MASC - Monitoring and Security of Containers

نویسندگان

  • Jens Ove Lauf
  • Dieter Gollmann
  • Volker Turau
چکیده

Ein weltweiter Containertransport durchläuft im Rahmen der gesamten Transportkette typischerweise eineVielzahl vonVerantwortungsbereichen. Bei den Interchanges (Übergabe von Conatiner und Verantwortlichkeit) werden lediglich Containerverlust und deutliche Außenschäden entdeckt. Häufig kommt dieWare zerstört beim Empfänger an, obwohl der Container unversehrt ist und alle Interchanges ohne Beanstandungen durchlaufen wurden. Versicherungen entscheiden sich wegen der vielen Parteien oftmals für das direkte Auszahlen der Beträge, weil Ermittlungen zu kostenintensiv und wenig erfolgversprechend sind. Hohe Versicherungssummen sind die Folge.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-Organizing Wireless Monitoring System for Containers

This paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organ...

متن کامل

Policy-Driven Middleware for Manageable and Adaptive Web Services Compositions

MASC (Manageable and Adaptive Service Compositions)1 is a policy-based middleware for monitoring of Web service compositions and their dynamic adaptation to various runtime changes. The monitorable requirements and the adaptation actions are specified in the WS-Policy4MASC language which extends WS-Policy by defining new types of policy assertions. In this paper, we present an overview of MASC ...

متن کامل

RFID-enabled Innovative Solutions Promote Container Security

In this paper we address the container security problem and we investigate RFID-enabled innovative solutions to confront it. To that end, initially we set the scene of the problem by reporting existing security problems in ocean container transport and container security-originated initiatives and regulations that affect seaborne containers transportation and handling. Afterwards, we accomplish...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

An Agent based Distributed Security System for Intrusion Detection in Computer Networks

Intruders damage or steal valuable information by either bypassing security tools or penetrating through them, necessitating the need to detect such intrusion attempts especially in case of multi-event based distributed attacks spanning over a considerable amount of time. In this paper ecology of agents is being suggested that uses class hierarchy to define complex intrusions. The source and ta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007