Goods Movement Security: An Information Technology Problem

نویسنده

  • Jens Pohl
چکیده

This paper discusses the security problems associated with the movement of goods across international in-land borders and at ocean ports. The author proposes an information technology solution approach that is based on the profiling of international shipments. The collection of data describing the end-to-end movement of a shipment from the initial acquisition transactions, throughout the various transshipment stages, to the final delivery, allows intelligent software to assist customs and homeland security officials to determine the risks associated with the shipment long before it reaches the inspection point. The technical basis and architecture of the SecureOriginsTM software system is described. Designed for the border traffic between the United States and Mexico, this system is an ontology-based application that incorporates collaborative software agents with reasoning capabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Information Security as a Credence Good

With increasing use of information systems, many organizations are outsourcing information security protection to a managed security service provider (MSSP). However, diagnosing the risk of an information system requires special expertise, which could be costly and difficult to acquire. The MSSP may exploit their professional advantage and provide fraudulent diagnosis of clients’ vulnerabilitie...

متن کامل

Resolving the food security problem with an interdisciplinary approach

Food is one of the basic human needsand providing it is directly related to food security. The concept of food security in its historical process has been debated from various aspects of physical and economical access to healthy and nutritious food at all times. Food insecurity is considered a complex policy problem with different aspects. This problem requires a network of communication among ...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

Coordination of a Cyclic Three-stage Supply Chain for Fast Moving Consumer Goods

We focus on a three-stage supply chain problem for fast moving consumer goods including a supplier, a manufacturer and customers. There are different orders over identical cycles, to be processed in production site. The problem is to find a joint cyclic schedule of raw material procurement and job scheduling minimized the total cost comprised of raw material ordering cost and holding cost, prod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005