Kraus et al., 2010 - Google Patents
High performance security management processing in advanced intelligent video surveillanceKraus et al., 2010
- Document ID
- 8319860958813180742
- Author
- Kraus K
- Martikainen O
- Reda R
- Publication year
- Publication venue
- 2010 The 7th International Conference on Informatics and Systems (INFOS)
External Links
Snippet
For large scale, high performance Video Surveillance Systems, performance and the Security Management Process are intertwined. Confidentiality and Privacy are increasingly crucial factors determining the acceptance of the system. The current solution is based on a …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108702360B (en) | Digital asset protection policy using dynamic network attributes | |
US7331059B2 (en) | Access restriction control device and method | |
US10313355B2 (en) | Client side security management for an operations, administration and maintenance system for wireless clients | |
KR101762876B1 (en) | Security System for Cloud Computing Service | |
US8732856B2 (en) | Cross-domain security for data vault | |
Xiaojian et al. | Power IoT security protection architecture based on zero trust framework | |
US7814075B2 (en) | Dynamic auditing | |
US10348733B2 (en) | Managing security restrictions on a resource in a defined environment | |
CN112818335A (en) | Method for managing and controlling safe operation and maintenance of privileged account | |
Raufa et al. | Secure data access control with perception reasoning | |
CN105704093B (en) | A kind of firewall access control policy error-checking method, apparatus and system | |
Iordache et al. | Public institutions updated enhanced biometric security, zero trust architecture and multi-factor authentification | |
Kraus et al. | High performance security management processing in advanced intelligent video surveillance | |
Kim et al. | A security-enabled grid system for MINDS distributed data mining | |
Mutabazi et al. | Investigating the challenges companies in Rwanda face when implementing zero-trust network | |
Qusa et al. | Secure smart home using open security intelligence systems | |
Matusek et al. | Nivss: a nearly indestructible video surveillance system | |
Park et al. | Active access control (AAC) with fine‐granularity and scalability | |
Marshal et al. | Proactive Mechanisms for Turning Smart Buildings to Cyber Smart Buildings in Artificial Intelligence Era | |
Alquhayz et al. | Security management system for 4G heterogeneous networks | |
Salas | IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings | |
Eric et al. | Malicious Activity Detection using Smart Contracts in IoT. | |
Hluchý et al. | Distributed agent-based architecture for management of crisis situations using trusted code execution | |
Hluchý et al. | Architecture for distributed data collection for management of crisis situations using trusted agent execution | |
Chaudhary et al. | SECURING NETWORK DEVICES FROM UNAUTHORIZED ACCESS USING BLOCKCHAIN TECHNOLOGY |