1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
A heuristic approach to reconstruct crime scene based on mark-theory 基于马克理论的犯罪现场重构启发式方法
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386796
C. Kou, C.-h. Lin, F. Springsteel
{"title":"A heuristic approach to reconstruct crime scene based on mark-theory","authors":"C. Kou, C.-h. Lin, F. Springsteel","doi":"10.1109/CCST.1993.386796","DOIUrl":"https://doi.org/10.1109/CCST.1993.386796","url":null,"abstract":"The authors consider the use of a CD model to reconstruct a crime scene using the technology of artificial intelligence, with particular reference to gunshot-caused bloodstain evidence. They attempt to incorporate the domain knowledge of mark theory and the experiences of investigators in their expert system, which helps both the investigators and qualifies practitioners to gain enough evidence from the crime scene.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New evaluation methods for reducing environment effects in radar detection 降低雷达探测环境影响的新评估方法
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386810
M. Hofmeister
{"title":"New evaluation methods for reducing environment effects in radar detection","authors":"M. Hofmeister","doi":"10.1109/CCST.1993.386810","DOIUrl":"https://doi.org/10.1109/CCST.1993.386810","url":null,"abstract":"Dornier has developed a radar intrusion detection sensor (RADOBS) which largely eliminates environmental and ambient effects such as rain and electromagnetic interference. RADOBS is a monostatic pulse Doppler miniradar for mobile and stationary use. The system can be installed in two versions: RADOBS-R for omnidirectional detection by means of a ring zone and RADOBS-V with a directed sector zone. The detection zones of both versions can be defined precisely to ensure that no alarm is released outside these defined zones.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A prison guard Duress alarm location system 一种狱警胁迫报警定位系统
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386816
T. Christ, P. Godwin, R. Lavigne
{"title":"A prison guard Duress alarm location system","authors":"T. Christ, P. Godwin, R. Lavigne","doi":"10.1109/CCST.1993.386816","DOIUrl":"https://doi.org/10.1109/CCST.1993.386816","url":null,"abstract":"The authors discuss concepts used in developing the CSC (Correctional Services Canada) Duress Alarm Location System (DALS). A block diagram and theory of operation for the system are presented. A sample data and test results for an actual test installation are presented and analyzed. It is concluded that the DALS is able to acknowledge and locate a duress alarm within an indoor environment with useful precision and reliability.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
A practical design for secure broadcasting using PKD concept 使用PKD概念的安全广播的实用设计
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386832
J. Jan, Y. Y. Chern
{"title":"A practical design for secure broadcasting using PKD concept","authors":"J. Jan, Y. Y. Chern","doi":"10.1109/CCST.1993.386832","DOIUrl":"https://doi.org/10.1109/CCST.1993.386832","url":null,"abstract":"Based on the concept of public key distribution (PKD), a new practical design for a secure broadcasting system is proposed. The proposed secure broadcast cryptosystem is based on the Diffie-Hellman public key distribution concept. The communication key is hidden with the RSA scheme. The security of the cryptosystem is therefore the same as that of the RSA scheme. The single key concept is used to reduce the load of additional control messages.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127883840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Verifying system security using Petri Nets 使用Petri网验证系统安全性
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386794
S. Castano, P. Samarati, C. Villa
{"title":"Verifying system security using Petri Nets","authors":"S. Castano, P. Samarati, C. Villa","doi":"10.1109/CCST.1993.386794","DOIUrl":"https://doi.org/10.1109/CCST.1993.386794","url":null,"abstract":"A tool for verifying security properties of data is described, based on colored Petri nets. A conceptual data model for complex applications and a mandatory security model based on the principles of Bell-LaPadula are presented. The tool operates on such models, using the Petri net analysis techniques, based on the reachability graph. The absence of interference of sensitive associations, the reachability of information, and the temporal relationships among data access properties are studied, and conditions on the reachability graph are defined, to guarantee that such properties hold in the system.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A dynamic access control model for object-oriented system 面向对象系统的动态访问控制模型
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386806
P. Deng, C. Kuo, V. Kao
{"title":"A dynamic access control model for object-oriented system","authors":"P. Deng, C. Kuo, V. Kao","doi":"10.1109/CCST.1993.386806","DOIUrl":"https://doi.org/10.1109/CCST.1993.386806","url":null,"abstract":"The authors propose a dynamic access control model (DACM) to meet the access control requirements of an environment that frequently changes and adjusts user access privileges and/or target object confidential level. For the DACM, one uses an object-oriented technique to describe the whole model and also to implement its access control mechanism called the dynamic access control system. A real case similar to the DACM has been implemented in the Administration Information System of the Central Police University. The performance shown in this case is quite good from the viewpoint of the end user and system developers/maintainers. The DACM technique can be used to cope with a dynamically changing environment.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Advanced passive infrared presence detectors as key elements in integrated security and building automation systems 先进的被动红外存在探测器是综合安防和楼宇自动化系统的关键元件
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386821
H. Keller
{"title":"Advanced passive infrared presence detectors as key elements in integrated security and building automation systems","authors":"H. Keller","doi":"10.1109/CCST.1993.386821","DOIUrl":"https://doi.org/10.1109/CCST.1993.386821","url":null,"abstract":"The role of the passive infrared (PIR) motion detector is reviewed. It is noted that, currently, it is peripheral component of security systems, installed to overlook a specific area. Future needs for integrated building automation systems require more powerful sensors that approach true presence detection, in order to provide the basic information from every room: the presence of people. From such detectors, a complete picture of occupancy of a building is obtained which meets the needs of a security system as well as energy control and safety. A highly sophisticated self-learning sensor technology has been developed for these requirements. Several thousand detectors have been installed over the last few years in various buildings, with excellent results.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Analysis and selection of communication security equipment 通信安全设备的分析与选择
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386800
G. M. Barney
{"title":"Analysis and selection of communication security equipment","authors":"G. M. Barney","doi":"10.1109/CCST.1993.386800","DOIUrl":"https://doi.org/10.1109/CCST.1993.386800","url":null,"abstract":"The author addresses criteria for selecting communications security (COMSEC) equipment into existing and planned communications systems. Specific areas addressed include needs, threats, value of information, response to threats, user interface issues, key management considerations, cryptographic types, future requirements, compatibility, special COMSEC characteristics, host nation connection approvals, maintenance approaches, standard security attributes, practical realities, and future trends.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart card, computer security, access control, cryptology 智能卡,计算机安全,访问控制,密码学
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386807
A. Spesivtsev, V. Wegner, A. Krytjakov, V. Seregin, V. Sidorov
{"title":"Smart card, computer security, access control, cryptology","authors":"A. Spesivtsev, V. Wegner, A. Krytjakov, V. Seregin, V. Sidorov","doi":"10.1109/CCST.1993.386807","DOIUrl":"https://doi.org/10.1109/CCST.1993.386807","url":null,"abstract":"An alternative approach to applications which need expensive smart cards with cryptoprocessors is suggested. The idea is to perform cryptographic features in special smart card reading devices. Thus, the price of data protection and access control in computing systems and networks may be substantially reduced. In most applications cheap EEPROM smart cards can be used instead of microprocessor cards.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using smart cards to authenticate passwords 使用智能卡验证密码
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386808
C. Chang, Ren-Junn Hwang, D. Buehrer
{"title":"Using smart cards to authenticate passwords","authors":"C. Chang, Ren-Junn Hwang, D. Buehrer","doi":"10.1109/CCST.1993.386808","DOIUrl":"https://doi.org/10.1109/CCST.1993.386808","url":null,"abstract":"A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to communicate. The smartcard uses a signature scheme to check whether or not the login can be accepted. As well as modifying Shamir's algorithm for the signature scheme checking by using a theorem about relatively prime numbers, one also adds communication timestamps to prevent replaying of a previously intercepted login request.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126955252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信