Secure architecture

0Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Defining robust security architectures is vital for protecting IT infrastructures from cyber-attacks. This is especially true when the IT infrastructure is going to be used by investigators and law enforcement agencies to combat crime across EU. A compromise between the level of security and the level of acceptable risk must be found. As a first step it is mandatory to perfectly understand the security requirements applicable to our infrastructure, the security services needed and how these security services should be distributed over the logical layers of the system. This chapter describes the analysis and the methodology followed in the Odyssey project (see chapter 2) to define a security-layered architecture able to support a secure Pan-European ballistics and crime information intelligence network designed to help tackle organized crime and terrorism.

Cite

CITATION STYLE

APA

Rodriguez, R. D. (2011). Secure architecture. In Advanced Information and Knowledge Processing (pp. 35–48). Springer London. https://doi.org/10.1007/978-1-4471-2140-4_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free