Secure Border Control Processes
نویسندگان
چکیده
Border control is one of the primary tasks of the Federal Police. Being able to identify persons and determine a unique match between them and their documents is an important part of this task. Biometrics can be a useful tool to help us carry out this task in the future. 1 Security architecture in Europe The security architecture in Europe, which is characterised by shared external borders for Schengen member states and the removal of border controls between the Schengen contracting states, requires standardised border controls at the external borders of the zone. Authorities in contracting states collaborate in the following areas of activity to achieve a common standard for border control. Standardising formats for identifying documents Defining technical requirements for border control technology Preventing the manipulation of personal data and associated biometric characteristics during their capture Establishing training standards for border control personnel Using high-availability information networks to interconnect member states Each contracting state in the Schengen area has undertaken to uphold the agreed border control standard at its external borders. Close collaboration is required at international level, especially within Europe, to fight organised crime, protect against terrorist activities and stop illegal immigration. DG JLS* and FRONTEX* help coordinate
منابع مشابه
Improving IP accounting for secure border routers
Today, security is a major issue in design and operation of computer networks. To reduce a network’s vulnerability, the effort should not be restricted to a firewall as a single point of network traffic control. Only multi-layered security models can effectively protect a network. Thus, a border router with proper access control embodies the outermost security layer. Unfortunately, the rejectio...
متن کاملSecure Border Gateway Protocol (Secure-BGP)
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems (ASes), is a critical component of the Internet’s routing infrastructure. It is highly vulnerable to a variety of malicious attacks, due to the lack of a secure means of verifying the authenticity and legitimacy of BGP control traffic. This document describes a secure, scalable, deploya...
متن کاملSemantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective By: Rahul Singh and Al F. Salam Singh, Rahul and Salam, A. F. "Semantic Information Assurance for Secure Distributed Knowledge Management: A Business Process Perspective" IEEE Transactions
Secure knowledge management for eBusiness processes that span multiple organizations requires intraorganizational and interorganizational perspectives on security and access control issues. There is paucity in research on information assurance of distributed interorganizational eBusiness processes from a business process perspective. This paper presents a framework for secure semantic eBusiness...
متن کاملDesigning Secure Business Processes Through Secure Activity Resource Coordination (SARC)
Business processes enable organizations to achieve business goals. Organizations require that their business processes exchange information in a secure environment. Access control mechanisms must be incorporated into the analysis, modeling, and design of business processes to prevent unauthorized access to information resources, to provide non-repudiation mechanisms, and to allow for segregatio...
متن کامل