By Topic

Design of network action surveillance system based on internet real-name system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Libo Hou ; Dept. of Inf., Liaoning Police Acad., Dalian, China

This paper presents a framework for internet real-name system development that introduces a new phase in the usual procedure: Active Real-name System and Automatic Security Surveillance. The main goal of this paper is to bridge the gap between the real-name requirement analysis and the internet crime implementation through the generation of a model of the security system architecture plus the security policies associated with the components of the model that have to enforce them. For this purpose, the design phase is composed of two complementary steps: an architectural model and a set of design-level security policies. The main advantages and desired characteristics of these models are analyzed; they are related to existing work in the area; and future research directions are pointed.

Published in:

Signal Processing Systems (ICSPS), 2010 2nd International Conference on  (Volume:2 )

Date of Conference:

5-7 July 2010