F. R. Williamson, R. Brooks, E. Greneker, N. Currie, J. Williamson, M. McGee
{"title":"Radar as part of a netted surveillance system-a problem revisited","authors":"F. R. Williamson, R. Brooks, E. Greneker, N. Currie, J. Williamson, M. McGee","doi":"10.1109/CCST.1992.253748","DOIUrl":"https://doi.org/10.1109/CCST.1992.253748","url":null,"abstract":"The authors discuss the use of radar as a security surveillance sensor and present methods for integrating this sensor technology into netted sensor systems. The capabilities and limitations of radar sensors are discussed, and several surveillance scenarios are presented. A general architecture for netting multiple radar sensors together and for netting radar sensors with more conventional surveillance units is discussed. These netting concepts are useful for large or small systems in both military and industrial applications. Radar system configurations for fixed base security applications are described. Signal processing algorithms that appear practical with the increased performance of today's computer technology are presented.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123968729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An object-oriented security model for office environments","authors":"S. Castano, P. Samarati","doi":"10.1109/CCST.1992.253744","DOIUrl":"https://doi.org/10.1109/CCST.1992.253744","url":null,"abstract":"The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are specified according to roles. The role played by a user at a specific time identifies the working environment of the user and hence the operations that he/she can execute on documents. In modeling roles and documents the graph formalism and the inheritance mechanism are used. The use of an object-oriented programming language in the system realization allows an easy representation of the characteristics of the model.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115883711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensitivity enhancement in interferometric fiber sensors by using the optical Kerr effect","authors":"C. Hsia","doi":"10.1109/CCST.1992.253750","DOIUrl":"https://doi.org/10.1109/CCST.1992.253750","url":null,"abstract":"Sensitivity enhancement in fiber interferometric sensors was achieved by connecting a balanced nonlinear Mach-Zehnder fiber interferometer to the sensing interferometer. Taking advantage of the phase-sensitive nature of this nonlinear interferometer, the improvement of the sensitivity for each output of the interferometer was found to be proportional to the nonlinear phase shift due to the optical Kerr effect, induced by the total power in the fiber. Since high power is needed to induce a large nonlinear phase shift, it is assumed that a high peak-power pulse train is used, with a pulse repetition rate greater than the minimum sampling frequency. This is required by the Nyquist criterion for the reconstruction of the sensed signal. The theory is also extended to remote fiber sensing systems.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129129974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CLASP: a computerised aid to cost effective perimeter security","authors":"C. Tarr","doi":"10.1109/CCST.1992.253741","DOIUrl":"https://doi.org/10.1109/CCST.1992.253741","url":null,"abstract":"The problem of providing cost-effective perimeter security for prisons was addressed by the development of a mathematical model to evaluate a set of performance measures. This model was designed to evaluate perimeter security, starting from the assumption that an escaped person has reached the perimeter, and calculating the chances of preventing a subsequent escape. The author describes the evolution from the initial formulation of a model, to an operational computer software package the current version of which is known as CLASP (computerized layout analysis for secure perimeters). Conclusions about the future prospects of using a computer package for perimeter security decision making are drawn from this experience.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127434445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}