Bureau of Prisons access control system: Functional & operational requirements

被引:0
|
作者
Janus, M
Carlson, P
Kane, T
机构
关键词
prison; technology; access control; hand geometry;
D O I
10.1117/12.263468
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nation-wide, The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an Access Control and Entry System (ACES). ACES is intended to provide an automated record of every entry and exit to a correctional institution. AGES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, ''ownership'', cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.
引用
收藏
页码:90 / 97
页数:8
相关论文
共 50 条
  • [21] A Scalable Operational Framework for Requirements Validation Using Semantic and Functional Models
    Atoum, Issa
    PROCEEDINGS OF THE 2019 2ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION MANAGEMENT (ICSIM 2019) / 2019 2ND INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (ICBDSC 2019), 2019, : 1 - 6
  • [22] An operational semantics of Java']Java 2 access control
    Karjoth, G
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 224 - 232
  • [23] Validating functional system requirements with scenarios
    Sutcliffe, A
    Gregoriades, A
    IEEE JOINT INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2002, : 181 - 188
  • [24] INSTALLATION AND OPERATIONAL EXPERIENCES WITH MACCS (MOLECULAR ACCESS SYSTEM)
    POLTON, DJ
    ONLINE REVIEW, 1982, 6 (03): : 235 - 242
  • [25] Report on the workshop on Pacific Coastal Forecasting System operational requirements
    Hirschberg, PA
    SECOND CONFERENCE ON COASTAL ATMOSPHERIC AND OCEANIC PREDICTION AND PROCESSES, 1998, : J36 - J38
  • [26] An integrated model for access control and information flow requirements
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 111 - 125
  • [27] Analyzing the requirements of an access control using VDMTools and PVS
    Droschl, G
    FM'99-FORMAL METHODS, VOL II, 1999, 1709 : 1870 - 1870
  • [28] Access control requirements for processing electronic health records
    Alhaqbani, Bandar
    Fidge, Colin
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, 2008, 4928 : 371 - 382
  • [29] Requirements for scalable access control and security management architectures
    Keromytis, Angelos D.
    Smith, Jonathan M.
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (02)
  • [30] On Access Control Requirements for Inter-Organizational Workflow
    Elkandoussi, Asmaa
    Elbakkali, Hanan
    PROCEEDINGS OF THE 4TH EDITION OF NATIONAL SECURITY DAYS (JNS4), 2014, : 21 - 26