{"title":"Protection of enclosures with harmonic pressure variation","authors":"F. Ryser, S. Strassler","doi":"10.1109/CCST.1989.751968","DOIUrl":"https://doi.org/10.1109/CCST.1989.751968","url":null,"abstract":"It is shown theoretically how pressure variations can be utilized to measure the leakage rate of enclosures and to protect enclosures against intrusion.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115454782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of security technology efforts at bell communications research","authors":"B.K. Schwartz","doi":"10.1109/CCST.1989.751957","DOIUrl":"https://doi.org/10.1109/CCST.1989.751957","url":null,"abstract":"","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fundamental considerations on the standardization of security devices with a view to the realization of the European interior market 1992","authors":"A. Scheidweiler","doi":"10.1109/CCST.1989.751949","DOIUrl":"https://doi.org/10.1109/CCST.1989.751949","url":null,"abstract":"The paper deals with the situation of standardization, testing and certification in Europe in the field of security systems. Starting from the objectives of the EC to realize an interior European market until 1992 the problems of trade barriers are discussed. It is shown which importantrole European standards will play in the future.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127636192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data media / communication- security and recovery","authors":"A.R. Dowdeswell","doi":"10.1109/CCST.1989.751965","DOIUrl":"https://doi.org/10.1109/CCST.1989.751965","url":null,"abstract":"","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-line signature verification: how manv countries are in the race?","authors":"R. Plamondon, G. Lorette","doi":"10.1109/CCST.1989.751977","DOIUrl":"https://doi.org/10.1109/CCST.1989.751977","url":null,"abstract":"This paper presents a survey of the major achievements in automatic signature verification based on dynamic or on-line techniques. After a review of preprocessing techniques a special attention is given to feature extraction methods and comparison processes with respect to the two basic representa tions of a signature: functions and parameters. Comparative results of performance are then presented and discussed.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perimeter security research in Britain past, present and future","authors":"A.N. Kapsey","doi":"10.1109/CCST.1989.751944","DOIUrl":"https://doi.org/10.1109/CCST.1989.751944","url":null,"abstract":"My talk will largely be about the work done on government supported research and development work on security systems for prisons and other large installations of national importance.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131829615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A knowledge-based approach to automatic alarm interpretation using computer vision, on image sequences","authors":"T. Ellis, Paul L. Rosin, P. Moukas, P. Golton","doi":"10.1109/CCST.1989.751982","DOIUrl":"https://doi.org/10.1109/CCST.1989.751982","url":null,"abstract":"This paper describes the development of a knowledge based system which will be used to automate the interpretation of an alarm event resulting from a perimeter intrusion detection system. The knowledge-based system analyses a sequence of digital images captured before, during and after the alarm is generated. Additional data, pertaining to the alarm sensor, prevailing weather conditions and time-of-day are also available to assist the interpretation. In order to cope with the diverse nature of the different data sources, a knowledge-based approach is used to perform the interpretation. Models are maintained for a variety of possible alarm causes (human, animal, environmental, false etc.) and each model characterises a number of properties associated with that particular alarm source. The event data is interrogated by the KBS following the selection of a particular model.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"David: advanced developments for the next generation of video intrusion detection","authors":"E. J. Kozlow","doi":"10.1109/CCST.1989.751970","DOIUrl":"https://doi.org/10.1109/CCST.1989.751970","url":null,"abstract":"The Digital Automatic Video Intrusion Detection (DAVID) sensor was introduced at the International Carnahan Con ference on Security Technology in 1983. Since then, hundreds of DAVID video intrusion detection sensors have been suc cessfully deploied at nuclear facilities, correctional institutions, military bases and industrial complexes. This broad base of DAVID customers has provided Computing Devices Company with input regarding potential product improvements and new areas of application. During the past two years, Computing Devices company has embarked upon a vigorous research and development effort aimed at advancing DAVID's state-of-the-art performance in video intrusion detection. This paper describes a set of innovative enhancements of the DAVID sensor which serve to broaden its scope Of application, improve its performance and enhance its usability. Specifically, new DAVID algorithms have been designed to detect, classify and track intruders based on both horizontal and vertical components of intruder movement in the video image, to increase the probability of detection under all weather conditions and to reduce the nuisance alarm rate due to outdoor environmental disturbances.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122479398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Now to secure a mixed mode terminal teletex X.25 network","authors":"M. Houthooft, H. Cnudde","doi":"10.1109/CCST.1989.752001","DOIUrl":"https://doi.org/10.1109/CCST.1989.752001","url":null,"abstract":"This paper gives a conceptual analysis of the protection of a network of PC workstations. It analyses the pro blematic of protection and suggests a rudimentary solution. The network described is an existing network in Belgium, however, because of security reasons it is not possible to give more information on the nature of this network. Nevertheless, this will not prevent us of describing an adequate security solution for this kind of network. The network itself is consisted of a number of PC work stations, connected through the packet-switched data network (X.25/TELETEX).","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remote identification and movement control techniques","authors":"M. Jonckheere, M. Eng, P. Eng.","doi":"10.1109/CCST.1989.751993","DOIUrl":"https://doi.org/10.1109/CCST.1989.751993","url":null,"abstract":"A long standing requirement for the penitentiary services is the need to know the location of staff during an incident or when a personal duress alarm has been triggered. A second basic requirement is the ability to manage the movement of inmates inside the institutions. These requirements have generally been met through the use of post standards for the staff related functions, and control posts for the inmate movement control requirements. Alternate methods have been tried to automate this location identification process. Although the technology and concepts to track individuals or things have been refined recently, it has been shown that these techniques are not very effective in the indoor environment for applicationa which require a high degree of reliability and which cannot tolerate any time delays for information processing. The Correctional Service of Canada is embarking on a program to re-address these problems, and to develop new concepts and technologies in an effort to introduce remote identification and tracking techniques in an indoor environment. The purpose of the program is the development of a system which will be capable of identifying the location of every individual in a penal institution, to effect inmate counts, and to introduce a capability to manage the movements of the inmates which will be less intrusive than the existing methods, and which will allow the security staff to have more time to be reassigned to corrective and rehabilitative functions.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126810731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}