Browse > Article
http://dx.doi.org/10.7840/kics.2014.39B.4.228

An Efficient Access Control Mechanism for Secure Surveillance Systems  

Yang, Soomi (The University of Suwon, Department of Information Security)
Park, Jaesung (The University of Suwon, Department of Information Security)
Abstract
In recent general social surveillance systems, secure access control mechanism is needed. ONVIF establishes standards for interoperability between cameras and defines web service framework for it. In this paper we present an efficient attribute based access control mechanism for surveillance system networks which follow the ONVIF standards. It accommodates web service information security techniques and provides efficient secure access control.
Keywords
Access Control; Surveillance System; Attribute Certificates; Communication Sciences; Network;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 ONVIF(Open Network Video Interface Forum) http://www.onvif.org
2 T. Senst, M. Patzold, R. H. Evangelio, V. Eiselein, I. Keller, and T. Sikora, "On building decentralized wide-area surveillance networks based on ONVIF," IEEE Int. Conf. AVSS, pp. 420-423, Klagenfurt, Aug.-Sept. 2011.
3 OASIS (Organization for the Advancement of Structured Information Standards), http://www.oasis-open.org
4 Web Services Interoperability Organization, Basic Profile Version 2.0, http://ws-i.org/Profiles/BasicProfile-2.0-2010-11-09.html, Nov. 2010.
5 B. Shafiq, B.D.J. Joshi, E. Bertino, and A. Ghafoor, "Secure interoperation in a multidomain environment employing RBAC policies," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 11, Nov. 2005.
6 Y. Lee, D. Park, Y. Hwang, and S. You, "The role-based access control model considering context and privacy," J. KICS, vol. 34, no. 6, pp. 179-186, 2009.
7 ISO 9594-8:2008 Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks, 2008.
8 NIST, "Guide to Attribute Based Access Control (ABAC) Definition and Considerations," 2013.
9 SAML 2.0 Profile of XACML, Version 2.0, http://docs.oasis-open.org/xacml/3.0/xacml-profile-saml2.0-v2-spec-cd-1-en.html, Apr. 2009.
10 G. Kim, D. Won, and U. Kim, "An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services," J. KIISC, pp. 111-122, Aug. 2008.   과학기술학회마을
11 OASIS XACML Version 3.0, http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.pdf, Jan. 2013.
12 J. Kim and S. U. Lee, "Conflict Detection Algorithm for XACML Policies," in Proc. KISS, pp. 550-552, Jun. 2013.
13 D. Choi, D. Kim and S. Yang, "Design and Implementation of Intelligent Surveillance Systems for Secure and Efficient Public Service Provision," in Proc. KICS, pp. 20-21, 2014
14 S. Oh, S. Moon and S. Choi, "Intelligence Security and Surveillance System in Sensor Network Environment Using Integrated Heterogeneous Sensors," in Proc. KICS, pp. 551-562, 2014