AMSEP: Automated Multi-level Security Management for Multimedia Event Processing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Watermarking for Multimedia Security Management

This chapter is intended to disseminate the concept of digital watermarking for multimedia security management in general, and multimedia copyright protection and content integrity verification in particular. We will be addressing the challenges posed to multimedia security management and how digital watermarking can be deployed in different applications in order to meet those challenges. Categ...

متن کامل

Multi-Level Security Applications

BlueSpace is an enterprise software company, based in Austin, Texas, which creates multi-level secure (MLS) end user applications that can span multiple networks at different classification levels. BlueSpace's middleware strategy facilitates rapid application development, infrastructure consolidation and infrastructure neutrality. The continuing growth in the number of networks in the defense a...

متن کامل

Security for Automated, Distributed Configuration Management

Installation, configuration, and administration of desktop software is a non-trivial process. Even a simple application can have numerous dependencies on hardware, device drivers, operating system versions, dynamically linked libraries, and even on other applications. These dependencies can cause surprising failures during the normal process of installations, updates and re-configurations. Diag...

متن کامل

Security and Reliability Requirements for Advanced Security Event Management

This paper addresses security information management in complex application scenarios. Security Information and Event Management (SIEM) systems collect and examine security related events, with the goal of providing a unified view of the monitored systems’ security status. While various SIEMs are in production, there is scope to extend the capability and resilience of these systems. The use of ...

متن کامل

Model-Based Security Event Management

With the growing size and complexity of current ICT infrastructures, it becomes increasingly challenging to gain an overview of potential security breaches. Security Information and Event Management systems which aim at collecting, aggregating and processing securityrelevant information are therefore on the rise. However, the event model of current systems mostly describes network events and th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2018

ISSN: 1877-0509

DOI: 10.1016/j.procs.2018.07.184