Skip to main content

A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)

  • Conference paper
Information Security and Assurance (ISA 2011)

Abstract

A CCTV to ensure the safety of the routine has been used as a tool. Especially in recent years, CCTV has improved the performance of the hardware. As an example, CCTV were realized connection to a smart phone and supporting high-definition CCTV with the advent of CCTV images. This paper is part of the study for an effective monitoring of the object to define the role of private CCTV Multiple CCTV at the same time. Multiple CCTV and dynamic roles are needed to define to separate between the algorithms and policies. To this end, this article was fused of CS-RBAC concept with 3D CCTV. In this article, the proposed scheme for effective use of CCTV is expected to be available in various environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Webb, B.: CCTV in Town Centres: Three Case Studies, p. 6. Police Research Group (1995)

    Google Scholar 

  2. Short, E., Ditton, J.: Seen and Now Heard: Talking to the Targets of Open Street CCTV. British Journal of Criminology 38(3), 404 (1998)

    Article  Google Scholar 

  3. Surette, R.: os and cons of second generation CCTV surveillance systems. Policing: An International Journal of Police Strategies & Management 28(1), 152

    Google Scholar 

  4. Shaha, S.A.A., Kim, H.J., Baek, S.K., Chang, H.H., Ahn, B.H.: System architecture of a decision support system for freeway incident management in Republic. Transportation Research Part A: Policy and Practice 42(5), 799 (2008)

    Google Scholar 

  5. BroadcastEngeering, http://broadcastengineering.com/production/looking-past-side-by-side-3-d-broadcasting-20100622/

  6. Zhang, L., Ahn, G., Chu, B.: Rule-Based Framework for Role-Based Delegation. In: Proceedings of ACM Symposium on Access Control Models and Technologies, Chantilly, VA (2001)

    Google Scholar 

  7. Barkley, J.F., Cincotta, A.V., Ferraiolo, D.F., Gavrilla, S., Kuhn, D.R.: Role Based Access Control for the World Wide Web. In: 20th NISSC National Information Systems Security Conference, pp. 331–340 (1997)

    Google Scholar 

  8. Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Transaction on Information System Security, 34–64 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, JM. et al. (2011). A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control). In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23141-4_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23140-7

  • Online ISBN: 978-3-642-23141-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics