Port security & access control: A systemic approach
نویسنده
چکیده
Ports constitute crucial intermodal nodes in the freight and passenger transport network as well as important border control points. Their security is therefore of paramount importance not only because of their critical transport functions but also because of their specific role, as control points, in the regional, national and European security. Port security is a cornerstone for the implementation of the new international maritime transport security regime. The aim of the present paper is to analyse the problem, highlight the issues faced in a systematic way towards a better port security without penalising excessively the trade or the port related activities, with a particular emphasis on access control and identity management. Finally, two practical measures for increasing the EU port security are highlighted.
منابع مشابه
Media Access Control Address Spoofing Attacks against Port Security
In this paper we describe three separate Media Access Control (MAC) address spoofing attacks that, when deployed in specific yet common layer 2 network topologies, circumvent Cisco’s port security. We show first that, with full knowledge of the network, the vendor recommended implementation of port security is both ineffective at preventing all three of these attacks, and actually decreases the...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملUsing the Java Sandbox for Resource Control
Java’s security architecture is well known for not taking the security aspect of availability into account. This has been recognised and addressed by a number of researchers and communities. However, in their suggested resourceaware Java environments, policies for resource control have so far been stated in proprietary, sometimes hard-coded, or undocumented ways. We set out to investigate if st...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کامل