{"title":"TUAR-a model of risk analysis in the security field","authors":"A. Bilbao","doi":"10.1109/CCST.1992.253757","DOIUrl":"https://doi.org/10.1109/CCST.1992.253757","url":null,"abstract":"The author presents a risk analysis model, called the TUAR model, specifically prepared for the security field. The TUAR model is a method based on conceptual tools developed to analyze the different types of security risks such as burglary, theft, hold-ups, sabotage, personal aggression, etc. TUAR uses several tools together, such as fault tree analysis and fuzzy set operations. The author presents the general principles of the TUAR model, briefly describes the tools used, and includes a simple example to illustrate the presentation. In the example, the risk levels in a bank branch office are studied.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inquiring system for high-resolution image materials","authors":"K. Furihata","doi":"10.1109/CCST.1992.253762","DOIUrl":"https://doi.org/10.1109/CCST.1992.253762","url":null,"abstract":"The National Police Agency of Japan (NPA) developed an inquiring system for high-resolution image materials (ISI) that can handle image information. The author explains the structure and capacity of this system and the effect that can be expected when it is fully implemented. Image information, such as photographs of suspects and the scenes of crimes, is filed and utilized at respective prefectural police headquarters (PPHs). The ISI will enable the NPA to control entry and management of such image information as well as other relevant information with its high speed data network, computers, and optical disk equipment so that every PPH will be able to make quick inquiries using nationwide photo data. Implementation of the ISI had been completed in 26 PPHs at the end of March 1992 and will completed in all PHHs by the end of March 1994.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High security tagging system for evidence marking and verification","authors":"F.J. Prokoski, R. Riedel, J. Coffin","doi":"10.1109/CCST.1992.253761","DOIUrl":"https://doi.org/10.1109/CCST.1992.253761","url":null,"abstract":"Optically encoded tags can provide highly secure, inexpensive assistance in verifying the identity and integrity of items including documents, containers, and parcels. An optically encoded tag system comprises means for producing the tag, means for affixing the tag, means for archiving the tag for future comparison, security provisions to restrict access to the archives, means for verifying the tag at a future time, security provisions to prevent duplication or removal and reapplication of the tags, management of distribution of overlays to authorized parties, and procedures to be followed when verification is successful and when it is not. Scenarios for its use in verification tagging applications, and mechanisms for production of the tags and overlays are described. The techniques developed are highly robust, in that they allow the pattern to be segmented and allow for dirt and other masking effects as well as partial defacement without loss of identity. They may be verified from unknown distances, and the verification process itself will provide distance information to facilitate lock-on for targeting purposes. Proof of principle has been demonstrated.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentinel-a technology for practical automatic monitoring of busy and complex scenes","authors":"R. Mackintosh","doi":"10.1109/CCST.1992.253736","DOIUrl":"https://doi.org/10.1109/CCST.1992.253736","url":null,"abstract":"The author reviews the problems which surveillance missions present to automation and includes examples that cause conventional systems to fail. Sentinel is an automated scene monitoring system specifically designed to overcome these problems. The technological approach used in the Sentinel system is presented, the advantages this gives and how they may best be exploited are discussed. A practical example is shown and the way that Sentinel is deployed, including the necessary setting up, is illustrated. Surveillance performance results are discussed.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121249333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High confidence personal identification by rapid video analysis of iris texture","authors":"J. Daugman","doi":"10.1109/CCST.1992.253755","DOIUrl":"https://doi.org/10.1109/CCST.1992.253755","url":null,"abstract":"The concept of using the iris of the eye as a kind of optical fingerprint for personal identification is discussed. By isolating and encoding the visible texture of the iris from a video image into a multiscale sequence of quadrature 2D Gabor coefficients, a 256-byte iris code has been developed that uniquely identifies any individual, with astronomic confidence levels. Following image analysis, the critical problem of pattern recognition is transformed essentially into a statistical test of independence on the real and imaginary parts of the complex 2D Gabor coefficients. Statistical decision theory permits rigorous execution of identification decisions from comparisons of iris codes, at the rate of 4000 per second, including computation of the confidence associated with each identification decision. Such a recognition system has been developed using a conventional zoom videocamera. In tests to date, the system has never failed to identify any enrolled individual correctly.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating scene monitoring systems: a discussion paper","authors":"N. Custance, K. Wickham, K. Sage","doi":"10.1109/CCST.1992.253737","DOIUrl":"https://doi.org/10.1109/CCST.1992.253737","url":null,"abstract":"Scene monitoring systems are finding widespread application within the security market. The dominant share of the market is held by closed circuit TV (CCTV)-based systems. Techniques for evaluating CCTV-based systems are addressed. The systems, normally using imagery from CCTV cameras as their input, can range from simple movement detection equipment to very sophisticated intelligent scene analysis devices. Thought has been given to the issues which need to be addressed when evaluating such systems, as well as the various techniques which could be used. The authors review the thoughts of those involved. The view taken in evaluating scene monitoring systems has been to work closely with the potential end users of the systems to see how the systems perform in real life settings. Real-life scenes are seen as essential to the evaluation process as they contain such a wide range of changes. The implementation of a specific evaluation is described.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128198176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security mechanisms for distributed information system in Industrial Technology Research Institute (ITRI)","authors":"K. Farn, Y.-T. Ku, S. Tseng, M.-T. Hsien","doi":"10.1109/CCST.1992.253742","DOIUrl":"https://doi.org/10.1109/CCST.1992.253742","url":null,"abstract":"A security mechanism based upon a public key cryptosystem and signature scheme, used in the ITRI distributed information system is proposed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and sensitive information integrity guarantees. An access control scheme for a distributed information system which adopts a cryptographic concept is discussed. Some techniques are presented to be used for access control mechanisms capable of capturing, enforcing, and protecting the relevant access control semantics at each network site.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new similarity measurement method for fuzzy-attribute graph matching and its application to handwritten character recognition","authors":"G. Man, J. Poon","doi":"10.1109/CCST.1992.253754","DOIUrl":"https://doi.org/10.1109/CCST.1992.253754","url":null,"abstract":"For problems of pattern recognition and classification procedures, the concept of fuzziness is usually applied when patterns are mapped into the feature space. To handle such fuzzy concepts, the authors extend the attributed graph to the fuzzy-attribute graph (FAG) by making the attributes fuzzy. The attributed graph is widely used as a straightforward representation of structural patterns. The vertices of the graph represent pattern primitives describing the pattern while the arc is the relation between these primitives. The authors give a formal definition of FAGs and introduce a new method of similarity measurement for FAGs to solve the problem of graph matching. A handwritten numeral recognizer was developed to evaluate the effectiveness of the proposed algorithm, and it gave an accuracy of 93% in terms of correct classification.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132769846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical evaluation of rapid deployment and re-deployable intrusion detection systems (RDIDS/RIDS)","authors":"A. Birch","doi":"10.1109/CCST.1992.253752","DOIUrl":"https://doi.org/10.1109/CCST.1992.253752","url":null,"abstract":"The rapid deployment and redeployable intrusion detection systems (RDIDS/RIDS) were extensively tested in 1988 at the NASA Space Center in Cape Kennedy, Florida. A brief history of the testing is given. The pulsed infrared system is integrated with a radio frequency (RF) transmitter operating in the VHF and UHF frequencies, powered by a battery backup photovoltaic energy system. The system was exposed to severe climatic changes throughout the test period. During the test period the system did not generate any false alarms. It was unaffected by high waves, high winds, small birds, leaves, or partial shielding of one sensor by foliage. However, the system did alarm when pelicans flew through the IR beam with outstretched wings perpendicular to the IR beam, covering more than 90% of the beam. A solution to this problem is described. The latest photovoltaic power system developed for use with the RDIDS and the telemetry portion of the RDIDS are outlined.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"G-core hackers a clear and present danger","authors":"R. Bhattacharyya, H. Kluepfel","doi":"10.1109/CCST.1992.253770","DOIUrl":"https://doi.org/10.1109/CCST.1992.253770","url":null,"abstract":"The authors address the increase in security risks that telecommunications carriers and service providers have been experiencing. They present, in general terms, the methods that are used by intruders to gain unauthorized access to telephone company resources. An excerpt from a hacker's bulletin board illustrates several types of damage that an intruder can inflict. The reasons for this increased vulnerability are briefly described. A holistic approach to reduce the security risk is recommended which includes a consolidated effort to establish and implement various guidelines in areas such as user awareness, physical security, and security of all the components. Several desirable security features of these components are listed to provide quick reference for managers, administrators, and auditors with security related responsibilities. These features are expected to migrate into international baseline security standards to counter the threats described.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}