Access Control System of Qatar Petroleum Port – Case Study Example

Download full paperFile format: .doc, available for editing

The paper "Access Control System of Qatar Petroleum Port" is a great example of a case study on design and technology. The security of a port currently draws substantial influence from integrated access control technology systems. Indeed, drawbacks in the access control system translated to port lapses. Consequently, it is of much essence to come up with a design a reliable and efficient access control access system (Waltz, 1998). With the enforcing of a new International Ship and Port Facility Security (ISPS) code, ports are required to be compliant with the ISP's standards with respect to access control and security in ports.

Ports ought to design and thus developing access control systems with the capability of allowing their authorities to obtain a technological system adhering to the prescriptions of the law (Denning, 1999). The technologies also ought to be capable of optimizing, reducing, and controlling the boarding flows and offering such essential services as a centralized check-in service for the companies operating ships. It is thus essential to come up with automatic port access control systems that have the ability to manage goods flows, systems of security, and passengers with no comprise to the standards of security; the system should also have the ability to reduce the time of access as compared to former systems.

The new system ought to have the ability to reach the entrance bar and ticket printing opening time in less than 5 minutes. The new system for ports is also characteristic of automatic check-in functionalities-these features enable passengers to arrive directly at the boarding areas having not to pass via the ticket office (Nichols, R.K. & Lekkas, 2002).

This reduces and optimizes the vehicle traffic flows within the port. The access control system that will be designed for the petroleum port has a connection with such other systems as Ship Companies, Port Operators, Police, Sea Guard, among others. This authorizes a significant level of integration of every subject involved in the boarding processes and control procedures. This report has a scope that analyzes the design of an advanced integrated control system with the case of Qatar Petroleum Port (Garzia, 2003). The design of the new system will be discussed from installation to implementation, touching on such aspects as barriers, credentials and Readers, locking devices, software, and control and communication layout.

As a result of secrecy factors, the illustration of the access control system will be in accordance with general philosophy design, with no illustration of specific details that have the ability to compromise the security system of the port. Qatar Petroleum plays a major role in the entire cycle of the country’ s oil and gas industry. In the course of the past decades, the country exhibited growth towards emerging a global leader Liquid Natural Gas production and exportation.

It is worth noting that much of the country’ s petroleum activity takes place in Ras Laffan industrial city-the city is found northeast of Doha. The city harbors one of the leading global exporting ports of LNG and is run by Qatar Petroleum. Indeed, the Qatar Petroleum Port has a 30 million metric tons/annum capacity of exportation-it supplies destinations in the UK alongside other countries in Europe through a flee of gas container ships. Over the past years, the port city has been recording significant growth to match the pace of the ever-growing global demand for its products; indeed, most recently Qatar Petroleum completed a project harboring new office and accommodation blocks.

References

Alan J. Lipton, Hironobu Fujiyoshi, Raju S. Patil, (2006). “Moving Target Classification and Tracking from Real-time Video”.

Antonucci, E., Garzia, F. & Veca, G.M., (2002). “The automatic vehicles access control system of the historical center of Rome”, Sustainable City II, WIT Press, Southampton (UK), pp.853 861.

Atrey, P.K., Kankanhalli, M.S., Jain, R., “, (2006). A framework for information assimilation in multimedia surveillance systems”, ACM Multimedia Systems Journal.

B. Hammerli, A. Renda, (2010). Protecting critical infrastructure in the EU, Centre for European Policy Studies, Belgium, 2010.

Brunner E., Suter M., (2008). International CIIP Handbook 2008/9: An inventory of 25 national and 7 international Critical Infrastructure Protection Policies, Center for Security Studies, ETH Zurich, Switzerland.

Denning, D. E., (1999). “Information Warfare and Security”, Addison-Wesley, Boston (USA).

F. Dufaux, M. Ouaret, Y. Abdeljaoued, A. Navarro, F. Vergnenegre, T. Ebrahimi, (2006). “Privacy Enabling Technology for Video Surveillance”, Proc. SPIE 6250, 2006.

F. Dufaux, T. Ebrahimi, (2006). “Scrambling for Video Surveillance with Privacy”, Proc. IEEE Workshop on Privacy Research In Vision, New York, NY, June 2006.

Garzia, F. & Veca, G. M., (2002). “Integrated security systems for hazard prevention, management, and control in the Italian high-speed train line”, Risk Analysis III, WIT Press, Southampton (UK), pp.287-293.

Garzia, F., (2003). “The integrated safety/security system of the Accademia Nazionale dei Lincei at Corsini Palace in Rome”, Proc. of International Conference on Integrating Historic Preservation with Security, Fire Protection, Life Safety, and Building Management Systems, Rome (Italy),pp.77-99.

Garzia, F., Sammarco, E. & De Lucia, M., (2004). “The security telecommunication system of the Vatican City State”, Risk Analysis IV, WIT Press, Southampton (UK), pp.773-782.

Garzia, F., Sammarco, E., (2005). “The integrated security system of the Vatican City State”, SAFE 2005, WIT Press, Southampton (UK), pp.391-403.

Garzia, F., Sammarco, E., Cusani, R. (2007). “The integrated access control system of the Vatican City State”, SAFE 2007, WIT Press, Southampton (UK), pp.431-440.

I.Vakalis, B.Hosgood, P.Chawdry, (2006). “Biometrics for Border Security – An Overview”, Technical Report EUR 22359 EN, European Communities.

IMO (2003). , International Ship and Port Facility Security Code and SOLAS Amendments 2002, IMO Publications.

M. Theoharidou, M. Kandias, D. Gritzalis, (2012). “Securing transportation-critical infrastructures: Trends and perspectives”, in Proc. of the 7th IEEE International Conference in Global Security, Safety and Sustainability, pp. 171-178, Springer (LNICST 0099), Greece.

N. Polemi, T. Ntouskas, (2012). “Open issues and proposals in the IT security management of commercial ports: The S-Port national case”, in Proc. of the 27th IFIP International Information Security and Privacy Conference, pp. 567-572, Springer (IFIP AICT 376), Greece.

Nichols, R.K. & Lekkas, P.C., (2002). “Wireless Security: Models, Threats, and Solutions“, McGraw-Hill”, New York (USA).

PortID Consortium, “(2007). Study for the Analysis and the Conceptual Development of a European port Access Identification Card (EPAIC)”, Final Report, QINETIC/07/03289,19 Dec 2007.

Rama, K.G.S., Atrey, P.K., Singh, V.K., Ramakrishnan, K., Kankanhalli, M.S., (2006). “A-Design Methodology For Selection and Placement of Sensors in Multimedia Surveillance Systems”, The 4th ACM International Workshop on Video Surveillance and Sensor Networks, Santa Barbara, CA, USA.

Regulation (EC) No 725/2004 of the European Parliament and of the Council of 31 March 2004 on enhancing ship and port facility security, European Union law, http://eur-lex.europa.eu /en/index.htm

SYNERGASIA/S-Port project, http://s-port.unipi.gr (accessed 20 March 2013).

T. Ntouskas, N. Polemi, (2010). “A secure, collaborative environment for the security management of port information systems”, in Proc. of the 5th International Conference on the Internet and Web Applications and Services, pp. 374-379, IEEE Press, Spain.

Waltz, E., (1998). “Information Warfare – Principles and operations”, Artech House Publisher, Boston (the USA.

Yilmaz, A., Javed, O., and Shah, M. (2006). “Object Tracking: A Survey”, ACM Comput. Surv. 38, 4, Article 13 Dec

Yuhua Zhang and Yan Meng, (2007). “Adaptive Object Tracking using Particle Swarm Optimization”, Proceedings of the 2007 IEEE International Symposium on Computational Intelligence in Robotics and Automation, Jacksonville, FL, USA, June 20 23, 2007, pp 43-49.

Download full paperFile format: .doc, available for editing
Contact Us