skip to main content
10.1145/2093973.2094055acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
demonstration

ASSIST: access controlled ship identification streams

Published: 01 November 2011 Publication History

Abstract

The International Maritime Organization (IMO) requires a majority of cargo and passenger ships to use the Automatic Identification System (AIS) for navigation safety and traffic control. Distributing live AIS data on the Internet can offer a global view based on ships' status for both operational and analytical purposes to port authorities, shipping and insurance companies, cargo owners and ship captains and other stakeholders. Yet, uncontrolled, this distribution can seriously undermine navigation safety and security and the privacy of the various stakeholders. In this paper we present ASSIST, a system prototype based on our recently proposed access control framework, to protect data streams from unauthorized access. We demonstrate the effectiveness of the system in a real scenario with real AIS data streams.

References

[1]
Aurora -- http://www.cs.brown.edu/research/aurora/.
[2]
Esper -- http://esper.codehaus.org/.
[3]
Microsoft Corporation -- LINQ.
[4]
Microsoft Corporation -- SQL Server Spatial Libraries.
[5]
Microsoft Corporation -- StreamInsight.
[6]
NiagaraST -- http://datalab.cs.pdx.edu/niagara/.
[7]
Technical characteristics for an automatic identification system using time division multiple access in the VHF maritime mobile band. International Telecommunications Union, ITU-R M.1371--3, 2007.
[8]
M. Ali and et. al. Real-time spatio-temporal analytics using microsoft streaminsight. Proc. of ACM GIS, pages 542--543, 2010.
[9]
R. S. Barga and et. al. Consistent streaming through time: A vision for event stream processing. Biennial Conf. on Innovative Data Systems Research, pages 363--374, 2007.
[10]
B. Carminati and et. al. A framework to enforce access control over data streams. ACM Trans. on Information and System Security, 13(3), 2010.
[11]
G. de Vries and M. van Someren. Clustering vessel trajectories with alignment kernels under trajectory compression. Proc. of the 2010 European Conf. on Machine learning and Knowledge Discovery in Databases, pages 296--311, 2010.
[12]
IMO. International maritime organization. http://www.imo.org/ourwork/safety/navigation/pages/ais.aspx.
[13]
S. J. Kazemitabar and et. al. Geospatial stream query processing using microsoft sql server streaminsight. Proc. of VLDB Endow., 3:1537--1540, 2010.
[14]
G. J. Knezo. Sensitive but unclassified and other federal security controls on scientific and technical information: History and current controversy. USA's Congressional Research Service, 2003.
[15]
R. O. Lane and et. al. Maritime anomaly detection and threat assessment. Proc. of the Int. Conf. on Information Fusion, pages 1--8, 2010.
[16]
W. Lindner and J. Meier. Securing the borealis data stream engine. pages 137--147, 2006.
[17]
R. V. Nehme and et. al. A security punctuation framework for enforcing access control on streaming data. Proc. of ICDE, pages 406--415, 2008.
[18]
C. Piciarelli and G. L. Foresti. On-line trajectory clustering for anomalous events detection. Pattern Recognition Letters, pages 1835--1842, 2006.

Cited By

View all
  • (2018)Maritime anomaly detection: A reviewWIREs Data Mining and Knowledge Discovery10.1002/widm.12668:5Online publication date: 25-May-2018
  • (2013)Publishing trajectories with differential privacy guaranteesProceedings of the 25th International Conference on Scientific and Statistical Database Management10.1145/2484838.2484846(1-12)Online publication date: 29-Jul-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GIS '11: Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
November 2011
559 pages
ISBN:9781450310314
DOI:10.1145/2093973

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Demonstration

Funding Sources

Conference

GIS '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 257 of 1,238 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Maritime anomaly detection: A reviewWIREs Data Mining and Knowledge Discovery10.1002/widm.12668:5Online publication date: 25-May-2018
  • (2013)Publishing trajectories with differential privacy guaranteesProceedings of the 25th International Conference on Scientific and Statistical Database Management10.1145/2484838.2484846(1-12)Online publication date: 29-Jul-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media