2013
DOI: 10.1007/s11042-013-1532-7
|View full text |Cite
|
Sign up to set email alerts
|

Integrated security infrastructures for law enforcement agencies

Abstract: This paper provides an overview of the security architecture for Law Enforcement Agencies (LEAs) designed by the INDECT project, and in particular the security infrastructures that have been deployed so far. These security infrastructures can be organized in the following main areas: Public Key Infrastructure (PKI) and user management, communications security, and new cryptographic algorithms.This paper presents the new ideas, architectures and deployed testbeds for these areas. In particular, it explains the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…The INDECT research project has its own topic. This EU-funded project was about providing intelligent security systems for law enforcement agencies (Stoianov et al, 2015). Analogously to many related large-scale EU-funded security research programs, it was subjected to concerns about privacy, surveillance, and ethics.…”
Section: Optimization Valuementioning
confidence: 99%
“…The INDECT research project has its own topic. This EU-funded project was about providing intelligent security systems for law enforcement agencies (Stoianov et al, 2015). Analogously to many related large-scale EU-funded security research programs, it was subjected to concerns about privacy, surveillance, and ethics.…”
Section: Optimization Valuementioning
confidence: 99%
“…Therefore it is necessary to fulfill all requirements for information security: access control, authentication, non-reputation, data confidentiality, communication security, data integrity, availability and privacy [4]. One of the main elements of the security infrastructures being deployed to provide these security properties is the INDECT Public Key Infrastructure (PKI).…”
Section: Indect Public Key Infrastructurementioning
confidence: 99%
“…This PKI is the base for creating a heterogeneous and secure environment, based on X.509 certificates, public keys and asymmetric cryptographic algorithms. The INDECT PKI architecture has a hierarchical, two-level structure [4].…”
Section: Indect Public Key Infrastructurementioning
confidence: 99%
“…Federated Identity can be defined as a union of a user's identities scattered across many environments. Federation was proposed as a component of security architecture for Law Enforcement Agencies [3].…”
Section: Federated Identity and Federated Identity Management Systemmentioning
confidence: 99%