This paper analyses the process which was employed in defining the security architecture for a latest-generation Electronic Toll Collection (ETC) system. It focuses on one fundamental operational requirement – the non-repudiation of transactional data and the evidence of travel in support of the enforcement of tolling events – and uses this to highlight the essential integration between technological capability and operational processes in delivering a secure solution.
Members-Only Content
This content is restricted to members only.
You must be logged in with an active membership to access this page.
Please click the link below to log in. If you do not have an account or your membership is inactive, you may need to register or renew it.