Secure judicial communication exchange using soft-computing methods and biometric authentication

Mauro Cislaghi, George Eleftherakis, Roberto Mazzilli, Francois Mohier, Sara Ferri, Valerio Giuffrida, Elisa Negroni

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper describes how "Computer supported cooperative work", coped with security technologies and advanced knowledge management techniques, can support the penal judicial activities, in particular national and trans-national investigations phases when different judicial system have to cooperate together. Increase of illegal immigration, trafficking of drugs, weapons and human beings, and the advent of terrorism, made necessary a stronger judicial collaboration between States. J-WeB project (http://www.jweb-net.com/), financially supported by the European Union under the FP6 - Information Society Technologies Programme, is designing and developing an innovative judicial cooperation environment capable to enable an effective judicial cooperation during cross-border criminal investigations carried out between EU and Countries of enlarging Europe, having the Italian and Montenegrin Ministries of Justice as partners. In order to reach a higher security level, an additional biometric identification system is integrated in the security environment.

Original languageEnglish (US)
Title of host publicationProceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008
EditorsEmilio Corchado, Alvaro Herrero, Rodolfo Zunino, Paolo Gastaldo
Pages11-18
Number of pages8
DOIs
StatePublished - 2009

Publication series

NameAdvances in Soft Computing
Volume53
ISSN (Print)1615-3871
ISSN (Electronic)1860-0794

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Computational Mechanics
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Secure judicial communication exchange using soft-computing methods and biometric authentication'. Together they form a unique fingerprint.

Cite this