By Topic

Airport information systems security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Wilson, D.L. ; Transp. Security Res. & Dev. Lab., US Fed. Aviation Adm., Atlantic City, NJ, USA

Airports are unique as no two airports are designed the same and, while each is a single facility, each is occupied by many different tenants who provide many different services. Each service may include one or more information systems, both automated and manual, running independently from all others. Because of high visibility events such as the bombing of Pan American Flight 103 in 1988, the explosion of TWA Flight 800 in 1996, and the most recent catastrophic events of September 11, 2001, increased security measures have been put in place to protect the flying public from terrorists. The need to share and exchange information effectively and in a timely manner between airport services and systems, with other airport facilities, outside organizations and government agencies, becomes greater each day. The increased requirements defined by previous policy, threat, vulnerability, and risk assessments can be used to derive security services for NAS Air Traffic Control (ATC) operations, as well as Airport Facility (AF) operations. However, conventional solutions may not be suited to the unique needs of an airport environment and may be operationally unacceptable in some cases. This discusses some of the ways that information systems security can help ensure that key security services, including access control and authentication, are available and implementable in all systems as needed in these unique airport environments.

Published in:

Aerospace and Electronic Systems Magazine, IEEE  (Volume:18 ,  Issue: 4 )