Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1146598.1146636acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
Article

Secure interoperation for effective data mining in border control and homeland security applications

Published: 21 May 2006 Publication History

Abstract

Our NSF funded project aims at providing decision makers with the ability to extract and fuse information from multiple, hetertgeneous sources in response to a query while operating under a decentralized security administration. Our motivation comes from US Customs, which embarked on a major modernization initiative of its Information Technology systems. Drawing in data from Customs trade systems, targeting inspectors review manifest information as well as strategic and tactical intelligence to determine "high-risk" shipments and containers. This entails a considerable level of communication and data sharing between various government agencies. Based on the idea of "Smart Borders", the system will utilize data available from different agencies, ports and customs divisions to supplement the profiling by targeting towards anomalies, and detect various flags raised by non-conforming shipments or abnormal behavior of inbound cargos and raise a combination of alerts. The output of this project would ideally enhance the security aspect of the Automated Commercial Environment (ACE) system by incorporating the concept of semantic interoperability, anomaly detection and subsequent spatial and geographical visualization of information that can help Customs inspectors make better decisions.

References

[1]
N. Adam et al. "Semantic Graph based Knowledge Discovery from Heterogeneous Information Sources", Working Together: Conference on Public/Private R&D Partnerships in Homeland Security, 2005.
[2]
V. Atluri, J. Warner: Automatic Enforcement of Access Control Policies Among Dynamic Coalitions, ICDCIT 2004.
[3]
C. Gupta and R. L. Grossman, Outlier Detection in Streams With Dyadic Cubes, will be submitted to KDD 2006.
[4]
R. L. Grossman and H. V. Poor, Baselines and Change Detection Using Ensembles of CUSUM Algorithms, submitted to IEEE TKDE.
[5]
R. L. Grossman et al. Change Detection and Alerts from Highway Traffic Data, ACM/IEEE SC 2005 Conference.
[6]
V. P. Janeja and V. Atluri, "FS3: A Random Walk based Free-Form Spatial Scan Statistic for Anomalous Window Detection". ICDM 2005, Houston, Texas, USA
[7]
R. Koslowski, Real Challenges for Virtual Borders: The Implementation of US-VISIT, Migration Policy Institute Report, June 2005.
[8]
R. Koslowski, "Virtual Borders and Homeland Security," Beyond Terror: A New Security Agenda, Watson Institute, Brown University, June, 2005.
[9]
R. Koslowski, "Real Challenges for Virtual Borders: The Implementation of US-VISIT," presentation and report release, Migration Policy Institute, Washington, DC June, 9, 2005
[10]
R. Koslowski, "Real Challenges for Virtual Borders," Centre on Migration Policy and Society, Oxford University, Mar. 16, 2005.
[11]
R. Koslowski, "Toward Virtual Borders: Expanding European Border Control Policy Initiatives and Technology Implementations" An Immigration Policy of Europe? New York University and the European Union Institute, Florence, Italy, March 13--15, 2005.
[12]
R. Koslowski, "Possible Steps Towards an International Regime for Mobility and Security", UN, Mar, 2005.
[13]
R. Koslowski, "European and Transatlantic Cooperation on Migration, Mobility and Security" Beyond the U.S. War on Terrorism: Comparing Domestic Legal Remedies to an International Dilemma, The J. B. Moore Society Spring 2005 Symposium, University of Virginia Law School, Feb, 2005.
[14]
R. Mukkamala, V. Atluri and J. Warner, A distributed Service Registry for Resource Sharing Among Ad-hoc Dynamic Coalitions, IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference, 2005
[15]
J. Warner, V. Atluri and R. Mukkamala, A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. DBSec 2005: 252--266
[16]
J. Warner, V. Atluri and R. Mukkamala, An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies, ICISS 2005.
[17]
L. Wilkison, A. Anand, R. Grossman, Graph-Theoretic Scagnostics, IEEE Symposium on Information Visualization 2005.

Cited By

View all
  • (2016)Biometric Recognition in Automated Border ControlACM Computing Surveys10.1145/293324149:2(1-39)Online publication date: 30-Jun-2016
  • (2007)Organizing Hot-Spot Police Patrol Routes2007 IEEE Intelligence and Security Informatics10.1109/ISI.2007.379538(79-86)Online publication date: May-2007

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '06: Proceedings of the 2006 international conference on Digital government research
May 2006
526 pages

Sponsors

  • NSF: National Science Foundation

Publisher

Digital Government Society of North America

Publication History

Published: 21 May 2006

Check for updates

Qualifiers

  • Article

Conference

dg.o '06
Sponsor:
  • NSF
dg.o '06: Digital government research
May 21 - 24, 2006
California, San Diego, USA

Acceptance Rates

dg.o '06 Paper Acceptance Rate 20 of 58 submissions, 34%;
Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Biometric Recognition in Automated Border ControlACM Computing Surveys10.1145/293324149:2(1-39)Online publication date: 30-Jun-2016
  • (2007)Organizing Hot-Spot Police Patrol Routes2007 IEEE Intelligence and Security Informatics10.1109/ISI.2007.379538(79-86)Online publication date: May-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media