Proceedings. International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Supervision of high voltage electricity pylons, principle structure and measurements for the selection of proper sensor systems 高压电力塔的监督,原理结构和测量,以选择合适的传感器系统
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751998
U. Oppelt
{"title":"Supervision of high voltage electricity pylons, principle structure and measurements for the selection of proper sensor systems","authors":"U. Oppelt","doi":"10.1109/CCST.1989.751998","DOIUrl":"https://doi.org/10.1109/CCST.1989.751998","url":null,"abstract":"Electrical energy is an essential part of life in industry and private scope. Nearly permanent availability at almost all places in adequate quantity gives it a general value. This justifies considerable technical expense. Nevertheless, this complex energy system is vulnerable if an attack occurs in the area of high voltage distribution. Where energy is transferred across large distances in concentrated form, damage is relatively easy to cause. Damage leads to risk for people and enormous cost for repair of wiring and falling of use. Most attacks on high tension poles are performed by terrorists. The most frequently used tool is the saw. This method of attack is very slow and labor-intensive but easy to perform. Often the attack cannot be finished, when such terrorists have to leave the scene. Then the next storm could tilt the pole. If such forms of attack can be detected, quick engagement can help avoid bigger damage. Other methods of destroying a pole are faster, but require more effort to prepare and adequate tools. Such are welding, grinding and blasting. In such cases, the pole could be destroyed, but there is always a good chance to catch the violent person if a security system is in place. Therefore security choices for high tension poles are of great interest. This paper reports on first investigations of different sensors of this purpose.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126764741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer security economics 计算机安全经济学
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751963
E. Orlandi
{"title":"Computer security economics","authors":"E. Orlandi","doi":"10.1109/CCST.1989.751963","DOIUrl":"https://doi.org/10.1109/CCST.1989.751963","url":null,"abstract":"For most people, managers as well as technicians computer security is still regarded as an overhead. The adoption of security measures is viewed as a trade off between security and efficiency. In our opinion, security is a plus for an information system. In fact, it transforms an unreliable system into a reliable one by adding value to it. In a time when processor and memory are free commodity goods, the concern for the trade off between security and efficiency should not be a problem any more.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Electronic surveillance system vulnerability to advanced weapon threats 电子监视系统易受先进武器威胁
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751953
E. Van Keuren, R. Braasch, B. Kelley
{"title":"Electronic surveillance system vulnerability to advanced weapon threats","authors":"E. Van Keuren, R. Braasch, B. Kelley","doi":"10.1109/CCST.1989.751953","DOIUrl":"https://doi.org/10.1109/CCST.1989.751953","url":null,"abstract":"The primary focus of this paper is on the effects of phenomena produced by advanced weapons on physical security system performance. The types stressed in the paper are the high-altitude electromagnetic pulse, high-power microwaves, and lasers. Topics include generation mechanisms, interactions with security system components and possible effects, and illustrative counter measures. This paper is not intended to imply that the types of threats discussed are applicable to all types of security systems and that all systems should be designed to withstand them. For example, they would not be applicable to a residential burglar alarm. The threats in this paper might be available to a Government activity or to a well financed terrorist or sabotage organization, and are applicable to systems designed to protect against such groups. Also, although in some instances they might be used to assist in covert penetration, in most instances it is not expected that they would be used for that purpose. These threats will have the capability to render the total system or major components thereof inoperative, and this is the manner in which it is expected that they would be encountered.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131107772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Foiling the wiley hacker: more than analysis and containment 挫败狡猾的黑客:不仅仅是分析和遏制
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751947
H. Kluepfel
{"title":"Foiling the wiley hacker: more than analysis and containment","authors":"H. Kluepfel","doi":"10.1109/CCST.1989.751947","DOIUrl":"https://doi.org/10.1109/CCST.1989.751947","url":null,"abstract":"This paper will look at the methods and tools used by system Intruders. It will analyze the development of the hacker, his motivation, his environment and the burglar tools used for system intrusion. It will also probe the nature of the vulnerable networking environments that are the target of intrusions. More important, it will address turning the tables on these Intruders with their own tools and techniques. Besides reacting to attacks, there are many opportunities to learn from the intruders and design that knowledge into now defensive solutions for securing computer based systems. Having presented the problem, the paper will present a strategy to defend and thwart such intrusions in our Increasingly networked and distributed computing and telecommunications environments.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125733329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Computer-based communication system for police 警方电脑通讯系统
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751988
Pong-Fui Chang, H. Hwang, J. Hsu
{"title":"Computer-based communication system for police","authors":"Pong-Fui Chang, H. Hwang, J. Hsu","doi":"10.1109/CCST.1989.751988","DOIUrl":"https://doi.org/10.1109/CCST.1989.751988","url":null,"abstract":"The possibility of interfering or sabo taging the police communication network due to easily available electronics to the criminal elements is growing everyday. Thus, the requirement for secure communications in law enforcement is becoming more and more critical. Modern computer technology has the potential for increasing the effectiveness and efficiency of police activities. This paper presents a viewpoint of a computer based communication system which meets the specific requirements of security. In this system, an automatic monitoring system is designed to provide the operation management and performance monitoring of the communication system.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115226713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alarm monitoring using data communications networks 利用数据通信网络进行报警监控
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751994
D. J. Donaldson
{"title":"Alarm monitoring using data communications networks","authors":"D. J. Donaldson","doi":"10.1109/CCST.1989.751994","DOIUrl":"https://doi.org/10.1109/CCST.1989.751994","url":null,"abstract":"This paper examines the technical aspects of monitoring alarm systems using private data communications networks. These networks can be either X.25 or SNA and issues such as security, availability and response are discussed.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127124354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of a key generation and distribution algorithm for secure communication in open systems interconnection architecture 开放系统互联架构中安全通信密钥生成与分发算法的应用
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751975
R. Ramaswamy
{"title":"Application of a key generation and distribution algorithm for secure communication in open systems interconnection architecture","authors":"R. Ramaswamy","doi":"10.1109/CCST.1989.751975","DOIUrl":"https://doi.org/10.1109/CCST.1989.751975","url":null,"abstract":"A key generation and distribution algorithm is presented in this paper and shown applied for secure transmission of user data between two peer-layers of an Open Systems Interconnection Reference Model Architecture located at any source and destination end-user host systems. In particular, the algorithm (i) generates and distributes a session key between two peer-layers during Connection Establishment phase, (ii) encrypts and decrypts their user data, present in the Protocol Data Unit, using the same session key during Data Transfer phase, and (iii) after transmitting user data, it destroys the session key during Connection Release phase. For simulation purpose, the algorithm is shown applied between the transport service user and provider, present at the source and destination host systems, for secure transfer of transport service user data to the corresponding remote peer layer using Class 4 Transport Protocol of OSI-RM Architecture.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Repels: a new rapid deployment guided radar sensor 斥力:一种新的快速部署制导雷达传感器
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751969
W. Feller, M. Maki
{"title":"Repels: a new rapid deployment guided radar sensor","authors":"W. Feller, M. Maki","doi":"10.1109/CCST.1989.751969","DOIUrl":"https://doi.org/10.1109/CCST.1989.751969","url":null,"abstract":"REPELS (Rapidly Extendible Perimeter Line sensor) is a new concept in guided radar perimeter security introduced in 1988. it utilizes a technology termed 'coupled wave device' (CWD) to transfer detection features currently available only to leaky cable buried line sensors, to the above ground, rapid deployment, sensor requirement. Thus, in less than 20 minutes, a person can set up a sensor that establishes a 100-metre long detection barrier (several metres high) about a resource. Like buried line guided radar sensors it provides a terrain-following detection zone and, by operating at VHF frequencies, it also inherently optimizes detection of humans but discriminates against small nuisance targets. This paper addresses some of the physics behind the CWD technology on which the sensor is based, and contrasts this development with other sensor alternatives, including leaky cable sensors. Also discussed is the hardware design of the sensor, including both the electronics and sensor elements. Finally, the paper discusses deployment aspects of the sensor and initial test results for various intrusion scenarios. Typical applications are security for mobile resources such as aircraft and vehicles, dignitary (VIP) security, or temporary stand-in where other sensor zones have failed. Included in the test results is the sensor response to typical human body orientations and to small animals. The REPELS sensor provides a new alternative to allow rapid deployment secur ity for mobile resources and irregular sites.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic fingerprint matching 自动指纹匹配
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751979
F. Preston
{"title":"Automatic fingerprint matching","authors":"F. Preston","doi":"10.1109/CCST.1989.751979","DOIUrl":"https://doi.org/10.1109/CCST.1989.751979","url":null,"abstract":"In automatic fingerprint identification systems poor quality impressions and latents often require expert interpretation if usable encodings are to be obtained. When this is necessary there are basically two different approaches taken for data entry \"direct\" encoding of the minutiae and \"tracing\" the ridges. The minutiae identified using these two methods on a test set of 49 latents were compared. The results indicate that these two methods are not just alternative ways of entering information but are radically different approaches which often lead to substantially different interpretations of the impression. The results of running searches on the two sets of minutiae using the Home Office matching algorithm do not indicate that either method is to be preferred from the point of view of accuracy. This conclusion is reinforced when the encodings are compared directly by eye with the matching impressions. Interpreting and encoding an impression viewed in isolation, by whatever method, is a fundamentally different task to the iterative process used by fingerprint experts to determining a match. There is scope for improving the matching accuracy of automatic fingerprint systems. The view is presented that a significant improvement could be achieved if algorithms are developed which are capable of iterative interpretation of the encoded or original data.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114766340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The design, development and implementation of an imaging system for the automatic alarm interpretation of CCTY sequences using IKBS techniques 利用IKBS技术设计、开发和实现了CCTY序列自动报警解释成像系统
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751983
N. Custance, P. Golton, T. Ellis, Paul L. Rosin, P. Moukas
{"title":"The design, development and implementation of an imaging system for the automatic alarm interpretation of CCTY sequences using IKBS techniques","authors":"N. Custance, P. Golton, T. Ellis, Paul L. Rosin, P. Moukas","doi":"10.1109/CCST.1989.751983","DOIUrl":"https://doi.org/10.1109/CCST.1989.751983","url":null,"abstract":"The assessment of alarm cause from a perimeter intrusion detection system is manpower intensive. Work by the Home Office has shown considerable benefits can accrue from the use of digital storage, replay and analysis of image sequences from surveillance CCTV. The design of the system is heavily dependent upon the number of cameras on site, the need (or otherwise) for pre-alarm triggering, the probable speed of movement of objects within the scene, and the likelihood of near simultaneous alarms occurring. The techniques used to classify the cause of an alarm are described in a further paper to be presented at the conference.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130255069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信