Proceedings. International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Computer virology and aids 计算机病毒学与辅助
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751946
D. Shaw
{"title":"Computer virology and aids","authors":"D. Shaw","doi":"10.1109/CCST.1989.751946","DOIUrl":"https://doi.org/10.1109/CCST.1989.751946","url":null,"abstract":"Interference with computer systems by illegal ex ternal means has been known for over thirty years and is col loquially referred to as 'hacking'. A more serious interference predicted in 1984 and first identified in 1987 is the computer virus which is defined as 'malicious software' capable of self replication'. This paper summarizes the main features of know computer viruses, their characteristics, detection and elimination, together with suggestions for system protection.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115205079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing security into advanced technology systems and facilities 为先进的技术系统和设施设计安全
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751951
D. Bruckner
{"title":"Designing security into advanced technology systems and facilities","authors":"D. Bruckner","doi":"10.1109/CCST.1989.751951","DOIUrl":"https://doi.org/10.1109/CCST.1989.751951","url":null,"abstract":"This paper addresses the security systems engineering (SSE) approaches necessary to provide Advanced Technology Systems (ATS) and Facilities (ATF) with inherent security features. Particular emphasis is given to a system's internal architecture, design and operating functions so that the required security can be an integral feature of the overall system rather than added on.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122462855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated security system 综合安防系统
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751954
M. Baker, C. Eng
{"title":"Integrated security system","authors":"M. Baker, C. Eng","doi":"10.1109/CCST.1989.751954","DOIUrl":"https://doi.org/10.1109/CCST.1989.751954","url":null,"abstract":"This paper concerns the integration of Intruder, Fire, Access Control, Energy Management and other disciplines into a single combined system. Discussion centres on the concepts and goals of such a system, rather than on a practical implementation.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security communication in tunnels underground 地下隧道安全通信
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751989
J. Chiba, Y. Murakami
{"title":"Security communication in tunnels underground","authors":"J. Chiba, Y. Murakami","doi":"10.1109/CCST.1989.751989","DOIUrl":"https://doi.org/10.1109/CCST.1989.751989","url":null,"abstract":"In underground environments, communicability is vital in emergency cases such as fires, as well as in routine management operations. This study aims at establishing a basis for solving such problems.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison of centralized versus distributed architectures in biometric access control systems 生物识别访问控制系统中集中式与分布式架构的比较
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751978
E. C. Driscoll, R. Fowler
{"title":"A comparison of centralized versus distributed architectures in biometric access control systems","authors":"E. C. Driscoll, R. Fowler","doi":"10.1109/CCST.1989.751978","DOIUrl":"https://doi.org/10.1109/CCST.1989.751978","url":null,"abstract":"The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assumptions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \"biometrics\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is more appropriate. The need to control access to physical facilities or computer databases is increasing each year. Identity verification is implicit in this control, i.e. one must be able to confirm the identity of the individual at the door before access can be granted. In the past, automated identity verification was difficult. Early access control systems either relied on manual means of identity verification (e.g. a security guard recognizing each face), or they simplified the problem to verifying the identity of some physical object (e.g. an access card) rather than the individual. The first technique was expensive. The second carried with it the assump tions that this object was always attached to its owner. This was a poor assumption, and the loss or sharing of access cards represents the biggest weakness in access control systems today. In the last decade, the technology has become available to allow true verification of individual identities. This technology is based on a field called \"biometrics\", in which distinctive biological features are measured for each individual. These features can later be checked against the individual requesting access, and that individual's identity can be accurately confirmed. This paper will introduce and compare biometric access control systems based on centralized or distributed architectures. It will compare these two architectural approaches, outline their relative strengths and weaknesses, and discuss applications where one or the other is","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Buried optical fibre pressure sensor for intrusion detection 用于入侵检测的埋地式光纤压力传感器
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751971
J. Hazan, M. Steers, G. Delmas, J. Nagel
{"title":"Buried optical fibre pressure sensor for intrusion detection","authors":"J. Hazan, M. Steers, G. Delmas, J. Nagel","doi":"10.1109/CCST.1989.751971","DOIUrl":"https://doi.org/10.1109/CCST.1989.751971","url":null,"abstract":"Optical fibre pressure sensors offer a number of interesting properties for intrusion detection : active sensor, unsensitive to E.-M.I., analog response, potential low cost. We have tested several detection principles bending loss, speckle pattern variation, polarization changes in monomode fibres. For buried sensors, the latter, with ideal fibres, offer a good compromise between the advantages and drawbacks of the two other methods. Actual fibres however are subject to random polarization perturbations which can lead to important signal fading. The effects of these perturbations are analyzed. Extensive investigations have led to a new fibre conditioning and a new relatively simple (electro) optical configuration which should take care of most of the perturbations and, in the same time, appreciably improve the sensitivity (by a factor 10 to 100).","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of digital mobile radio facsimile 数字移动无线电传真的发展
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751990
Y. Imai
{"title":"Development of digital mobile radio facsimile","authors":"Y. Imai","doi":"10.1109/CCST.1989.751990","DOIUrl":"https://doi.org/10.1109/CCST.1989.751990","url":null,"abstract":"Fast and accurate image transmission methods are needed for transmitting non-voice information such as maps and handwritten information to officers in patrol cars. The National Police Agency of Japan has developed a digital mobile radio facsimile machine capable of transmitting image information using digital radio. Starting in 1986, the facsimile machines have beer) installed in several Prefectural Police Headquarters. The facsimile machine is characterized by adopting the developed picture signal transmission method called pseudo random block interleave as countermeasures for the burst errors which occur during mobile radio communications due to fading. The facsimile machine can send the picture elements at random and diffuse burst errors by using the pseudo-random block interleave method. This is also good for data security. Application of this method enables transmission and reception of good image information using a mobile radio with a bit error rate of about 10/sup -2/. This outlines the transmission method of the facsimile machine and its evaluation test results.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124217644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluaffion of microphonic cable sensors for chain link security fencing 链式安全围栏用传声器电缆传感器的评价
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751981
M. Horner
{"title":"Evaluaffion of microphonic cable sensors for chain link security fencing","authors":"M. Horner","doi":"10.1109/CCST.1989.751981","DOIUrl":"https://doi.org/10.1109/CCST.1989.751981","url":null,"abstract":"Abstract. Chain link anti-intruder fencing (BS 1722 Pt IO)is widely used, despite its limited effectiveness against a determined attacker. The level of protection offered would be greater if a PIDS (Perimeter Intruder Detection System) was available that would reliably detect an intruder without a high false alarm rate. This paper describes the evaluation of four different microphonic cable PIDS by the Scientific Research and Development Branch (SRDB) of the Home office. The Systems evaluated were; FPS-2 PDSIOO, AIDA 2000 and Guardwire (GW375, GW390).","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computer virus prevention and containment on mainframes 大型机上的计算机病毒预防和遏制
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751948
G.M. Al-Dossary
{"title":"Computer virus prevention and containment on mainframes","authors":"G.M. Al-Dossary","doi":"10.1109/CCST.1989.751948","DOIUrl":"https://doi.org/10.1109/CCST.1989.751948","url":null,"abstract":"A computer virus can be a vicious and insidious form of code. It has the ability to replicate itself, to attach itself to othercode, to spread through a computer system or network, and often to initiate a harmful series of instructions when a \"trigger\"point is reached. Viruses can have a major impact on productivity because of the steadily increasing dependence of industrial, business, and government functions on the availability and integrity of data processing systems. Al though mainframe computers have been the target of virus attacks less often than microcomputers up until now, there is no room for complacency when the stakes are so high. Tne novelty, the technical nature, and the tendency to romanticize this phenomenon, have resulted in a \"black box\" syndrome (\"I don't know what's going on in there.\") and a feeling of overwhelming impotence in the business community. The risk of viruses can be reduced. One approach is to examine the constituentpartsfrom which a virus is composed, and to design a, comprehensive defense which reckons with each of these parts. The protection chain will only be as strong as its weakest link. the author of this paper suggests a classification scheme which is useful in understanding the components of a virus and useful methods for maintaining the integrity of a computer system. This paper outlines basic prevention, detection, and cor rection techniques which are available today to reduce the threat of damages caused by viruses. These include software vaccines\" or filters; encryption, access controlsoftware (eg. RACF, ACF2, and Top Secret); \"test-to-production\" con trol procedures; back-up and recovery procedures; person nel selection and review controls; and physical access control. The concepts presented in this paper conform to the \"Frusted Computer System Evaluation Criteria\" developed by the United States Computer Security Center and use examples from major published virus incidents to illustrate the notice of control weaknesses, The paper concludes that no working computer system is impregnable but that much can be done by industry to make most computer systems less inviting to attacks from viruses. A bibliography is included for further study.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intrusion detection: an application of expert systems to computer security 入侵检测:专家系统在计算机安全中的应用
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751961
D. S. Bauer, F.R. Eichelman, R.M. Herrera, A.E. Irgon
{"title":"Intrusion detection: an application of expert systems to computer security","authors":"D. S. Bauer, F.R. Eichelman, R.M. Herrera, A.E. Irgon","doi":"10.1109/CCST.1989.751961","DOIUrl":"https://doi.org/10.1109/CCST.1989.751961","url":null,"abstract":"Audit trails have long been an important component of a comprehensive computer security program. Unfortunately, the collected audit data is often not regularly analyzed and, in many cases, never even reviewed unless computer abuse is suspected. Many computer intrusions could very likely be discovered quickly if computer system audit trails were inspected on a regular basis by experts trained to recognize intrusive behavior. Intrusion Detection is a new research area in computer security focusing on developing the technology to detect intruders on computer systems in near real-time through the use of software systems that automatically analyze computer system audit trails. This paper presents an overview of current intrusion detection research and technology, The Network Intrusion Detection Expert System (NIDX), a software system recently prototyped by Bellcore, is described as an example of an Intrusion Detection System (IDS).","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信