target="_blank" >http://link.springer.com/article/10.1007/s11042-014-2386-3</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/s11042-014-2386-3" target="_blank" >10.1007/s11042-014-2386-3</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Security architecture for law enforcement agencies
Popis výsledku v původním jazyce
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies. However, police information and communication technology (ICT) systems have stringent security requirements that may delay the deployment of these new applications, since necessary security measures must be implemented first. This paper presents an integrated security architecture for LEAs that is able to provide common security services to novel and legacy ICT applications, while fulfilling the high security requirements of police forces. By reusing the security services provided by this architecture, new systems do not have to implement custom security mechanisms themselves, and can be easily integrated into existing police ICT infrastructures. The proposed LEA security architecture features state-of-the-art technologies, such as encrypted communications at network and application levels, or multi-factor authentication based on certificates stored in smart cards.
Název v anglickém jazyce
Security architecture for law enforcement agencies
Popis výsledku anglicky
In order to carry out their duty to serve and protect, law enforcement agencies (LEAs) must deploy new tools and applications to keep up with the pace of evolving technologies. However, police information and communication technology (ICT) systems have stringent security requirements that may delay the deployment of these new applications, since necessary security measures must be implemented first. This paper presents an integrated security architecture for LEAs that is able to provide common security services to novel and legacy ICT applications, while fulfilling the high security requirements of police forces. By reusing the security services provided by this architecture, new systems do not have to implement custom security mechanisms themselves, and can be easily integrated into existing police ICT infrastructures. The proposed LEA security architecture features state-of-the-art technologies, such as encrypted communications at network and application levels, or multi-factor authentication based on certificates stored in smart cards.
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
<a href="/cs/project/EE2.3.20.0217" target="_blank" >EE2.3.20.0217: Rozvoj excelence vědeckovýzkumného týmu Telekomunikační techniky ve vazbě na zahraniční spolupráci</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2016
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
Multimedia Tools and Applications
ISSN
1380-7501
e-ISSN
—
Svazek periodika
75
Číslo periodika v rámci svazku
17
Stát vydavatele periodika
NL - Nizozemsko
Počet stran výsledku
24
Strana od-do
10709-10732
Kód UT WoS článku
000382678800030
EID výsledku v databázi Scopus
2-s2.0-84912569644