ENC Protection Schemes: Central Technology and Policy Issues
Abstract
Several countries have taken steps to protect copyright data, some using judicial means and others implementing protection systems. Some Hydrographic Offices (HOs) feel that ENCs in particular, need to be protected from piracy and/or deliberate tampering. These issues are not unique to ENC (Electronic Navigational Chart) distribution but form a basic part of e-commerce infrastructure. A modern public key infrastructure system addresses the needs of data authentication, data security and non-repudiation. There are both technology and policy issues when one considers a protection system. The implementation of a tight security system along the entire distribution chain is necessary to make the system effective. Despite modern advances in encryption technology, there are some major impediments to achieving the goals of a security system. The complexities of key management and the acceptance of the user community are two of these. There is also the ethical issue of denying a ship access to ENCs once the license period has ended. The ship may have no other chart information on board. PRIMAR's Security System is currently gathering important operational experience in operating a protection system.Downloads
Published
How to Cite
Issue
Section
License
Copyright
Any permission needed to incorporate material published elsewhere is the responsibility of the authors and it will be assumed that such permission has been maintained.
Authors should also bear the following points in mind:
- The title should be concise and reflect the subject matter
- Long passages of text should be avoided by the appropriate use of sub-titles
- References, which should include only publications cited, should be referenced in the text, thus (Smith, 1988), and be listed alphabetically in the Reference section conforming to the Harvard style. Some typical examples follow:
(i) References from Journals:
Anders, F.J. and Byrnes, M.R.(1991). “Accuracy of shoreline change rates as determined from maps and aerial photographs”, Shore and Beach, 59, pp. 17-26.
(ii) References from Books:
Foley, J.D., van Dam, A., Feiner, S. K. and Hughes, J.F. (1990), Computer Graphics – Principles and Practice, 2nd ed., Addison-Wesley, Reading, MA.
(iii) References from the technical material or research literature:
Smith, A. (1988). Colour photomapping. Report NRC-01-512. National Research Centre. Ottawa, Canada.
(iv) References from a web site:
desJardins, M. (2005). How to succeed in postgraduate study, Applied Ecology Research Group, University of Canberra, viewed 26 April 2009, http://aerg.canberra.edu.au/jardins.t.htm.
Please note that articles will be returned to Authors who do not conform to the IHR referencing policy.
Certain articles, especially those dealing with historical aspects, may well have to quote unpublished, archival or 'cumbersome' material, some of which may require further explanation in note form. In such cases referred material can be cited using numbered superscripts in the text and the list of references thus replaced by a section headed 'Notes' in which explanation of the superscripts is given. Material which has been consulted but not specifically referred to in the text can be included in a separate 'Bibliography'.
Please note that references will not be checked by the Editor and the responsibility for the accuracy rests solely with the author(s).