AMSEP: Automated Multi-level Security Management for Multimedia Event Processing
نویسندگان
چکیده
منابع مشابه
Digital Watermarking for Multimedia Security Management
This chapter is intended to disseminate the concept of digital watermarking for multimedia security management in general, and multimedia copyright protection and content integrity verification in particular. We will be addressing the challenges posed to multimedia security management and how digital watermarking can be deployed in different applications in order to meet those challenges. Categ...
متن کاملMulti-Level Security Applications
BlueSpace is an enterprise software company, based in Austin, Texas, which creates multi-level secure (MLS) end user applications that can span multiple networks at different classification levels. BlueSpace's middleware strategy facilitates rapid application development, infrastructure consolidation and infrastructure neutrality. The continuing growth in the number of networks in the defense a...
متن کاملSecurity for Automated, Distributed Configuration Management
Installation, configuration, and administration of desktop software is a non-trivial process. Even a simple application can have numerous dependencies on hardware, device drivers, operating system versions, dynamically linked libraries, and even on other applications. These dependencies can cause surprising failures during the normal process of installations, updates and re-configurations. Diag...
متن کاملSecurity and Reliability Requirements for Advanced Security Event Management
This paper addresses security information management in complex application scenarios. Security Information and Event Management (SIEM) systems collect and examine security related events, with the goal of providing a unified view of the monitored systems’ security status. While various SIEMs are in production, there is scope to extend the capability and resilience of these systems. The use of ...
متن کاملModel-Based Security Event Management
With the growing size and complexity of current ICT infrastructures, it becomes increasingly challenging to gain an overview of potential security breaches. Security Information and Event Management systems which aim at collecting, aggregating and processing securityrelevant information are therefore on the rise. However, the event model of current systems mostly describes network events and th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2018
ISSN: 1877-0509
DOI: 10.1016/j.procs.2018.07.184