The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.30)
pp: 73-79
Jesus Cano , Universidad Nacional de Educacion a Distancia
Roberto Hernandez , Universidad Nacional de Educacion a Distancia
ABSTRACT
A safety-critical software system called SCEPYLT provides an information solution for a field traditionally not computerized: explosives and their associated risks in handling, storage, transport, and use. SCEPYLT is a model for cooperative distributed systems engineering projects, synchronized over multiple databases.
INDEX TERMS
Explosives, Security, Distributed databases, Computers, Mesh networks, Web services, Software reliability, Terrorism, SCEPYLT, eGovernment, public security, critical software engineering, explosives control, safety-critical, service-oriented architecture, distributed system, cooperative system, terrorism
CITATION
Jesus Cano, Roberto Hernandez, "SCEPYLT: An Information System for Fighting Terrorism", IEEE Software, vol.30, no. 3, pp. 73-79, May-June 2013, doi:10.1109/MS.2013.23
REFERENCES
1. G. Tremlett and I. Black, “Explosives Theft Linked to Madrid Bomb,” The Guardian, 22 March 2004; www.guardian.co.uk/world/2004/mar/23spain.gilestremlett .
2. Agence France-Presse, “Terrorism Police Are Investigating Theft of Explosives in France,” New York Times,19 July 2008; www.nytimes.com/2008/07/19/world/europe19lyon.html .
3. House of Lords, European Union Committee, “After Madrid: The EU's Response to Terrorism,” Mar. 2005; www.publications.parliament.uk/pa/ld200405/ ldselect/ldeucom/5353.pdf.
4. J.J. Wylie et al., “Survivable Information Storage Systems,” Computer, vol. 33, no. 8, 2000, pp. 61–68.
5. J.C. Knight, “Safety Critical Systems: Challenges and Directions,” Proc. 24th Int'l Conf. Software Engineering (ICSE02), IEEE CS, 2002, pp. 547–550.
6. A. Avizienis et al., “Basic Concepts and Taxonomy of Dependable and Secure Computing,” IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, 2004, pp. 11–33.
7. W.R. Dunn, “Designing Safety-critical Computer Systems,” Computer, vol. 36, no. 11, 2003, pp. 40–46.
8. B. Friedman, P.H. Kahn, and D.C. Howe, “Trust Online,” Comm. ACM, vol. 43, no. 12, 2000, pp. 34–40.
9. R.J. Dunn et al., “Presence-based Availability and P2P Systems,” IEEE 5th Ann. Int'l Conf. Peer-to-Peer Computing, IEEE CS, 2005, pp. 209–216.
10. M.P. Papazoglou et al., “Service-Oriented Computing: State of the Art and Research Challenges,” Computer, vol. 40, no. 11, 2007, pp. 38–45.
11. N. Milanovic and M. Malek, “Current Solutions for Web Service Composition,” IEEE Internet Computing, vol. 8, no. 6, 2004, pp. 51–59.
12. S. Agrawal, V. Narasayya, and B. Yang, “Integrating Vertical and Horizontal Partitioning into Automated Physical Database Design,” Proc. Int'l Conf. on Management of Data (Sigmod 04), ACM, 2004, pp. 359–370; doi:10.1145/1007568.100 7609.
13. M. Kantarcioglu and C. Clifton, “Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data,” IEEE Trans. Knowledge and Data Eng., vol. 16, no.9, 2004, pp. 1026–1037.
14. European Federation of Explosives Engineers (EFEE), “The EU Directives Committee: Enhancing the Security of Explosives,” EFEE Newsletter, Mar. 2009; http://efee.eu/wp-content/uploads/2012/03 2009-03-EFEE-Newsletter.pdf.
15. Council of the European Union, “Council Conclusions on Systems and Mechanisms for the Enhancement of Security of Explosives,” 2010; www.consilium.europa.eu/uedocs/cms_data/ docs/pressdata/en/jha114017.pdf.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool