Bureau of Prisons access control system: Functional & operational requirements

被引:0
|
作者
Janus, M
Carlson, P
Kane, T
机构
关键词
prison; technology; access control; hand geometry;
D O I
10.1117/12.263468
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nation-wide, The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an Access Control and Entry System (ACES). ACES is intended to provide an automated record of every entry and exit to a correctional institution. AGES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, ''ownership'', cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.
引用
收藏
页码:90 / 97
页数:8
相关论文
共 50 条
  • [31] Access Control in IoT: From Requirements to a Candidate Vision
    Hussein, Dina
    Bertin, Emmanuel
    Frey, Vincent
    PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 328 - 330
  • [32] Technology Trends of Access Control in IoT and Requirements Analysis
    Lee, Yun-kyung
    Lim, Jae-deok
    Jeon, Yong-seong
    Kim, Jeong-nyeo
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1031 - 1033
  • [33] Access control requirements for structured document in cloud computing
    Yao, Zhiqiang
    Xiong, Jinbo
    Ma, Jianfeng
    Li, Qi
    Liu, Ximeng
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 95 - 102
  • [34] Managing access and flow control requirements in distributed workflows
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    2008 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2008, : 702 - 710
  • [35] Verification of Access Control Requirements in Web Services Choreography
    Paci, Federica
    Ouzzani, Mourad
    Mecella, Massimo
    2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 5 - +
  • [36] On the Information and Functional Requirements of the Comprehensive Flood Control Meeting and Decision Support Software System
    Li, Shengyang
    Mynett, Arthur E.
    PROCEEDINGS OF THE 4TH INTERNATIONAL YELLOW RIVER FORUM ON ECOLOGICAL CIVILIZATION AND RIVER ETHICS, VOL IV, 2010, : 11 - 17
  • [37] Operational experience with the CEBAF control system
    Hovater, C
    Chowdhary, M
    Karn, J
    Tiefenback, M
    vanZeijts, J
    Watson, W
    PROCEEEDINGS OF THE XVIII INTERNATIONAL LINEAR ACCELERATOR CONFERENCE, VOLS 1 AND 2, 1996, 96 (07): : 616 - 620
  • [38] Design and operational control of an AGV system
    Mantel, RJ
    Landeweerd, HRA
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 1995, 41 (1-3) : 257 - 266
  • [39] MP planning operational control system
    ANON
    1971, 2 (05): : 20 - 22
  • [40] Control View Based Elicitation of Functional Requirements
    Lopata, Audrius
    Gudas, Saulius
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, 2009, 37 : 91 - 102