Skip to main content

Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication

  • Conference paper
  • 786 Accesses

Part of the book series: Advances in Soft Computing ((AINSC,volume 53))

Abstract

This paper describes how “Computer supported cooperative work”, coped with security technologies and advanced knowledge management techniques, can support the penal judicial activities, in particular national and trans-national investigations phases when different judicial system have to cooperate together. Increase of illegal immigration, trafficking of drugs, weapons and human beings, and the advent of terrorism, made necessary a stronger judicial collaboration between States. J-WeB project (http://www.jweb-net.com/), financially supported by the European Union under the FP6 – Information Society Technologies Programme, is designing and developing an innovative judicial cooperation environment capable to enable an effective judicial cooperation during cross-border criminal investigations carried out between EU and Countries of enlarging Europe, having the Italian and Montenegrin Ministries of Justice as partners. In order to reach a higher security level, an additional biometric identification system is integrated in the security environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CARDS project: Support to the Prosecutors Network, EuropeAid/125802/C/ACT/Multi (2007), http://ec.europa.eu/europeaid/cgi/frame12.pl

  2. Armone, G., et al.: Diritto penale europeo e ordinamento italiano: le decisioni quadro dell’Unione europea: dal mandato d’arresto alla lotta al terrorismo. Giuffrè edns. (2006) ISBN 88-14-12428-0

    Google Scholar 

  3. JWeB consortium (2007), http://www.jweb-net.com

  4. European Commission, ICT in the courtroom, the evidence (2005), http://ec.europa.eu/information_society/activities/policy_link/documents/factsheets/jus_ecourt.pdf

  5. European Commission. Security for judicial cooperation (2006), http://ec.europa.eu/information_society/activities/policy_link/documents/factsheets/just_secure_justice.pdf

  6. Cislaghi, M., Cunsolo, F., Mazzilli, R., Muscillo, R., Pellegrini, D., Vuksanovic, V.: Communication environment for judicial cooperation between Europe and Western Balkans. In: Expanding the knowledge economy, eChallenges 2007 conference proceedings, The Hague, The Netherlands (October 2007); ISBN 978-1-58603-801-4, 757-764.

    Google Scholar 

  7. Italian Committee for IT in Public Administrations (CNIPA), Linee guida per la sicurezza ICT delle pubbliche amministrazioni. In: Quaderni CNIPA 2006 (2006), http://www.cnipa.gov.it/site/_files/Quaderno20.pdf

  8. Italian Committee for IT in Public Administrations (CNIPA), CNIPA Linee guida per l’utilizzo della Firma Digitale, in CNIPA (May 2004), http://www.cnipa.gov.it/site/_files/LineeGuidaFD_200405181.pdf

  9. JWeB project consortium (2007-2008), http://www.jweb-net.com/index.php?option=com_content&task=category&sectionid=4&id=33&Itemid=63

  10. SIDIP project (ICT system supporting trial and hearings in Italy) (2007), www.giustiziacampania.it/file/1012/File/progettosidip.pdf , https://www.giustiziacampania.it/file/1053/File/mozzillopresentazionesistemasidip.doc

  11. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli: A proposed standard for rolebased access control. Technical report, National Institute of Standards & Technology (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cislaghi, M. et al. (2009). Secure Judicial Communication Exchange Using Soft-computing Methods and Biometric Authentication. In: Corchado, E., Zunino, R., Gastaldo, P., Herrero, Á. (eds) Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08. Advances in Soft Computing, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88181-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88181-0_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88180-3

  • Online ISBN: 978-3-540-88181-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics