Security infrastructures: Towards the INDECT system security

6Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) - a new cryptography algorithm that is being integrated in OpenSSL/OpenVPN libraries, and how TLS/SSL and X.509 certificates stored in smart-cards are employed to protect INDECT applications and to implement the access control of the INDECT Portal. All the proposed mechanisms have been designed to work together as the security foundation of all systems being developed by the INDECT project. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Stoianov, N., Urueña, M., Niemiec, M., Machník, P., & Maestro, G. (2012). Security infrastructures: Towards the INDECT system security. In Communications in Computer and Information Science (Vol. 287 CCIS, pp. 304–315). https://doi.org/10.1007/978-3-642-30721-8_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free