{"title":"A heuristic approach to reconstruct crime scene based on mark-theory","authors":"C. Kou, C.-h. Lin, F. Springsteel","doi":"10.1109/CCST.1993.386796","DOIUrl":"https://doi.org/10.1109/CCST.1993.386796","url":null,"abstract":"The authors consider the use of a CD model to reconstruct a crime scene using the technology of artificial intelligence, with particular reference to gunshot-caused bloodstain evidence. They attempt to incorporate the domain knowledge of mark theory and the experiences of investigators in their expert system, which helps both the investigators and qualifies practitioners to gain enough evidence from the crime scene.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New evaluation methods for reducing environment effects in radar detection","authors":"M. Hofmeister","doi":"10.1109/CCST.1993.386810","DOIUrl":"https://doi.org/10.1109/CCST.1993.386810","url":null,"abstract":"Dornier has developed a radar intrusion detection sensor (RADOBS) which largely eliminates environmental and ambient effects such as rain and electromagnetic interference. RADOBS is a monostatic pulse Doppler miniradar for mobile and stationary use. The system can be installed in two versions: RADOBS-R for omnidirectional detection by means of a ring zone and RADOBS-V with a directed sector zone. The detection zones of both versions can be defined precisely to ensure that no alarm is released outside these defined zones.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A prison guard Duress alarm location system","authors":"T. Christ, P. Godwin, R. Lavigne","doi":"10.1109/CCST.1993.386816","DOIUrl":"https://doi.org/10.1109/CCST.1993.386816","url":null,"abstract":"The authors discuss concepts used in developing the CSC (Correctional Services Canada) Duress Alarm Location System (DALS). A block diagram and theory of operation for the system are presented. A sample data and test results for an actual test installation are presented and analyzed. It is concluded that the DALS is able to acknowledge and locate a duress alarm within an indoor environment with useful precision and reliability.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A practical design for secure broadcasting using PKD concept","authors":"J. Jan, Y. Y. Chern","doi":"10.1109/CCST.1993.386832","DOIUrl":"https://doi.org/10.1109/CCST.1993.386832","url":null,"abstract":"Based on the concept of public key distribution (PKD), a new practical design for a secure broadcasting system is proposed. The proposed secure broadcast cryptosystem is based on the Diffie-Hellman public key distribution concept. The communication key is hidden with the RSA scheme. The security of the cryptosystem is therefore the same as that of the RSA scheme. The single key concept is used to reduce the load of additional control messages.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127883840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifying system security using Petri Nets","authors":"S. Castano, P. Samarati, C. Villa","doi":"10.1109/CCST.1993.386794","DOIUrl":"https://doi.org/10.1109/CCST.1993.386794","url":null,"abstract":"A tool for verifying security properties of data is described, based on colored Petri nets. A conceptual data model for complex applications and a mandatory security model based on the principles of Bell-LaPadula are presented. The tool operates on such models, using the Petri net analysis techniques, based on the reachability graph. The absence of interference of sensitive associations, the reachability of information, and the temporal relationships among data access properties are studied, and conditions on the reachability graph are defined, to guarantee that such properties hold in the system.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic access control model for object-oriented system","authors":"P. Deng, C. Kuo, V. Kao","doi":"10.1109/CCST.1993.386806","DOIUrl":"https://doi.org/10.1109/CCST.1993.386806","url":null,"abstract":"The authors propose a dynamic access control model (DACM) to meet the access control requirements of an environment that frequently changes and adjusts user access privileges and/or target object confidential level. For the DACM, one uses an object-oriented technique to describe the whole model and also to implement its access control mechanism called the dynamic access control system. A real case similar to the DACM has been implemented in the Administration Information System of the Central Police University. The performance shown in this case is quite good from the viewpoint of the end user and system developers/maintainers. The DACM technique can be used to cope with a dynamically changing environment.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced passive infrared presence detectors as key elements in integrated security and building automation systems","authors":"H. Keller","doi":"10.1109/CCST.1993.386821","DOIUrl":"https://doi.org/10.1109/CCST.1993.386821","url":null,"abstract":"The role of the passive infrared (PIR) motion detector is reviewed. It is noted that, currently, it is peripheral component of security systems, installed to overlook a specific area. Future needs for integrated building automation systems require more powerful sensors that approach true presence detection, in order to provide the basic information from every room: the presence of people. From such detectors, a complete picture of occupancy of a building is obtained which meets the needs of a security system as well as energy control and safety. A highly sophisticated self-learning sensor technology has been developed for these requirements. Several thousand detectors have been installed over the last few years in various buildings, with excellent results.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and selection of communication security equipment","authors":"G. M. Barney","doi":"10.1109/CCST.1993.386800","DOIUrl":"https://doi.org/10.1109/CCST.1993.386800","url":null,"abstract":"The author addresses criteria for selecting communications security (COMSEC) equipment into existing and planned communications systems. Specific areas addressed include needs, threats, value of information, response to threats, user interface issues, key management considerations, cryptographic types, future requirements, compatibility, special COMSEC characteristics, host nation connection approvals, maintenance approaches, standard security attributes, practical realities, and future trends.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Spesivtsev, V. Wegner, A. Krytjakov, V. Seregin, V. Sidorov
{"title":"Smart card, computer security, access control, cryptology","authors":"A. Spesivtsev, V. Wegner, A. Krytjakov, V. Seregin, V. Sidorov","doi":"10.1109/CCST.1993.386807","DOIUrl":"https://doi.org/10.1109/CCST.1993.386807","url":null,"abstract":"An alternative approach to applications which need expensive smart cards with cryptoprocessors is suggested. The idea is to perform cryptographic features in special smart card reading devices. Thus, the price of data protection and access control in computing systems and networks may be substantially reduced. In most applications cheap EEPROM smart cards can be used instead of microprocessor cards.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using smart cards to authenticate passwords","authors":"C. Chang, Ren-Junn Hwang, D. Buehrer","doi":"10.1109/CCST.1993.386808","DOIUrl":"https://doi.org/10.1109/CCST.1993.386808","url":null,"abstract":"A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to communicate. The smartcard uses a signature scheme to check whether or not the login can be accepted. As well as modifying Shamir's algorithm for the signature scheme checking by using a theorem about relatively prime numbers, one also adds communication timestamps to prevent replaying of a previously intercepted login request.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126955252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}