Abstract
As the national airspace system grows increasingly interconnected to partners and customers both within and outside the Rep. of Korea government, the danger of cyber-attacks on the system is increasing. Because of low-cost computer technology and easier access to malware, or malicious software code, it is conceivable for individuals, organized crime groups, terrorists, and nation-states to attack the Rep. of Korea air transportation system infrastructure.[4] An apparatus and a method for processing image information are provided. The apparatus for processing image information includes an image capturing device and an image information server for receiving and storing an image captured by the image capturing device and adds information on the image capturing device and signature information to image data obtained by the image capturing device. Accordingly, the device information and the signature information can be added to the image data obtained by the image capturing device to maintain security of the image data and use the image data as digital proof when a specific event is generated.
This research was supported by a grant (code# 07aviation-navigation-03) from Aviation Improvement Program funded by Ministry of Construction & Transportation of Korean government.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Damiani, E., De Capitani di Vimercati, S.: Securing xml based multimedia content. In: 18th IFIP International Information Security Conference (2003)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–122. Springer, Heidelberg (2000)
Kodali, N., Wijesekera, D., Farkas, C.: Secrets: A Secure Real-Time Multimedia Surveillance System. In: Proc. of the 2nd Symposium on Intelligence and Security Informatics (2004)
Faa’S Nextgen Air Traffic Control System. A CIO’s Perspective on Technology and Security Georgetown University Institute for Law, Science, and Global Security & Billington CyberSecurity (February 28, 2011)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati., P.: A fine grained access control system for xml documents. ACM Transactions on Information and System Security 5 (2002)
Gu, X., Nahrstedt, K., Yuan, W., Wichadakul, D., Xu., D.: An xml-based quality of service enabling language for the web (2001)
Kodali, N., Farkas, C., Wijesekera, D.: Enforcing integrity in multimedia surveillance. In: IFIP 11.5 Working Conference on Integrity and Internal Control in Information Systems (2003)
Kodali, N., Farkas, C., Wijesekera, D.: Multimedia access contol using rdf metadata. In: Workshop on Metadata for Security, WMS 2003 (2003)
Kodali, N., Wijesekera, D.: Regulating access to smil formatted pay-per-view movies. In: 2002 ACM Workshop on XML Security (2002)
Kodali, N., Wijesekera, D., Michael, J.B.: Sputers: A secure traffic surveillance and emergency response architecture. Submission to the Journal of Intelligent Transportaion Systems (2003)
Pihkala, K., Cesar, P., Vuorimaa, P.: Cross platform smil player. In: International Conference on Communications, Internet and Information Technology (2002)
Rutledge, L., Hardman, L., Ossenbruggen, J.: The use of smil: Multimedia research currently applied on a global scale (1999)
Rutledge, L., van Ossenbruggen, J., Hardman, L., Bulterman, D.C.A.: Anticipating SMIL 2.0: the developing cooperative infrastructure for multimedia on the Web. Computer Networks 31(11-16), 1421–1430 (1999)
Schmidt, B.K.: An architecture for distributed, interactive, multi-stream, multi-participant audio and video. In: Technical Report No CSL-TR-99-781. Stanford Computer Science Department (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, D.G., Han, J.W. (2011). For Aviation Security Using Surveillance System. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-22365-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22364-8
Online ISBN: 978-3-642-22365-5
eBook Packages: Computer ScienceComputer Science (R0)