1994 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Statistical process control testing of electronic security equipment 电子安全设备的统计过程控制试验
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363801
D. W. Murray, D. D. Spencer
{"title":"Statistical process control testing of electronic security equipment","authors":"D. W. Murray, D. D. Spencer","doi":"10.1109/CCST.1994.363801","DOIUrl":"https://doi.org/10.1109/CCST.1994.363801","url":null,"abstract":"Statistical Process Control testing of manufacturing processes began back in the 1940's with the development of Process Control Charts by Dr. Waiter A. Shewart. Sandia National Laboratories has developed an application of the SPC method for performance testing of electronic security equipment. This paper documents the evaluation of this testing methodology applied to electronic security equipment and an associated laptop computer-based system for obtaining and analyzing the test data. Sandia developed this SPC sensor performance testing method primarily for use on portal metal detectors, but, has evaluated it for testing of an exterior intrusion detection sensor and other electronic security devices. This method is an alternative to the traditional binomial (alarm or no-alarm) performance testing. The limited amount of information in binomial data drives the number of tests necessary to meet regulatory requirements to unnecessarily high levels. For example, a requirement of a 0.85 probability of detection with a 90% confidence requires a minimum of 19 alarms out of 19 trials. By extracting and analyzing measurement (variables) data whenever possible instead of the more typical binomial data, the user becomes more informed about equipment health with fewer tests (as low as five per periodic evaluation).<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security mechanism for distributed systems 分布式系统的安全机制
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363792
Hu Chang, K. Farn, Chih-Hsien Lu
{"title":"Security mechanism for distributed systems","authors":"Hu Chang, K. Farn, Chih-Hsien Lu","doi":"10.1109/CCST.1994.363792","DOIUrl":"https://doi.org/10.1109/CCST.1994.363792","url":null,"abstract":"In this paper, we provide a new authentication protocol in distributed systems. The proposed protocol includes two primary components. The first component is the user registration and the second component is a secure authentication mechanism. A key partition function is the primary element in user registration with which a service applicant gets his/her resource access privilege from a set of security centers. A sensitive decision function is then designed to qualify the sensitive degree of the applicant. The second component is a authentication mechanism to identify the applicant using his/her qualified key. A numeric example and two lemmas reveal the feasibility of the proposed protocol.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alarm verification aids: adding value to closed circuit television and detection systems 报警验证辅助:为闭路电视和检测系统增加价值
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363786
R. M. Rodger, G. Leach, S. D. Featy
{"title":"Alarm verification aids: adding value to closed circuit television and detection systems","authors":"R. M. Rodger, G. Leach, S. D. Featy","doi":"10.1109/CCST.1994.363786","DOIUrl":"https://doi.org/10.1109/CCST.1994.363786","url":null,"abstract":"When a closed circuit television (CCTV) is used in conjunction with a perimeter intruder detection system (PIDS), performance can be improved by using an alarm verification aid (AVA). AVAs range from time-lapse video recorders through freeze frame capture units and small loop action replay systems to DIAMOND (Direct Image Assessment on Demand) type systems. The DIAMOND system presents a sequence of images immediately before and after an alarm to help the operator to decide the cause of the alarm. Earlier research has shown that operators are more likely to notice rapid movement in a scene than something moving slowly or the sudden appearance of a stationary object.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development and use of a method to commission a perimeter intrusion detection system to a performance standard 开发和使用一种方法,使外围入侵检测系统达到性能标准
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363775
M. Horner, G. Leach, S. Peaty
{"title":"Development and use of a method to commission a perimeter intrusion detection system to a performance standard","authors":"M. Horner, G. Leach, S. Peaty","doi":"10.1109/CCST.1994.363775","DOIUrl":"https://doi.org/10.1109/CCST.1994.363775","url":null,"abstract":"This paper describes the commissioning of a fence-mounted microphonic Perimeter Intrusion Detection Systems (PIDS) to an agreed performance standard. The performance requirements are expressed in terms of a minimum probability of detection and expected false/nuisance alarm rate under different weather conditions. The requirements were developed from both experimental evaluations and computer simulations. This paper gives details of how the PDS 100 PIDS was set up to meet these requirements at an operational site with 30 detection zones. The procedures used were designed to be rigorous enough to ensure that the performance was acceptable, yet quick enough to minimise the time spent commissioning. The tests are based on a calibrated, nondestructive fence tester used to simulate real cutting attacks on the fence. Data from attack trials were used to correlate the signals from real attacks and the fence tester. The commissioning procedure involved one person striking each fence panel, while the generated signals were automatically recorded on a portable computer. This data was used to determine the minimum sensitivity needed for each zone that would have met the required detection rate.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130244031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FISOFM: firearms identification based on SOFM model of neural network 基于SOFM神经网络模型的枪械识别
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363783
C. Kou, C. Tung, H. Fu
{"title":"FISOFM: firearms identification based on SOFM model of neural network","authors":"C. Kou, C. Tung, H. Fu","doi":"10.1109/CCST.1994.363783","DOIUrl":"https://doi.org/10.1109/CCST.1994.363783","url":null,"abstract":"Firearms identification (FI) has been becoming a serious and increasing part of crime investigation for the last two decades. We propose a solution to FI using Neural Network (NN) technology. Lots of methods have been using in FI such as extractor mark, breach mark, ejector mark, and chambering mark identification, etc. We choose the chambering mark identification as our method in this research. It is a simple and useful method for crime investigation. Because of the principle of tool mark, we may identify the firearms. The chambering mark needs to be scanned, preprocessed, segmented, described, reduced and enhanced, and will be recognized by its individual characteristic via the Self-Organizing Feature Map(SOFM) model of NN. It will ease the burden of forensic laboratory's because they do not need to identify the tool mark via microscope.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126705086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An image processing system for the monitoring of special nuclear material and personnel 一种用于监视特殊核材料和核人员的图像处理系统
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363797
T. Thai, J. Carlson, D. Urenda, T. Cooley
{"title":"An image processing system for the monitoring of special nuclear material and personnel","authors":"T. Thai, J. Carlson, D. Urenda, T. Cooley","doi":"10.1109/CCST.1994.363797","DOIUrl":"https://doi.org/10.1109/CCST.1994.363797","url":null,"abstract":"An important aspect of insider protection in production facilities is the monitoring of the movement of special nuclear material (SNM) and personnel. One system developed at Sandia National Labs for this purpose is the Personnel and Material Tracking System (PAMTRAK). PAMTRAK can intelligently integrate different sensor technologies and the security requirements of a facility to provide a unique capability in monitoring and tracking SNM and personnel. Currently many sensor technologies are used to track the location of personnel and SNM inside a production facility. These technologies are generally intrusive; they require special badges be worn by personnel, special tags be connected to material, and special detection devices be mounted in the area. Video technology, however, is non-intrusive because it does not require that personnel wear special badges or that special tags be attached to SNM. Sandia has developed a video-based image processing system consisting of three major components: the Material Monitoring Subsystem (MMS), the Personnel Tracking Subsystem (PTS) and the Item Recognition Subsystem (IRS).<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122243570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure-Way, an affordable home security system Secure-Way,一个经济实惠的家庭安全系统
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363777
J. G. Vinson, D. Knight, B. Mahafza
{"title":"Secure-Way, an affordable home security system","authors":"J. G. Vinson, D. Knight, B. Mahafza","doi":"10.1109/CCST.1994.363777","DOIUrl":"https://doi.org/10.1109/CCST.1994.363777","url":null,"abstract":"In recent years, demands for affordable small, light weight, multipurpose security system(s) for home usage have been on the rise. Low cost, low power requirements, simplicity of operation, and fast mounting-start-up procedures are desirable features. To date, most home security systems are either too expensive and complex to be utilized by an average home owner, or alternatively, they do not offer adequate protection. A new low cost multipurpose home security system, called Secure-Way, has been developed by KBM Enterprises, Inc. in Huntsville, Alabama. Secure-Way has remote learning capabilities which can be adjusted and updated at any time by the user. RECORD signals are automatically triggered by motion, while STOP signals are programmable. The system utilizes a 9-volt battery, a push on/off button, LED indicators for \"wait for arming\", \"RECORD\", and \"STOP\" modes, and an adjustable alarm/recording times. The device is light weight and can be mounted indoors and/or outdoors.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114197536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hybrid tracking technology 混合跟踪技术
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363767
C. Wong, G. Reshetnikov
{"title":"Hybrid tracking technology","authors":"C. Wong, G. Reshetnikov","doi":"10.1109/CCST.1994.363767","DOIUrl":"https://doi.org/10.1109/CCST.1994.363767","url":null,"abstract":"Electronic personnel and asset tracking systems have historically employed either radio frequency (RF), infrared (IR), or ultrasonic technology. This paper discusses the strengths and weaknesses of each of these technologies and discusses the use of hybrid designs that use the features of one technology to fill the deficiency gaps in another. While each technology possesses inherent advantages and features, each also has its own distinct limitations. For example, while RF can readily track the presence of an article in a large facility using few receivers, establishing the precise location of an article typically requires the installation of many additional receivers and can easily become uneconomic. A hybrid system consisting of two technologies and/or sensor classes working in tandem when intelligently linked would enhance system performance beyond the use of two non linked systems. The use of a common intelligent controller makes the hybrid combination synergistic allowing it to outperform single technologies installed in parallel but not integrated into one system. A key benefit of the hybrid approach is the ability to supervise the tags for location, functionality, and tampering to a much greater degree than is possible with single technology and class systems. The hybrid system is also cost effective when compared to multiple technology non integrated systems since the integration makes use of common system elements such as wiring, power supplies, controllers and annunciators.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent MTS monitoring system 智能MTS监控系统
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363769
So-Lin Yen, H. Hwang
{"title":"Intelligent MTS monitoring system","authors":"So-Lin Yen, H. Hwang","doi":"10.1109/CCST.1994.363769","DOIUrl":"https://doi.org/10.1109/CCST.1994.363769","url":null,"abstract":"Criminal investigation agencies in Taiwan are often frustrated nowadays because criminals can easily communicate through Mobile Telephone System (MTS) and thus escape from being captured. In this paper we present the structure and functions of the intelligent MTS monitoring system to be installed at Ministry of Justice, Investigation Bureau (MJIB). Because it can save the MTS traffic data with A-number, B-number, cell location and direction into specified data base and it can record the monitored speech to dedicated tape and/or transfer to on-site monitoring station automatically, this system really increases efficiency and accuracy for criminal investigation and its capacity can be extended easily.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"11 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Code book cipher system 密码本密码系统
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363793
K. Shaheen
{"title":"Code book cipher system","authors":"K. Shaheen","doi":"10.1109/CCST.1994.363793","DOIUrl":"https://doi.org/10.1109/CCST.1994.363793","url":null,"abstract":"A new system is proposed to enhance the security of a stream ciphering algorithm that is based on non-linear J-K flip flop networks (Pless's system). The new system incorporates a multiplexing algorithm with a Pseudorandom Number Generator (PNG) to generate a random sequence that is totally independent of the corresponding input sequence. This multiplexing algorithm can be achieved by using a 32 MByte Random Access Memory (RAM) code book filled with random sequences where the (25 bit) input sequence will specify the address of the output bytes. Although the RAM code book algorithm is very secure, another level of complexity is added using a non-linear arithmetic operation at the output stage where the message text (400 bits) will be added to a (320 bits) random key and then evaluated for a (320 bits) random base. Both, key and base, are generated by the code book which has a period of 10E110. The overall system is considered an NP-complete problem and it is very secure under plain-text attack.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115686559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信