Skip to main content

Advanced Architecture of the Integrated IT Platform with High Security Level

  • Conference paper
Multimedia Communications, Services and Security (MCSS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 287))

  • 1257 Accesses

Abstract

“Advanced architecture of the Integrated IT Platform with high security level” is a development project within the area of the homeland security. The results of the project are intended to be used by a Polish Law Enforcement Authority. The goal of the project is to develop the architecture of a network and application IT environment for secure, reliable, efficient and scalable processing and storing data by current and future applications and services. Additionally, a clear migration path from the current infrastructure must be provided. Together with the increasing demand on the network bandwidth, expected growth of the multimedia mobile applications and with particular respect to strict security requirements it raises numerous IT security challenges. In this paper we would like to describe how security was addressed within the project and how external research, our own experience, and results of ther similar research projects (including those from the homeland security area) have been combined to provide the maximum possible protection level. We hope that the described approach may be used at least as an initial pattern in other similar initiatives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Motorola Solutions Media Center. Public safety organisations plan next generation services, http://mediacenter.motorolasolutions.com/content/detail.aspx?ReleaseID=14136

  2. Yapp, R.: Brazilian police to use ’robocop-style’ glasses at world cup, http://www.telegraph.co.uk/news/worldnews/southamerica/brazil/8446088/Brazilian-police-to-use-Robocop-style-glasses-at-World-Cup.html

  3. Proteus. integrated mobile system for counterterrosrism and rescue operations, http://www.projektproteus.pl/?lg=_en

  4. Indect: intelligent information system supporting observation, searching and detection for security of citizens in urban environment, http://www.indect-project.eu

  5. Odlyzko, A.: Economics, Psychology, and Sociology of Security. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 182–189. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Morana, M.M.: Building security into the software life cycle, http://www.blackhat.com/presentations/bh-usa-06/bh-us-06-Morana-R3.0.pdf

  7. Microsoft security development lifecycle, http://www.microsoft.com/security/sdl

  8. Geant project, http://www.geant.net

  9. Pl-grid project, http://www.plgrid.pl/en

  10. Balcerek, B., Frankowski, G., Kwiecień, A., Smutnicki, A., Teodorczyk, M.: Security Best Practices: Applying Defense-in-Depth Strategy to Protect the NGI_PL. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol. 7136, pp. 128–141. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Jerzak, M., Czarniecki, L., Frankowski, G.: Ddos attacks in the future internet. In: Towards and Beyond Europe 2020: The Significance of Future Internet for Regional Development. Future Internet Event Report (in preparation)

    Google Scholar 

  12. ENISA. Cloud computing: Benefits, risks and recommendations for information security, http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessment/at_download/fullReport

  13. Winkler, V.(J.R.): Securing the cloud - cloud computer security, techniques and tactics, pp. 195–209. Elsevier Inc. (2011)

    Google Scholar 

  14. Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  15. Spada, F.E., Swanson, S., Wei, M., Grupp, L.M.: Reliably erasing data from flash-based solid state drives, http://static.usenix.org/events/fast11/tech/full_papers/Wei.pdf

  16. Knowledge and security management in high security level services, http://ppbw.pcss.pl/en

  17. Wojtysiak, M., Jerzak, M.: Distributed intrusion detection systems: Metalds case study. Computational Methods in Science in Technology, Special Issue 2010, 135–145 (2010)

    Google Scholar 

  18. Frankowski, G., Rzepka, M.: SARA – System for Inventory and Static Security Control in a Grid Infrastructure. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol. 7136, pp. 102–113. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. ETSI Lawful Interception Technical Committee. Etsi ts 102 657 v1.9.1 - retained data handling: handover interface for the request and delivery of retained data

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Frankowski, G., Jerzak, M. (2012). Advanced Architecture of the Integrated IT Platform with High Security Level. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2012. Communications in Computer and Information Science, vol 287. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30721-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30721-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30720-1

  • Online ISBN: 978-3-642-30721-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics