Affiliation:
1. Università degli Studi di Salerno, Italy
2. Seconda Università degli Studi di Napoli, Italy
Abstract
Starting from these ideas and concepts, this chapter aims at presenting an innovative network-based digital video surveillance solution that meets all the aforementioned security and privacy requirements ensuring that the recorded data will be only accessible to a subset of authorities, trusting each other under precisely defined policies, agreements, and circumstances. This would aid the surveillance activities, when needed, without disrupting the privacy of individuals.
Reference30 articles.
1. Al Hasib, A., & Haque, A. A. (2008). A comparative study of the performance and security issues of AES and RSA cryptography. ICCIT '08: Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology, (pp. 505-510).
2. A modular approach to key safeguarding.;C.Asmuth;IEEE Transactions on Information Theory,1983
3. Becker, A., Arnab, A., & Serra, M. (2008). Assessing privacy criteria for DRM using EU privacy legislation. In Proceedings of the 8th ACM workshop on Digital Rights Management, (pp. 77–86). Alexandria, Virginia, USA.
4. Bernstein, D. J. (2005). Cache-timing attacks on AES. Retrieved March 15, 2011, from http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
5. Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference 1979, vol. 48. American Federation of Information Processing Societies.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献