Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Technical access control systems. The development of a corporate security strategy 技术访问控制系统。公司安全策略的发展
C. Stretton
{"title":"Technical access control systems. The development of a corporate security strategy","authors":"C. Stretton","doi":"10.1109/CCST.1997.626238","DOIUrl":"https://doi.org/10.1109/CCST.1997.626238","url":null,"abstract":"This paper examines the development by the UK Ministry of Defence (MOD) of a Corporate Security Strategy for the gradual procurement of Technical Access Control Systems (TACS) within its Defence Estate. Some of the main tenets of the Strategy included the production of comprehensive Statements of Requirement, the application of risk management techniques, the development of pilot/model installations and the introduction of template designs based upon the size and functionality of its establishments. In addition, the MOD recognized the importance of specialist site-specific surveys and of developing an effective procurement route. There was a need for centralised control and coordination of the overall programme and of the specific technology, installation and audit processes. As a result, the development of the strategy for the installation of TACS has produced an over-arching model for the introduction of other security technologies within MOD.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122111281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Large campus communication center and security system integration, consolidation, and re-engineering 大型校园通信中心和安防系统集成、整合、再工程
R. Carback
{"title":"Large campus communication center and security system integration, consolidation, and re-engineering","authors":"R. Carback","doi":"10.1109/CCST.1997.626257","DOIUrl":"https://doi.org/10.1109/CCST.1997.626257","url":null,"abstract":"The continuing requirement for corporate right sizing demand's businesses ensure their security structure minimizes costs while maximizing efficiency and effectiveness. In large campus organizations with a security protective force and multiple security systems, the advance of security systems technologies and telecommunication technologies enable massive reduction in the manpower required to monitor the command and control of the systems through the consolidation of resources, the automation and integration of the security systems, and process re-engineering. This paper presents a business case and user experience in the development and implementation of a centralized Communication Center (ComCenter) within a large geographically dispersed multiple building multi-campus organization. The centralized ComCenter replaces three large geographically located Communication Centers and several small monitoring locations throughout the metropolitan area. Through process reengineering, the protective force required to monitor the process is reduced in half, a decrease of more than forty-nine (49) man years of effort. The consolidation replaced multiple independent intrusion detection systems with a single system. The ComCenter has three identical integrated operator consoles with access to the Intrusion Detection System, Closed Circuit Television (CCTV) system, Emergency Services (911), Radio Communications, Access Control, and National Crime Information Center information. The command and control of each of the security systems is provided within a computing platform using graphical user interfaces. The ComCenter process monitors greater than five (5) million square feet of corporate space and facilities using greater than 4,000 individual intrusion detection devices and greater than 300 CCTV cameras. The CCTV camera monitoring and control is provided on the operator console screen and allows forwarding via a worldwide video teleconferencing system. The effects of the large scale re-engineering and consolidation effort upon the vendors, the security force, and the organization's security infrastructure shall be presented.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116858254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Progress towards a public key infrastructure in Australia 澳大利亚公钥基础设施建设的进展
J. Rogers
{"title":"Progress towards a public key infrastructure in Australia","authors":"J. Rogers","doi":"10.1109/CCST.1997.626251","DOIUrl":"https://doi.org/10.1109/CCST.1997.626251","url":null,"abstract":"The real and anticipated growth of electronic commerce has led to a strong demand for authentication, non-repudiation, and confidentiality services relying on public key technology. Both public and private sectors in Australia appreciate the need and are moving towards satisfying it.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129469765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operational deployment of explosives detection equipment during the 1996 Olympics 一九九六年奥运会期间爆炸物探测设备的部署
P. Jankowski, E.M. Jappinga, E. Butler
{"title":"Operational deployment of explosives detection equipment during the 1996 Olympics","authors":"P. Jankowski, E.M. Jappinga, E. Butler","doi":"10.1109/CCST.1997.626265","DOIUrl":"https://doi.org/10.1109/CCST.1997.626265","url":null,"abstract":"The Federal Aviation Administration deployed explosives detection equipment at key U.S. airports during the 1996 Summer Olympics. A description is given of the on-site preparations, deployment issues, locations, and the explosives detection equipment used. Results of the deployment, including data on the performance of the various explosives detection machines, are presented. This project involved the cooperative effort of the William J. Hughes Technical Center, the Office of Civil Aviation Security in Washington, D.C., and Delta Airlines. Recommendations with respect to future U.S. efforts are briefly reviewed.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124806770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sensitivity variations in linear microphonic cables 线性传声器电缆的灵敏度变化
G. Leach, M. Horner
{"title":"Sensitivity variations in linear microphonic cables","authors":"G. Leach, M. Horner","doi":"10.1109/CCST.1997.626234","DOIUrl":"https://doi.org/10.1109/CCST.1997.626234","url":null,"abstract":"Linear microphonic cables are used as the sensor for many Perimeter Intrusion Detection Systems (PIDS). These cables transform vibrational energy into electrical energy which is then analysed to detect an intrusion attempt. Usually the cables are attached to a fence to sense the vibrations generated by cutting through or climbing over the fence fabric. This paper will not refer to the application where microphonic cables are buried in the ground. It is important that the response from microphonic cables is uniform. Manufacturers of cables often stress the linearity of response of their cables (in terms of variation along the cable's length.) Any areas of above-average sensitivity will lead to a propensity to false alarms. Conversely, any stretches which have below-average sensitivity will be more susceptible to being defeated. Although cable manufacturers say that their products are linear along their length, some anomalous, unexpected results are found once the cable is attached to a welded-mesh fence and the response is tested. If physical impacts are made repeatedly, in exactly the same place, using a \"standard\" impact device, then the electrical response generated seems to vary at that point by only around 5%. This implies that the standard impact device is reasonably repeatable. However, if the response is tested along a zone then the variation is much greater. This variation has always been seen, to some degree, when microphonic cables, of all types, are attached to fences. The variation is the subject of the paper. The variation seems to be relatively random, with only a little correlation in the response between adjacent fence bays. Although it seems unlikely that an attacker would be able to take advantage of the variation, it seems that it will still lead to difficulties in obtaining optimum performance from the system. If the variation could be eliminated then presumably some false alarms caused by the bays that are oversensitive could be eliminated, and some of the missed detections in the bays, that are under-sensitive could be captured.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116728854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On-line Chinese signature verification using voting scheme 使用投票方案的在线中文签名验证
N. Cheng, K. Liu, Kun-chi Cheng, C. Tseng, Bor-Shenn Jeng
{"title":"On-line Chinese signature verification using voting scheme","authors":"N. Cheng, K. Liu, Kun-chi Cheng, C. Tseng, Bor-Shenn Jeng","doi":"10.1109/CCST.1997.626252","DOIUrl":"https://doi.org/10.1109/CCST.1997.626252","url":null,"abstract":"We present a system for online Chinese signature verification which is based on the voting result of nine verification experts. First, we briefly describe the individual verification experts. Then, a voting method for expert combination is discussed. Finally, the performance of the combination is demonstrated in several practical experiments which show a high success rate of verification.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124420198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ballistics identification using line-scan imaging techniques 使用线扫描成像技术的弹道识别
A. Zographos, M. Robinson, Jpo Evans, C. Smith
{"title":"Ballistics identification using line-scan imaging techniques","authors":"A. Zographos, M. Robinson, Jpo Evans, C. Smith","doi":"10.1109/CCST.1997.626243","DOIUrl":"https://doi.org/10.1109/CCST.1997.626243","url":null,"abstract":"A new line-scan imaging technique, well-suited to the inspection of ballistics specimens, is presented. The proposed system addresses a number of problems associated with the imaging of cartridge cases when conventional inspection techniques are used. This particular paper deals exclusively with imaging of the cylindrical surface of cartridge cases. Imaging of the firing pin marks on the end of the case is not considered. Results obtained so far from a prototype system are presented. It should be noted that this technique is still very much in its experimental phase and that as yet it has not been fully investigated for this forensic ballistics application.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124316626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Sensor for prediction of large seismic waves 用于预测大地震波的传感器
J. Chiba, Y. Nemoto
{"title":"Sensor for prediction of large seismic waves","authors":"J. Chiba, Y. Nemoto","doi":"10.1109/CCST.1997.626263","DOIUrl":"https://doi.org/10.1109/CCST.1997.626263","url":null,"abstract":"This paper outlines the noise isolation system of an optical interferometric gravitational field sensor for prediction of large seismic waves. This report was written in regard, especially, to vibration noise.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"39 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AMETHYST: automatic alarm assessment: becoming a reality 紫晶:自动报警评估:成为现实
M. Horner, K. Sage, G. Leach
{"title":"AMETHYST: automatic alarm assessment: becoming a reality","authors":"M. Horner, K. Sage, G. Leach","doi":"10.1109/CCST.1997.626244","DOIUrl":"https://doi.org/10.1109/CCST.1997.626244","url":null,"abstract":"The aim of the AMETHYST (AutoMatic Event auTHentication SYSTems) project is to encourage the development of a high performance perimeter detection system which combines Video Motion Detection (VMD) technology with another type of Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS alarms and pass to an operator only those alarms which are likely to be caused by an intruder. It will, therefore, filter out alarms that are not likely to have a human cause. A previous paper explaining and exploring the AMETHYST concept was presented at the 1995 Carnahan conference. Since then PSDB has produced a single channel AMETHYST demonstrator and placed a contract for the development of an 8 channel prototype AMETHYST system. This updated paper gives details of the hardware and software used with these two systems. Also described is PSDB's approach to the development of AMETHYST's automatic assessment algorithms. These will combine current expertise from Video Motion Detection (VMD) and Intelligent Scene Monitoring (ISM) systems with the unique AMETHYST approach. AMETHYST analyses picture sequences from before and after an alarm instead of continuously analysing live video. Sequences are provided by a Loop Framestore, either connected to or part of the AMETHYST system. The algorithms will be assessed and developed using PSDB's growing collection of over 150 alarm sequences.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121068095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Explosives detection using an ion mobility spectrometer for airport security 机场安检用离子迁移谱仪检测爆炸物
D. Martinak, A. Rudolph
{"title":"Explosives detection using an ion mobility spectrometer for airport security","authors":"D. Martinak, A. Rudolph","doi":"10.1109/CCST.1997.626268","DOIUrl":"https://doi.org/10.1109/CCST.1997.626268","url":null,"abstract":"The Barringer IONSCAN Model 400, an ion mobility spectrometer, is used extensively at airports around the world for the detection of traces of explosives on carry-on luggage, hold luggage, mail and freight. It enables the operator to quickly screen suspicious objects for the presence of explosives residues on their surfaces.","PeriodicalId":188436,"journal":{"name":"Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信