Evaluating the Allocation of Border Security System of Systems Requirements

被引:0
|
作者
Flanigan, David [1 ]
Brouse, Peggy [2 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, 11100 Johns Hopkins Rd, Laurel, MD 20723 USA
[2] George Mason Univ, Fairfax, VA 22030 USA
关键词
System of Systems; System Methodologies;
D O I
10.1016/j.procs.2013.01.066
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Customs and Border Protection (CBP) organization must secure the homeland by preventing illegal entry into the United States. In order to successfully accomplish this task, a System of Systems (SoS) of airborne, ground, fixed, mobile, manned, and unmanned capabilities must act together in order to successfully accomplish the objective. However, it may be difficult to identify a specific SoS configuration that will meet the objective and quantify the requirements allocated for each specific system. This paper offers a methodology to evaluate the SoS phases to detect, track, identify, decide, act, and assess the actions of CBP forces. This methodology is exercised to quantify the system contributions to the CBP SoS and the interfaces needed for each system. (C) 2013 The Authors. Published by Elsevier B.V. Selection and/or peer-review under responsibility of Georgia Institute of Technology
引用
收藏
页码:631 / 638
页数:8
相关论文
共 50 条
  • [1] System of Systems Requirements Capacity Allocation
    Flanigan, David
    Brouse, Peggy
    [J]. CONFERENCE ON SYSTEMS ENGINEERING RESEARCH, 2012, 8 : 112 - 117
  • [2] Assessing System of Systems Security Risk and Requirements with OASoSIS
    Ki-Aries, Duncan
    Faily, Shamal
    Dogan, Huseyin
    Williams, Christopher
    [J]. 2018 IEEE 5TH INTERNATIONAL WORKSHOP ON EVOLVING SECURITY & PRIVACY REQUIREMENTS ENGINEERING (ESPRE 2018), 2018, : 14 - 20
  • [4] Analyzing and Evaluating Security Features in Software Requirements
    Malhotra, Ruchika
    Chug, Anuradha
    Hayrapetian, Allenoush
    Raje, Rajeev
    [J]. 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 26 - 30
  • [5] Evaluating Cryptographic Security Requirements in IoT Gateways
    Felix, Eduardo F.
    Lins, Fernando A. A.
    Gomes, Diego R.
    Nobrega, Obionor O.
    Jesus, Bruno A.
    Vieira, Marco
    [J]. 2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [6] Identification of Security Requirements in Systems of Systems by Functional Security Analysis
    Fuchs, Andreas
    Rieke, Roland
    [J]. ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96
  • [7] DONES Systems identification and requirements allocation
    Zsakai, A.
    Diez, A.
    Munoz, A.
    Garcia, M.
    Ibarra, A.
    [J]. NUCLEAR MATERIALS AND ENERGY, 2022, 31
  • [8] Assessing Security Risk and Requirements for Systems of Systems
    Ki-Aries, Duncan
    [J]. 2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018), 2018, : 454 - 459
  • [9] Evaluating existing security and privacy requirements for legal compliance
    Massey, Aaron K.
    Otto, Paul N.
    Hayward, Lauren J.
    Anton, Annie I.
    [J]. REQUIREMENTS ENGINEERING, 2010, 15 (01) : 119 - 137
  • [10] EMPIRICALLY ANALYZING AND EVALUATING SECURITY FEATURES IN SOFTWARE REQUIREMENTS
    Hayrapetian, Allenoush
    Raje, Rajeev
    [J]. ISEC'18: PROCEEDINGS OF THE 11TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2018,