A New Approach to Assessing Road User Charges

This book examines methods of assessing vehicle charges for their use of roads. Chapter headings include the following: 1. Introduction; 2. A Data System to Ensure User Privacy; 3. Global Positioning Systems (GPS) Accuracy Issues; 4. Optional Data Gathering; 5. System Robustness, Security, and Protection; 6. Data Structure, Storage, and Uploading; 7. Conclusions and Recommendations.

[1]  Jim Gray,et al.  Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.

[2]  M. A. Carlisle Constructing Symmetric Ciphers Using the CAST Design Procedure, Designs , 1997 .

[3]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[4]  Alberto Leon-Garcia,et al.  Communication Networks , 2000 .

[5]  J. March FEDERAL HIGHWAY COST ALLOCATION STUDY , 1998 .

[6]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[7]  R. Kitamura,et al.  Traveler Destination Choice Behavior: Effects of Time of Day, Activity Duration, and Home Location , 1998 .

[8]  D. Commerce Statistical abstract of the United States , 1978 .

[9]  Roger M. Needham,et al.  Denial of service , 1993, CCS '93.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Brian Randell,et al.  Operating Systems, An Advanced Course , 1978 .

[12]  C. Winston,et al.  Road Work: A New Highway Pricing and Investment Policy , 1989 .

[13]  Dorothy Glancy PRIVACY AND INTELLIGENT TRANSPORTATION TECHNOLOGY , 1995 .

[14]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  Jiawei Han,et al.  Discovery of Multiple-Level Association Rules from Large Databases , 1995, VLDB.

[17]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[18]  J. K. McNulty The Right to be Left Alone. , 1972 .

[19]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[20]  L. H.,et al.  Communication Networks , 1936, Nature.

[21]  Michael Shaw Modernization of the Global Positioning System , 2000 .

[22]  Mohamad K. Hasan,et al.  Application of Simultaneous and Sequential Transportation Network Equilibrium Models to Riyadh, Saudi Arabia , 1998 .

[23]  Carlisle M. Adams,et al.  Constructing Symmetric Ciphers Using the CAST Design Procedure , 1997, Des. Codes Cryptogr..

[24]  D. Powell,et al.  Land-vehicle navigation using GPS , 1999, Proc. IEEE.

[25]  NEW APPROACHES TO TRAVEL FORECASTING MODELS. A SYNTHESIS OF FOUR RESEARCH PROPOSALS , 1994 .

[26]  Field Strength Measurements of DGPS and FAA Beacons in the 285- to 325-kHz Band , 1997 .

[27]  A E Pisarski,et al.  NATIONAL TRANSPORTATION STATISTICS , 2000 .

[28]  David J. Forkenbrock,et al.  EXTERNAL COSTS OF TRUCK AND RAIL FREIGHT TRANSPORTATION , 1998 .

[29]  Stacy Cagle Davis Transportation Energy Data Book (Edition 20) , 2000 .

[30]  A. Gutmann FREEDOM OF ASSOCIATION: , 2020, Freedom of Association.

[31]  Charles Cresson Wood,et al.  Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.