Skip to main content

For Aviation Security Using Surveillance System

  • Conference paper
Secure and Trust Computing, Data Management, and Applications (STA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 187))

  • 767 Accesses

Abstract

As the national airspace system grows increasingly interconnected to partners and customers both within and outside the Rep. of Korea government, the danger of cyber-attacks on the system is increasing. Because of low-cost computer technology and easier access to malware, or malicious software code, it is conceivable for individuals, organized crime groups, terrorists, and nation-states to attack the Rep. of Korea air transportation system infrastructure.[4] An apparatus and a method for processing image information are provided. The apparatus for processing image information includes an image capturing device and an image information server for receiving and storing an image captured by the image capturing device and adds information on the image capturing device and signature information to image data obtained by the image capturing device. Accordingly, the device information and the signature information can be added to the image data obtained by the image capturing device to maintain security of the image data and use the image data as digital proof when a specific event is generated.

This research was supported by a grant (code# 07aviation-navigation-03) from Aviation Improvement Program funded by Ministry of Construction & Transportation of Korean government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Damiani, E., De Capitani di Vimercati, S.: Securing xml based multimedia content. In: 18th IFIP International Information Security Conference (2003)

    Google Scholar 

  2. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–122. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Kodali, N., Wijesekera, D., Farkas, C.: Secrets: A Secure Real-Time Multimedia Surveillance System. In: Proc. of the 2nd Symposium on Intelligence and Security Informatics (2004)

    Google Scholar 

  4. Faa’S Nextgen Air Traffic Control System. A CIO’s Perspective on Technology and Security Georgetown University Institute for Law, Science, and Global Security & Billington CyberSecurity (February 28, 2011)

    Google Scholar 

  5. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati., P.: A fine grained access control system for xml documents. ACM Transactions on Information and System Security 5 (2002)

    Google Scholar 

  6. Gu, X., Nahrstedt, K., Yuan, W., Wichadakul, D., Xu., D.: An xml-based quality of service enabling language for the web (2001)

    Google Scholar 

  7. Kodali, N., Farkas, C., Wijesekera, D.: Enforcing integrity in multimedia surveillance. In: IFIP 11.5 Working Conference on Integrity and Internal Control in Information Systems (2003)

    Google Scholar 

  8. Kodali, N., Farkas, C., Wijesekera, D.: Multimedia access contol using rdf metadata. In: Workshop on Metadata for Security, WMS 2003 (2003)

    Google Scholar 

  9. Kodali, N., Wijesekera, D.: Regulating access to smil formatted pay-per-view movies. In: 2002 ACM Workshop on XML Security (2002)

    Google Scholar 

  10. Kodali, N., Wijesekera, D., Michael, J.B.: Sputers: A secure traffic surveillance and emergency response architecture. Submission to the Journal of Intelligent Transportaion Systems (2003)

    Google Scholar 

  11. Pihkala, K., Cesar, P., Vuorimaa, P.: Cross platform smil player. In: International Conference on Communications, Internet and Information Technology (2002)

    Google Scholar 

  12. Rutledge, L., Hardman, L., Ossenbruggen, J.: The use of smil: Multimedia research currently applied on a global scale (1999)

    Google Scholar 

  13. Rutledge, L., van Ossenbruggen, J., Hardman, L., Bulterman, D.C.A.: Anticipating SMIL 2.0: the developing cooperative infrastructure for multimedia on the Web. Computer Networks 31(11-16), 1421–1430 (1999)

    Article  Google Scholar 

  14. Schmidt, B.K.: An architecture for distributed, interactive, multi-stream, multi-participant audio and video. In: Technical Report No CSL-TR-99-781. Stanford Computer Science Department (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, D.G., Han, J.W. (2011). For Aviation Security Using Surveillance System. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22365-5_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22364-8

  • Online ISBN: 978-3-642-22365-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics