Security Technique using SSH Tunneling for CCTV Remote Access

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flexible and Scalable Public Key Security for SSH

A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. However, widely-deployed implementations of the protocol are vulnerable to man-in-the-middle attacks, where an adversary substitutes her public key for the server’s. This danger particularly threatens a traveling user Bob borrowin...

متن کامل

The CRUD Security Matrix: A Technique for Documenting Access Rights

The CRUD matrix is an excellent technique to model processes and data and how they interact with respect to creation, reading, updating, and deleting of the data. In this paper, we extend the CRUD matrix to a CRUD Security Cube where we propose incorporating a third dimension on the matrix to include individuals or groups and the rights and security privileges granted to each. This additional d...

متن کامل

Image import and SSH security in Emulab

Cloud providers typically provide compute facilities for their users. It would be very convenient if users’ could import and export their machines with much greater ease to other cloud providers or to their desktops or local machines. Here, we talk about how we’ve enabled users to easily do this with Emulab. Specifically, we’ve implemented image import mechanisms to import machines from cloud p...

متن کامل

Vision Processing in Intelligent CCTV for Mass Transport Security

Intelligent Surveillance Systems is attracting unprecedented attention from research and industry. In this paper, we describe a real-life trial system where various video analytic systems are used to detect events and objects of interests in a mass transport environment. The system configuration and architecture of this system is presented. In addition to implementation and scalability challeng...

متن کامل

The Risks of Using SSH

Executive Summary This paper deals with security issues surrounding the use of Secure Shell (SSH). SSH is a replacement for telnet, rlogin, ftp, rsh, rcp, rdist, and other r*-based programs. It offers a secure communication channel between computers on an insecure network. Authenticity, confidentiality, and integrity are provided. Despite these features, SSH has several weaknesses that render i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Academia-Industrial cooperation Society

سال: 2016

ISSN: 1975-4701

DOI: 10.5762/kais.2016.17.11.148