Advertisement

Distributing the Cost of Securing a Transportation Infrastructure

  • Sudarshan S. Chawathe
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)

Abstract

We address the problem of fairly distributing the cost of system-wide improvements to the security of a transportation infrastructure over the beneficiaries. We present a framework that models transportation links and the emergence (magnitude and frequency) and propagation of threats. The cost-distribution is based on a weighted sum that characterizes the expected reduction in the vulnerability of a site as a result of the security improvements.

Keywords

West Nile Virus Transportation Infrastructure Inside Threat Redundancy Allocation Transportation Link 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Breiman, L.: Probability. Society for Industrial and Applied Mathematics (1992)Google Scholar
  2. 2.
    Shao, B.B.M.: Optimal redundancy allocation for disaster recovery planning in the network economy. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 484–491. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Park, E., Seo, J.-T., Im, E.-G., Lee, C.-W.: Vulnerability analysis and evaluation within an intranet. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 514–515. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Sinai, J.: Utilizing the social and behavioral sciences to assess, model, forecast and preemptively respond to terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 531–533. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Ellis III, J.O.: MIPT: Sharing terrorism information resources. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 520–525. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Zeng, D., Chen, H., Tseng, C., Larson, C., Eidson, M., Gotham, I., Lynch, C., Ascher, M.: West nile virus and botulism portal: A case study in infectious disease informatics. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 28–41. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Park, J.S., Ho, S.M.: Composite role-based monitoring (CRBM) for countering insider threats. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 201–213. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Lin, C., Hu, P.J., Chen, H., Schroeder, J.: Technology implementation management in law enforcement: COPLINK system usability and user acceptance evaluations. In: Proceedings of the National Conference on Digital Government Research, Boston, Massachusetts (2003)Google Scholar
  9. 9.
    Xu, J., Marshall, B., Kaza, S., Chen, H.: Analyzing and visualizing criminal network dynamics: A case study. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 359–377. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Sudarshan S. Chawathe
    • 1
  1. 1.Computer Science DepartmentUniversity of MaineOronoUSA

Personalised recommendations