[go: up one dir, main page]

Kraus et al., 2010 - Google Patents

High performance security management processing in advanced intelligent video surveillance

Kraus et al., 2010

Document ID
8319860958813180742
Author
Kraus K
Martikainen O
Reda R
Publication year
Publication venue
2010 The 7th International Conference on Informatics and Systems (INFOS)

External Links

Snippet

For large scale, high performance Video Surveillance Systems, performance and the Security Management Process are intertwined. Confidentiality and Privacy are increasingly crucial factors determining the acceptance of the system. The current solution is based on a …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
CN108702360B (en) Digital asset protection policy using dynamic network attributes
US7331059B2 (en) Access restriction control device and method
US10313355B2 (en) Client side security management for an operations, administration and maintenance system for wireless clients
KR101762876B1 (en) Security System for Cloud Computing Service
US8732856B2 (en) Cross-domain security for data vault
Xiaojian et al. Power IoT security protection architecture based on zero trust framework
US7814075B2 (en) Dynamic auditing
US10348733B2 (en) Managing security restrictions on a resource in a defined environment
CN112818335A (en) Method for managing and controlling safe operation and maintenance of privileged account
Raufa et al. Secure data access control with perception reasoning
CN105704093B (en) A kind of firewall access control policy error-checking method, apparatus and system
Iordache et al. Public institutions updated enhanced biometric security, zero trust architecture and multi-factor authentification
Kraus et al. High performance security management processing in advanced intelligent video surveillance
Kim et al. A security-enabled grid system for MINDS distributed data mining
Mutabazi et al. Investigating the challenges companies in Rwanda face when implementing zero-trust network
Qusa et al. Secure smart home using open security intelligence systems
Matusek et al. Nivss: a nearly indestructible video surveillance system
Park et al. Active access control (AAC) with fine‐granularity and scalability
Marshal et al. Proactive Mechanisms for Turning Smart Buildings to Cyber Smart Buildings in Artificial Intelligence Era
Alquhayz et al. Security management system for 4G heterogeneous networks
Salas IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings
Eric et al. Malicious Activity Detection using Smart Contracts in IoT.
Hluchý et al. Distributed agent-based architecture for management of crisis situations using trusted code execution
Hluchý et al. Architecture for distributed data collection for management of crisis situations using trusted agent execution
Chaudhary et al. SECURING NETWORK DEVICES FROM UNAUTHORIZED ACCESS USING BLOCKCHAIN TECHNOLOGY