Proceedings. International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Conference and meetings safety-security technology 会议安全-安全技术
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751996
D. Reilly, L. Usher
{"title":"Conference and meetings safety-security technology","authors":"D. Reilly, L. Usher","doi":"10.1109/CCST.1989.751996","DOIUrl":"https://doi.org/10.1109/CCST.1989.751996","url":null,"abstract":"The UK Government owned Queen Elizabeth II Conference Centre in London is possibly the first conference centre in the world (certainly the first in the United Kingdom) which had security and safety as a fundamental, and large part of the original architect's brief. Spare conference capacity is marketed within the conference industry to commercial clients who are subject to the same security regime as government users. This paper briefly outlines the underlying security philosophy within the conference centre; the physical and systems approach, and how the building and systems work towards achieving security aims. The authors are particularly concerned at the impact the security systems have had on people. They touch upon the perceptions of the operators and try to analyse those of the user. Systems have had to be modifed to make them more flexible, but people's attitudes are not so malleable. How can we change our attitudes without reducing our security awareness, and how can we modify people's attitudes to our, operation?","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114337537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis procediure of perimeter protection systems -the tdci vector 周界保护系统分析程序tdci矢量
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751984
A. Bilbao, G. Cruz, G. Herrero
{"title":"Analysis procediure of perimeter protection systems -the tdci vector","authors":"A. Bilbao, G. Cruz, G. Herrero","doi":"10.1109/CCST.1989.751984","DOIUrl":"https://doi.org/10.1109/CCST.1989.751984","url":null,"abstract":"The analysis procedure proposed is a comparative method for testing the effectiveness of Intrusion Protection Systems of enclosures in general. This method allows to quantify the Systems, according to five parameters, in order to obtain a vector, or a numerical profile, which allows to measure the effectiveness of the Intrusion Protection Systems from different points of view. These points of view are: the effectiveness of the phisic barriers in retarding the intruderaction (T parameter), the effectiveness of the intrusion detection (D parameter), the effectiveness in the taking of decisions and general control (C parameter), and the effectiveness of response of the external and internal intervention forces (11 and 12 parameters).","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125586287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The electrified fence as a component of a physical protection system 电气化围栏作为物理防护系统的一个组成部分
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751985
B.W. Barnos
{"title":"The electrified fence as a component of a physical protection system","authors":"B.W. Barnos","doi":"10.1109/CCST.1989.751985","DOIUrl":"https://doi.org/10.1109/CCST.1989.751985","url":null,"abstract":"The concept of using electrified barriers or fences for security reasons has been employed for many years. However, today's electrified fences bear little resemblance to the crude, rudimentary fences of yester-year. Modern fences make use of electronic circuitry to provide detection capabilities, and on long lengths include microprocessors to determine the point of intrusion. In the event of a power failure, an electrified fence can be either switched automatically to an inverter mode, enabling it to continue to act as an \"aggressive barrier\", or it can be switched to what is termed the self-guard mode of operation, whereby it acts as a low volt intrusion detection system. This paper discusses the effects of electrical current on the human body and looks at the physical and technical aspects of electrified fence systems, the application of such fences and the operation of these fence systems with regard to the physical protection of an area and the safety of site personnel and the general public.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Speaker identity verification over telephone lines: where we are and where we are going 通过电话线验证说话人的身份:我们在哪里,我们要去哪里
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751976
T. Feustel, G. Velius
{"title":"Speaker identity verification over telephone lines: where we are and where we are going","authors":"T. Feustel, G. Velius","doi":"10.1109/CCST.1989.751976","DOIUrl":"https://doi.org/10.1109/CCST.1989.751976","url":null,"abstract":"The ability to verify the identity of a speaker by analyzing speech, or Speaker Identity Verification (SIV), is an attractive means of providing security in the telephone network. As with other biometric security techniques, SIV uses a quality inherent in the user being verified, rather than a possession (e.g. badge) or piece of knowledge (e.g. password). SIV has a further advantage since it does not require elaborate customer premises equipment: only a telephone is needed. We will discuss potential applications of voice-based security and present accuracy data from a series of evaluative experiments with a Bellcore developed verifier. In addition, we will offer suggestions on how verification performance might be further improved, based on data collected using human listeners. Finally, although SIV system performance is quite good, there remain sonic difficult problems. Foremost among these is that individuals' voices are known to. change over time in ways that are poorly understood. Until more is known of the causes behind such changes, they must be acknowledged and dealt with in any potential application. We will discuss empirical and theoretical considerations in template management and criterion determination, particularly as they relate to changes that occur over time.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Is It Possible To Reduce False Alarms? 是否有可能减少误报?
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751950
W. J. Friedl
{"title":"Is It Possible To Reduce False Alarms?","authors":"W. J. Friedl","doi":"10.1109/CCST.1989.751950","DOIUrl":"https://doi.org/10.1109/CCST.1989.751950","url":null,"abstract":"There is no general definition for false alarms. This is one reason why statistics about false alarms from government sources or from other institutions are neither uniform nor significant. If people observe some fundamental principles and practice them consistently, the large number of false alarms from alarm installations could be reduced considerably. It is of decisive significance that all points of alarm installations are observed with the same care according to the theory of probabilities. A further problem is that a high probability of burglar recognition and a low false alarm rate are contradictory goals.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A rule-based object-oriented model for security monitoring and control 用于安全监视和控制的基于规则的面向对象模型
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751955
J. Smart
{"title":"A rule-based object-oriented model for security monitoring and control","authors":"J. Smart","doi":"10.1109/CCST.1989.751955","DOIUrl":"https://doi.org/10.1109/CCST.1989.751955","url":null,"abstract":"A new model for security control and monitoring systems can be effectively applied to a variety of security environments. Built on rule-based and object-oriented design paradigms, this model incorporates such functions as intrusion detection, access control, surveillance, and assessment. Recent developments of the Security Console Project at Lawrence Livermore National Laboratory are presented to illustrate the key concepts of the model.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of state analysis technology to surveillance systems 状态分析技术在监控系统中的应用
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751964
J. Mott, G. D. Wilson
{"title":"Application of state analysis technology to surveillance systems","authors":"J. Mott, G. D. Wilson","doi":"10.1109/CCST.1989.751964","DOIUrl":"https://doi.org/10.1109/CCST.1989.751964","url":null,"abstract":"Security systems, in terms of sensor measurements supplied to a computer data acquisition system, are functionally equivalent to a multitude of other process monitoring systems and, therefore, may be considered part of a generic class of surveillance systems. Characteristics of this generic class are that repeatable system states exist and that many of the system input signals are correlated. A proprietary mathematical technique which can learn from previous examples of system operation and monitor the consistency of current system operation has been developed and implemented in very efficient robust software and successfully applied to a variety of real surveillance systems. The mathematics and software together are referred to as the System State Analyzer (SSA), and have demonstrated an ability to detect faults in individual sensors, to separate false alarms from true events, and to provide accurate synthetic variables for a degraded system. The SSA has the potential to significantly enhance the effectivity of computer based security surveillance systems.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operations security: the missing link 操作安全:缺失的一环
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751962
D. B. Nickell
{"title":"Operations security: the missing link","authors":"D. B. Nickell","doi":"10.1109/CCST.1989.751962","DOIUrl":"https://doi.org/10.1109/CCST.1989.751962","url":null,"abstract":"Operations Security (OPSEC) comprises a rational approach, complementary to physical, personnel, and information security disciplines, to the identification and protection of critically important technology and information. OPSEC incorporates elements of operations and decision analysis, and draws on the skills of intelligence and security specialists to provide managers with a realistic basis for directing security activities. OPSEC is concerned with identifying and protecting information which adversaries could otherwise exploit to the agency or corporate detriment. For the first time in literature, we describe the means to quantify and evaluate the effectiveness of an OPSEC system and introduce the concept of a \"window of ambiguity.\" Through this approach we show that the higher the degree of uncertainty about the validity of available information, the more effective the OPSEC program. OPSEC is unique in that it places the responsibility for critical security decisions firmly in the hands of senior management, arming them with the information they need to make those decisions and the techniques essential to implementing them. OPSEC thus represents the missing link among management's objectives, a complex physical and information security system, and a totally effective, integrated security program.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132257157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security personnel screening 安检人员检查
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.752000
E. Amsel, T. Amsel
{"title":"Security personnel screening","authors":"E. Amsel, T. Amsel","doi":"10.1109/CCST.1989.752000","DOIUrl":"https://doi.org/10.1109/CCST.1989.752000","url":null,"abstract":"Honesty is the key word, in the process of hiring employees. It's important in any business, it's critical in the security business. The damage a dishonest employee can create is irreversable, and it's the night mare of the security chief. Some examples: guards that let unauthorised personnel into the plant facilities, which in turn steal information and/or products,A CCTV controller with a drugs problem; Employees who trade their employers trade secrets, and so on. Because of all these problems,the security business should screen it's applicants very thoroughly, to prevent such cases. The process of security screening is made up of two elements. The first element is the background review with a special emphasis on the applicants involvement in any wrong doing in the past. The second element is the attempt to evaluate the applicants morale character. One has to remember, employees who were never involved in their past in wrong doing are not necessarily honest, they might just have lacked the opportunity or motives.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132185870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discourage the possibility of airborne attack with a good detection system: amethodology for planning 用良好的探测系统阻止空中攻击的可能性:规划的方法
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751999
E. Greneker
{"title":"Discourage the possibility of airborne attack with a good detection system: amethodology for planning","authors":"E. Greneker","doi":"10.1109/CCST.1989.751999","DOIUrl":"https://doi.org/10.1109/CCST.1989.751999","url":null,"abstract":"Detection of the ground intruder has been a subject of primary emphasis when planning an intrusion detection system. The ground intruder has been viewed as the major threat because the ground intrusion scenario does not require a means of sophisticated transport to gain access to a sensitive site. But a new trend is developing that should sensitize the security planners at sensitive facilities to begin to address the airborne threat as a credible intrusion scenario. Within the western hemisphere during the past 10 years, no less than 10 prison escape attempts have utilized helicopters as an escape transport. A terrorist, in an attack that resulted in the deaths of three Mid-East army personnel, used an ultra-light aircraft to circumvent normal border intrusion detection systems. Another terrorist was killed when explosives detonated prematurely in the gondola of his hot air balloon. Through use of the hot air balloon, the terrorists had succeeded in avoiding detection at the border before his explosives accidently detonated. There is another documented case where an innocent airborne intruder succeeded in landing a helicopter within the controlled boundary of a sensitive facility without detection until the pilot solicited assistance from the facility operations personnel. The short history of airborne intrusions and certain intelligence information indicates that the airborne intrusion scenario may be a trend of the future. The airborne intrusion scenario has many advantages over a ground assault. The airborne platform can be used to transport the intruder over traditional barrier systems that are designed to delay the ground intruder. The early-warning ground intrusion sensors are located on and behind the barriers, and the avoidance of the barriers denies security personnel early-waming information usually required for an optimum response, The airborne intruder also has access to the rooftops of buildings which can be used to strategic advantage. This paper serves as an introduction to the methodology that should be considered when planning for defense against the airborne intrusion.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信