References: [1] Carlisle, A. & Lloyd, S.. -Understanding PKI: Concepts (2002), ISBN: 0-672-32391- 5. Standards, and Deployment Considerations?, 2nd edn. Addison-Wesley: Reading, USA. [2] INDECT Project Web Site (2013). www.indectproject. eu. Accessed 30 April 2013. [3] OpenCA Project Web Site (2012). www.openca.org/. Accessed 23 April 2013. [4] EJBCA Enterprise PKI Web Site (2012). www.ejbca.org/. Accessed 25 April 2013. [5] Stoianov, N., Urueña, M., Niemiec, M., Machník, P. & Maestro, G. (2012). Security Infrastructures: Towards the INDECT System Security, MCSS 2012, CCIS 287. Springer-Verlag: Berlin, Heidelberg, pp. 304–315, ISBN 978-3-642- 30720-1. [6] Urueña, M., Machník, P., Niemiec, M. & Stoianov, N. (in press) INDECT security architecture, MCSS 2013, 6–7 June 2013. AGH University: Krakow, Poland. |