{"title":"CLASP:一种具有成本效益的外围安全计算机辅助工具","authors":"C. Tarr","doi":"10.1109/CCST.1992.253741","DOIUrl":null,"url":null,"abstract":"The problem of providing cost-effective perimeter security for prisons was addressed by the development of a mathematical model to evaluate a set of performance measures. This model was designed to evaluate perimeter security, starting from the assumption that an escaped person has reached the perimeter, and calculating the chances of preventing a subsequent escape. The author describes the evolution from the initial formulation of a model, to an operational computer software package the current version of which is known as CLASP (computerized layout analysis for secure perimeters). Conclusions about the future prospects of using a computer package for perimeter security decision making are drawn from this experience.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"CLASP: a computerised aid to cost effective perimeter security\",\"authors\":\"C. Tarr\",\"doi\":\"10.1109/CCST.1992.253741\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The problem of providing cost-effective perimeter security for prisons was addressed by the development of a mathematical model to evaluate a set of performance measures. This model was designed to evaluate perimeter security, starting from the assumption that an escaped person has reached the perimeter, and calculating the chances of preventing a subsequent escape. The author describes the evolution from the initial formulation of a model, to an operational computer software package the current version of which is known as CLASP (computerized layout analysis for secure perimeters). Conclusions about the future prospects of using a computer package for perimeter security decision making are drawn from this experience.<<ETX>>\",\"PeriodicalId\":105477,\"journal\":{\"name\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1992.253741\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
CLASP: a computerised aid to cost effective perimeter security
The problem of providing cost-effective perimeter security for prisons was addressed by the development of a mathematical model to evaluate a set of performance measures. This model was designed to evaluate perimeter security, starting from the assumption that an escaped person has reached the perimeter, and calculating the chances of preventing a subsequent escape. The author describes the evolution from the initial formulation of a model, to an operational computer software package the current version of which is known as CLASP (computerized layout analysis for secure perimeters). Conclusions about the future prospects of using a computer package for perimeter security decision making are drawn from this experience.<>