Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures最新文献
{"title":"Development of a robotic security vehicle for exterior environments","authors":"P. Klarer, R. M. Workhoven","doi":"10.1109/CCST.1988.75979","DOIUrl":"https://doi.org/10.1109/CCST.1988.75979","url":null,"abstract":"Sandia National Laboratories is developing a robotic vehicle capable of performing limited security functions autonomously in a structured exterior environment. Efforts to apply the navigation algorithms, originally developed for the Sandia Interior Robot, to a testbed vehicle more appropriate for an outdoor environment are described. The immediate goal is a full-scale demonstration of autonomous navigation capabilities on routine patrol and teleoperation by a human operator for alarm assessment and response. The discussion covers the vehicle itself, the command driving station, adapting the vehicle to the facility where it might be assigned and the missions that it would be expected to perform. The hardware and software are also described.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The CAIN II access-control system","authors":"R. P. Rumble, D.Y. Jong, S.M. Kluz","doi":"10.1109/CCST.1988.76001","DOIUrl":"https://doi.org/10.1109/CCST.1988.76001","url":null,"abstract":"A description is given of the access-control system that is being built at the Lawrence Livermore National Laboratory. Called the Controlled Access by Individual Number, Phase II (CAIN II) project, it is part of the Safeguards and Security Enhancements-Phase I (SSE-1) line item. Under normal circumstances, the CAIN II system operates without human intervention. The CAIN II system consists of three major subsystems: (1) the CAIN II main computer (CMC) subsystem-four DEC model 8250 VAX computers, connected in a cluster; (2) the front-end processor (FEP) subsystem-Micro VAX II computers driving communications servers; and (3) the entry control device (ECD) subsystem-the actual equipment that controls personnel access. There are four types of entry-control devices: booths, single-door portals, staffed badge-readers, and sally ports. Several hundred entry-control devices can be connected to the access-control system. Each entry-control device contains the entire list of persons permitted to enter its controlled area and can make the go/no-go decision about passage on its own.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131138725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software and hardware bypass of customer-owned pay telephones","authors":"M. W. Tobias","doi":"10.1109/CCST.1988.75992","DOIUrl":"https://doi.org/10.1109/CCST.1988.75992","url":null,"abstract":"Over 100000 private pay telephones are in operation throughout the US. Improper or inadequate hardware and software design have contributed to significant losses through bypass of internal circuitry and functions. The author summarizes the problems associated with design defects in the customer-owned coin-operated telephone. He also discusses how to prevent fraudulent loss.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134628304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication privacy: a low cost digital approach","authors":"C. House","doi":"10.1109/CCST.1988.75988","DOIUrl":"https://doi.org/10.1109/CCST.1988.75988","url":null,"abstract":"Support is demonstrated for an analog/digital system that can be scrambled while in digital form and may or may not transmit the key work for algorithm decoding. Multichannel audio and data communication is considered. In addition to digital audio and pulse code modulation concepts, frequency shift keying, frequency division multiplexing, and quadrature phase modulation are discussed. Both practical and cost aspects are considered. Commercially available integrated parts were used in the empirical work to achieve communication privacy at a low cost.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security upgrades at the Lawrence Livermore National Laboratory","authors":"E. Behrin","doi":"10.1109/CCST.1988.76000","DOIUrl":"https://doi.org/10.1109/CCST.1988.76000","url":null,"abstract":"Major upgrades to the physical security systems of Lawrence Livermore National Laboratory are in the form of two integrated multiyear projects: SSE-1 (Safeguards and Security Enhancements-Phase I) is a five-year effort that started in late 1984; the second five-year phase, SSE-2, began in 1986. SSE-1 upgrades obsolete operating systems and constructs the facilities needed to house the equipment. Its subprojects replace the existing alarm system, automate access-control functions, restructure security command and control, upgrade the security radio network, modernize nuclear materials accountability, construct two communications centers, and add perimeter-security features. SSE-2 consolidates and protects operations involving special nuclear materials in an area called the Superblock, as well as improving the lab-wide physical security system. SSE-2 subprojects add perimeter protection to the Superblock, construct processing facilities for special nuclear materials, construct an office complex with a secondary command and control center, build security training and housing facilities, and improve roads, fencing, and lighting.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of network element databases against increasing threats of intrusion via operations interfaces","authors":"R. Bhattacharyya","doi":"10.1109/CCST.1988.75989","DOIUrl":"https://doi.org/10.1109/CCST.1988.75989","url":null,"abstract":"A security strategy is presented to protect the operations database of a network element (NE) of a telecommunications network from unauthorized access and/or unauthorized transactions. With the advent of technology, and increased control of networks and service features by customers, it is expected that the NE operations database will become increasingly accessible to third-party service providers, large-business customers, and even small-business and residential customers. This, in turn, will increase the security risk to the NE database and force NE manufacturers to consider introducing features to enhance the database security. The author discusses some of these security threats and proposes the introduction of NE features that could reduct such threats.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive real-time training strategies for a trainable multi-sensor perimeter intrusion detection system","authors":"R. J. Bartek, A. Sanders","doi":"10.1109/CCST.1988.75996","DOIUrl":"https://doi.org/10.1109/CCST.1988.75996","url":null,"abstract":"This study was motivated by a need to simplify the operation of an existing multisensor perimeter intrusion-detection system, and by a step upward in processing power and storage capacity of small personal computers. The feasibility of centralizing and automating the processing was studied, and telemetry options were examined. While research is still needed to develop key algorithms, bandwidths and data rates have been checked for two processing structures and for perimeters in excess of 10 km and found to be easily within the capability of a centralized 386/1167 processing system.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127736152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}