Abstract
“Advanced architecture of the Integrated IT Platform with high security level” is a development project within the area of the homeland security. The results of the project are intended to be used by a Polish Law Enforcement Authority. The goal of the project is to develop the architecture of a network and application IT environment for secure, reliable, efficient and scalable processing and storing data by current and future applications and services. Additionally, a clear migration path from the current infrastructure must be provided. Together with the increasing demand on the network bandwidth, expected growth of the multimedia mobile applications and with particular respect to strict security requirements it raises numerous IT security challenges. In this paper we would like to describe how security was addressed within the project and how external research, our own experience, and results of ther similar research projects (including those from the homeland security area) have been combined to provide the maximum possible protection level. We hope that the described approach may be used at least as an initial pattern in other similar initiatives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Motorola Solutions Media Center. Public safety organisations plan next generation services, http://mediacenter.motorolasolutions.com/content/detail.aspx?ReleaseID=14136
Yapp, R.: Brazilian police to use ’robocop-style’ glasses at world cup, http://www.telegraph.co.uk/news/worldnews/southamerica/brazil/8446088/Brazilian-police-to-use-Robocop-style-glasses-at-World-Cup.html
Proteus. integrated mobile system for counterterrosrism and rescue operations, http://www.projektproteus.pl/?lg=_en
Indect: intelligent information system supporting observation, searching and detection for security of citizens in urban environment, http://www.indect-project.eu
Odlyzko, A.: Economics, Psychology, and Sociology of Security. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 182–189. Springer, Heidelberg (2003)
Morana, M.M.: Building security into the software life cycle, http://www.blackhat.com/presentations/bh-usa-06/bh-us-06-Morana-R3.0.pdf
Microsoft security development lifecycle, http://www.microsoft.com/security/sdl
Geant project, http://www.geant.net
Pl-grid project, http://www.plgrid.pl/en
Balcerek, B., Frankowski, G., Kwiecień, A., Smutnicki, A., Teodorczyk, M.: Security Best Practices: Applying Defense-in-Depth Strategy to Protect the NGI_PL. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol. 7136, pp. 128–141. Springer, Heidelberg (2012)
Jerzak, M., Czarniecki, L., Frankowski, G.: Ddos attacks in the future internet. In: Towards and Beyond Europe 2020: The Significance of Future Internet for Regional Development. Future Internet Event Report (in preparation)
ENISA. Cloud computing: Benefits, risks and recommendations for information security, http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessment/at_download/fullReport
Winkler, V.(J.R.): Securing the cloud - cloud computer security, techniques and tactics, pp. 195–209. Elsevier Inc. (2011)
Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
Spada, F.E., Swanson, S., Wei, M., Grupp, L.M.: Reliably erasing data from flash-based solid state drives, http://static.usenix.org/events/fast11/tech/full_papers/Wei.pdf
Knowledge and security management in high security level services, http://ppbw.pcss.pl/en
Wojtysiak, M., Jerzak, M.: Distributed intrusion detection systems: Metalds case study. Computational Methods in Science in Technology, Special Issue 2010, 135–145 (2010)
Frankowski, G., Rzepka, M.: SARA – System for Inventory and Static Security Control in a Grid Infrastructure. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol. 7136, pp. 102–113. Springer, Heidelberg (2012)
ETSI Lawful Interception Technical Committee. Etsi ts 102 657 v1.9.1 - retained data handling: handover interface for the request and delivery of retained data
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Frankowski, G., Jerzak, M. (2012). Advanced Architecture of the Integrated IT Platform with High Security Level. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2012. Communications in Computer and Information Science, vol 287. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30721-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-30721-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30720-1
Online ISBN: 978-3-642-30721-8
eBook Packages: Computer ScienceComputer Science (R0)