Evaluating the Allocation of Border Security System of Systems Requirements

被引:0
|
作者
Flanigan, David [1 ]
Brouse, Peggy [2 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, 11100 Johns Hopkins Rd, Laurel, MD 20723 USA
[2] George Mason Univ, Fairfax, VA 22030 USA
关键词
System of Systems; System Methodologies;
D O I
10.1016/j.procs.2013.01.066
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Customs and Border Protection (CBP) organization must secure the homeland by preventing illegal entry into the United States. In order to successfully accomplish this task, a System of Systems (SoS) of airborne, ground, fixed, mobile, manned, and unmanned capabilities must act together in order to successfully accomplish the objective. However, it may be difficult to identify a specific SoS configuration that will meet the objective and quantify the requirements allocated for each specific system. This paper offers a methodology to evaluate the SoS phases to detect, track, identify, decide, act, and assess the actions of CBP forces. This methodology is exercised to quantify the system contributions to the CBP SoS and the interfaces needed for each system. (C) 2013 The Authors. Published by Elsevier B.V. Selection and/or peer-review under responsibility of Georgia Institute of Technology
引用
收藏
页码:631 / 638
页数:8
相关论文
共 50 条
  • [31] Optimal resource allocation for security in reliability systems
    Azaiez, M. N.
    Bier, Vicki M.
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 181 (02) : 773 - 786
  • [32] Designing and evaluating functional laboratory information system requirements integrated to hospital information systems
    Farzandipour, Mehrdad
    Meidani, Zahra
    Jabali, Monireh Sadeqi
    Bnadaki, Razieh Dehghan
    [J]. JOURNAL OF EVALUATION IN CLINICAL PRACTICE, 2019, 25 (05) : 788 - 799
  • [33] Solar Powered Wireless Sensor Systems for Border Security
    Zhang, Hongxi
    Fallahi, Mahmoud
    Pau, Stanley
    Norwood, Robert A.
    Peyghambarian, Nasser
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IX, 2010, 7666
  • [34] Evaluating Security Measures of a Layered System
    Razavi, Sanaz Hafezian
    Das, Olivia
    [J]. IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 296 - 301
  • [35] A framework for evaluating storage system security
    Riedel, E
    Kallahalla, M
    Swaminathan, R
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FAST'02 CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, 2002, : 15 - 30
  • [36] EVALUATING EFFECTIVENESS OF AN ELECTRONIC SECURITY SYSTEM
    MICHALKO, J
    HEIDTMANN, T
    [J]. COLLEGE & RESEARCH LIBRARIES, 1978, 39 (04): : 263 - 267
  • [37] Security Requirements of a Mobile Device Management System
    Rhee, Keunwoo
    Jeon, Woongryul
    Won, Dongho
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 353 - 358
  • [38] Obtaining Security Requirements for a Mobile Grid System
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Lopez, Javier
    Piatini, Mario
    [J]. INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2009, 1 (03) : 1 - 17
  • [39] Expert system for business decisions on security requirements
    Dobelis, Eriks
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 1, PROCEEDINGS, 2007, 4805 : 46 - 47
  • [40] Security Requirements of Web Content Protection System
    Lee, Hyun-Jung
    Won, Dongho
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 317 - 325