{"title":"An interdisciplinary approach for adding knowledge to computer security systems","authors":"M. Toure","doi":"10.1109/CCST.1994.363774","DOIUrl":"https://doi.org/10.1109/CCST.1994.363774","url":null,"abstract":"This paper focuses on the use of Artificial Intelligence (AT) for certain computer security systems. We call this class of security systems \"Intelligent Security Systems\". Some past works found AI helpful for such security systems as intrusion detection, virus detection, real time analysis of audit records, etc. But, because of the antagonism between security systems' sensibility and knowledge bases' flexibility and friendliness, the use of AI in security cannot be effective without a real discussion between AI and security, namely, an interdisciplinary approach requiring two skills: knowledge engineering and security expertise.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security communication in winding tunnels and deep underground streets","authors":"K. Matsui, J. Chiba","doi":"10.1109/CCST.1994.363766","DOIUrl":"https://doi.org/10.1109/CCST.1994.363766","url":null,"abstract":"In underground environments, communicability is vital in emergency cases such as fires, as well as in routine management operations. In a disaster the lines of the wire communication system may be damaged. Therefore, a simple wireless device is necessary for the preservation of public safety. This study aims at establishing a basis for solving such problems. In this paper, we have analyzed the propagation characteristics of the Crank-Tunnel. To solve such a boundary value problem, we have introduced the boundary-element method and the surface impedance approximation. In addition, reflector placed at the corner improves the radio communication characteristics in crooked tunnels.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"222 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key management for large scale end-to-end encryption","authors":"Ed wa rd L . W itzk e, L. Y. D. N. P. E. S. O. n","doi":"10.1109/CCST.1994.363791","DOIUrl":"https://doi.org/10.1109/CCST.1994.363791","url":null,"abstract":"The Digital Signature Standard (DSS), which has been adopted by the United States Government, has both public and private components, similar to a public-key cryptosystem. The Digital Signature Algorithm of the DSS is intended for authenticity but not for secrecy. The authors show how the use of the Digital Signature Algorithm combined with both symmetric and asymmetric (public-key) encryption techniques can provide a practical solution to key management scaleability problems, by reducing the key management complexity to a problem of order N, without sacrificing the encryption speed necessary to operate in high performance networks.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of the UK Securities Facilities Executive","authors":"N. Custance","doi":"10.1109/CCST.1994.363765","DOIUrl":"https://doi.org/10.1109/CCST.1994.363765","url":null,"abstract":"This paper reviews the activities of the UK government's Security Facilities Executive, a 1200 person strong organisation serving the security needs within the UK. The paper is aimed at briefing conference delegates on the wide range of work undertaken, stressing particular the development and assessment aspects with the Special Services group. The topics covered are security electronics, physical security, destruction of classified waste, and explosion protection.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Panoramic imaging perimeter sensor design and modeling","authors":"D. Pritchard","doi":"10.1109/CCST.1994.363802","DOIUrl":"https://doi.org/10.1109/CCST.1994.363802","url":null,"abstract":"This paper describes the conceptual design and preliminary performance modeling of a 360-degree imaging sensor. This sensor combines automatic perimeter intrusion detection with immediate visual assessment and is intended for fast deployment around fixed or temporary high-value assets. The sensor requirements, compiled from various government agencies, are summarized. The design includes longwave infrared and visible linear array technology. An auxiliary millimeter-wave sensing technology is also considered for use during periods of infrared and visible obscuration. The infrared detectors considered for the sensor design are similar to the Standard Advanced Dewar Assembly Types Three A and B (SADA-IIIA/B). An overview of the sensor and processor is highlighted. The infrared performance of this sensor design has been predicted using thermal imaging system models and is described. Future plans for developing a prototype are presented.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Klima, P. Dvorak, P. Zahradnik, J. Kolář, P. Kott
{"title":"Motion detection and target tracking in a TV image for security purposes","authors":"M. Klima, P. Dvorak, P. Zahradnik, J. Kolář, P. Kott","doi":"10.1109/CCST.1994.363796","DOIUrl":"https://doi.org/10.1109/CCST.1994.363796","url":null,"abstract":"The paper is devoted to the next step of development of simple algorithms for motion detection and target tracking suitable for a near real time processing on standard PCs. Important progress has been achieved in target tracking based upon block matching technique and in classification of different types of objects. Classification has been performed by a neural network on NeuroDynamX's DYNAMIND software.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133000172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tamper detection of fiber optic links via modulation transfer function characterization","authors":"C. Munno, H. Turk, P. Armstrong","doi":"10.1109/CCST.1994.363784","DOIUrl":"https://doi.org/10.1109/CCST.1994.363784","url":null,"abstract":"Fiber optic communication links have long been touted as providing a secure communications channel for sensitive information. This reputation is largely based on the absence of electromagnetic emanations from the fiber. However, unauthorized access to data in optical fibers is a realistic possibility. Unfortunately it is not always possible to encrypt data transmitted via fiber optic links due to the lofty cost of high data rate encrypters. Therefore, on non-encrypted fiber communications channels, some form of tamper detection scheme is desirable to assure security. The limitations of conventional tamper detection techniques suggests that more sophisticated methods be used. Fiber optic links, like all communications channels, have a band-limited frequency response which produces a characteristic distortion of the signals that propagate down the fiber. A technique has been developed to perform a sensitive characterization of the fiber's frequency response function. This characterization can be exploited for detecting tamper in fiber optic communications links.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132520930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of spread spectrum radio technology for the security market","authors":"D. Gaston","doi":"10.1109/CCST.1994.363789","DOIUrl":"https://doi.org/10.1109/CCST.1994.363789","url":null,"abstract":"Technological developments and changes in Federal Communications Commission (FCC) rules over the last few years have made it feasible to use spread spectrum communications for commercial applications. This paper presents a brief overview of spread spectrum development and technology and describes the advantages offered by spread spectrum communications in commercial applications, particularly security market applications. Specific topics include: Spreading techniques allowed by the FCC and the relative merits of these techniques in terms of system immunity to interference, jamming, and multipath. U.S. and international regulations and frequency allocations. Spread spectrum performance parameters and their effects on interference immunity. Tradeoffs between maximum attainable communication range and data rate. System design techniques for ensuring long-term reliability of spread spectrum systems in the face of anticipated band crowding. The paper concludes with a discussion of guidelines for selecting systems to serve specific applications, particularly those of the security industry.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124357919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blast vulnerability of building structures and the public from terrorist attack","authors":"N. Johnson, N. Custance","doi":"10.1109/CCST.1994.363781","DOIUrl":"https://doi.org/10.1109/CCST.1994.363781","url":null,"abstract":"Buildings and, more importantly people working within buildings, are becoming increasingly vulnerable to terrorist attack. The use by terrorist organisations of large bombs in areas accessed by the public is a matter of great concern. Conventional buildings are vulnerable to blast and their response is less well understood than that of heavy, reinforced, defensive structures. The lightness, discontinuities and hazard potential of modern building envelopes present new challenges. This paper discusses current research in the UK; arising in particular from observations on the parameters of blast which have the most significant effect on the behaviour of cladding and glass. The fragility of conventional building envelopes mean that they remain vulnerable at considerable ranges from large explosive charges even though the underlying structural frame may be relatively unaffected. The significance of blast duration and the negative phase of the blast pulse on light cladding elements is raised, along with the need to target design attention to areas which are realistic in the context of conventional building structures.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}