Abstract
A CCTV to ensure the safety of the routine has been used as a tool. Especially in recent years, CCTV has improved the performance of the hardware. As an example, CCTV were realized connection to a smart phone and supporting high-definition CCTV with the advent of CCTV images. This paper is part of the study for an effective monitoring of the object to define the role of private CCTV Multiple CCTV at the same time. Multiple CCTV and dynamic roles are needed to define to separate between the algorithms and policies. To this end, this article was fused of CS-RBAC concept with 3D CCTV. In this article, the proposed scheme for effective use of CCTV is expected to be available in various environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Webb, B.: CCTV in Town Centres: Three Case Studies, p. 6. Police Research Group (1995)
Short, E., Ditton, J.: Seen and Now Heard: Talking to the Targets of Open Street CCTV. British Journal of Criminology 38(3), 404 (1998)
Surette, R.: os and cons of second generation CCTV surveillance systems. Policing: An International Journal of Police Strategies & Management 28(1), 152
Shaha, S.A.A., Kim, H.J., Baek, S.K., Chang, H.H., Ahn, B.H.: System architecture of a decision support system for freeway incident management in Republic. Transportation Research Part A: Policy and Practice 42(5), 799 (2008)
BroadcastEngeering, http://broadcastengineering.com/production/looking-past-side-by-side-3-d-broadcasting-20100622/
Zhang, L., Ahn, G., Chu, B.: Rule-Based Framework for Role-Based Delegation. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Chantilly, VA (2001)
Barkley, J.F., Cincotta, A.V., Ferraiolo, D.F., Gavrilla, S., Kuhn, D.R.: Role Based Access Control for the World Wide Web. In: 20th NISSC National Information Systems Security Conference, pp. 331–340 (1997)
Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transaction on Information System Security, 34–64 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, JM. et al. (2011). A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)