1993 Proceedings of IEEE International Carnahan Conference on Security Technology

13-15 Oct. 1993

Filter Results

Displaying Results 1 - 25 of 49
  • Proceedings of IEEE International Carnahan Conference on Security Technology

    Publication Year: 1993
    Request permission for commercial reuse | |PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks

    Publication Year: 1993, Page(s):171 - 188
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1012 KB)

    The authors describes recent experience in countering the growing problem of network integrity security threats. He outlines the need for a security baseline standard for all SS7 (Signaling System #7) networked service providers. In describing the evolving intrusion threats to the global public network, he defines and comments on the seriousness of the problem. The important concept emphasized is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New ways of explosive booby traps at the international terroristic actions

    Publication Year: 1993, Page(s):85 - 87
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (324 KB)

    The author classifies the various types of traditional and recent explosive booby traps (EBTs), and gives an interview of the international situation concerning EBTs. He clarifies some possible optimal ways to minimize the deadly applications of EBTs View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WIDE (Wireless Integrated Digital Equipment) System

    Publication Year: 1993, Page(s):189 - 193
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (196 KB)

    To deal flexibly with interprefectural criminal cases, the National Police Agency (NPA) developed the mobile radio communication system, the WIDE (Wireless Integrated Digital Equipment) system. The WIDE system, which is usually used for telephone communications, provides a wholesale command function in the event of interprefectural criminal cases. Its wholesale command function makes it possible t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic approach to reconstruct crime scene based on mark-theory

    Publication Year: 1993, Page(s):228 - 234
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (460 KB)

    The authors consider the use of a CD model to reconstruct a crime scene using the technology of artificial intelligence, with particular reference to gunshot-caused bloodstain evidence. They attempt to incorporate the domain knowledge of mark theory and the experiences of investigators in their expert system, which helps both the investigators and qualifies practitioners to gain enough evidence fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Installation of external intrusion detectors in harsh environments

    Publication Year: 1993, Page(s):72 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (240 KB)

    The installation of external intrusion detectors in the Australian environment is considered, taking into account topography, climate, and local fauna specific to Australia. The author considers a number of difficult sites experienced and the techniques and on-site testing used to ensure satisfactory installation. Attention is given to the installation of external passive infrared detectors, infra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast response CCTV image recall and motion detection

    Publication Year: 1993, Page(s):44 - 46
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (144 KB)

    An Advanced Alarm Assessment System has resulted from the merging of two CCTV (closed-circuit television) related technologies: (1) a Presearch Image Capture System (PICS) which captures and displays images from before and after an intrusion alarm; and (b) an IMAGO series video sentry and target tracker which detects motion and, optionally, controls camera pan/tilt. The new technology MPICS (Motio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adsorption/desorption GC assisted with retention index comparison of peaks for the identification of accelerants in fire residues

    Publication Year: 1993, Page(s):88 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (488 KB)

    The authors present both an efficient sample preparation procedure and a highly discriminating gas chromatographic (GC) method for the identification of accelerants in fire residues. A purge-and-trap concentrator fitted with a carbotrap adsorbent tube was used to preconcentrate the accelerants from various fire residues. The resultant sample tubes were submitted to a thermal desorption unit (TDU) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concrete at high temperatures above 1000°C

    Publication Year: 1993, Page(s):263 - 268
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB)

    Ordinary concrete samples made from the most common Portland Type I cement as well as some uncommon glossy-looking concrete lumps collected from an actual fire scene have been examined using thermal gravity analysis (TGA), differential thermal analysis (DTA), X-ray diffraction, and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) with the aid of an unsealed furnace. Chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using smart cards to authenticate passwords

    Publication Year: 1993, Page(s):154 - 156
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (252 KB)

    A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem

    Publication Year: 1993, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (128 KB)

    Two attacks are given to show that the identity-based signature scheme proposed by C. C. Chang and C. H. Lin (1991) based upon Rabin's public key cryptosystem is not secure enough. One of the attacks is based on the conspiracy of two users in the system while the other can be performed by anyone alone. It is shown that, in this second attack, the scheme can be broken by anyone (not necessarily a u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future law enforcement and internal security communications architectures employing advanced technologies

    Publication Year: 1993, Page(s):194 - 202
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1016 KB)

    The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of computer-aided design software with standards for security engineering

    Publication Year: 1993, Page(s):235 - 243
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (292 KB)

    The authors give an overview of the development of computer-aided design (CAD) software with standards for security engineering. The intent of the developed software is to increase design productivity and generate CAD standards for security engineering View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced passive infrared presence detectors as key elements in integrated security and building automation systems

    Publication Year: 1993, Page(s):75 - 77
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (360 KB)

    The role of the passive infrared (PIR) motion detector is reviewed. It is noted that, currently, it is peripheral component of security systems, installed to overlook a specific area. Future needs for integrated building automation systems require more powerful sensors that approach true presence detection, in order to provide the basic information from every room: the presence of people. From suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cryptographic system based upon the continued fraction

    Publication Year: 1993, Page(s):219 - 223
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (172 KB)

    The authors propose a cryptographic system in which the sender and the receiver hold the same secret key. The system is a one-key system while the RSA system is a public-key system in which the enciphering key and the deciphering key are not identical. The encoding function in the proposed system is based on a linear equation with two variables. The processes of encoding and decoding are simple in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transferring technology to the terrain

    Publication Year: 1993, Page(s):60 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB)

    The author highlights a number of areas in which designers, specifiers, and system operators of perimeter intruder detection system (PIDSs) should be careful to pay particular attention to whether the full benefits of existing technology, and new technologies can be transferred from the supplier's warehouse into reliable operational systems on site. He recommends a thorough survey in close coopera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New evaluation methods for reducing environment effects in radar detection

    Publication Year: 1993, Page(s):143 - 144
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (212 KB)

    Dornier has developed a radar intrusion detection sensor (RADOBS) which largely eliminates environmental and ambient effects such as rain and electromagnetic interference. RADOBS is a monostatic pulse Doppler miniradar for mobile and stationary use. The system can be installed in two versions: RADOBS-R for omnidirectional detection by means of a ring zone and RADOBS-V with a directed sector zone. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic video image moving target detection for wide area surveillance

    Publication Year: 1993, Page(s):47 - 57
    Cited by:  Papers (6)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB)

    Two image processing techniques developed for moving target indication from video infrared imagery in natural scenes are presented. It is shown that frequency domain spatio-temporal filtering of video sequences and spatio-temporal constraint error of image frame pairs are able to detect and track moving targets (e.g., personnel) in natural scenes in spite of low image contrast, changes in the targ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal allocation of security sensors/guards-graph theoretic approach

    Publication Year: 1993, Page(s):134 - 138
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (280 KB)

    The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are gi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two complementary approaches to the full identification of automobile paints

    Publication Year: 1993, Page(s):96 - 105
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (588 KB)

    Pyrolysis/gas chromatography (Py-GC) and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) are two commonly used methods for the identification of automobile paints. Some modifications were made on the conventional Py-GC to improve its discriminating power. Twelve exemplar samples of similar white remedy paint chip were unambiguously differentiated using this method. To f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart card, computer security, access control, cryptology

    Publication Year: 1993, Page(s):157 - 158
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (120 KB)

    An alternative approach to applications which need expensive smart cards with cryptoprocessors is suggested. The idea is to perform cryptographic features in special smart card reading devices. Thus, the price of data protection and access control in computing systems and networks may be substantially reduced. In most applications cheap EEPROM smart cards can be used instead of microprocessor card... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCTV operator performance and system design

    Publication Year: 1993, Page(s):32 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (392 KB)

    The introduction of the Rotakin test is shown to be an important step toward improving the performance of closed-circuit television (CCTV) systems. Analysis of the alarm event process calls attention to the areas of sensitivity whereby the system can fail. Reference to knowledge in the human visual performance field makes it possible to improve the images presented to the operator, thereby permitt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrity and security in AM/FM-GIS

    Publication Year: 1993, Page(s):203 - 207
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (416 KB)

    The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with form... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The potential of intelligent vehicle highway systems for enhanced traveler security

    Publication Year: 1993, Page(s):117 - 119
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (248 KB)

    The author addresses some of the possible security functions that could be applied to transit systems by utilizing the availability of automatic vehicle location systems, broadband digital communication systems, and other IVHS (intelligent vehicle highway systems) functions. Emphasis is placed on the opportunities for security enhancements under the IVHS component for transit, called Advanced Publ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying system security using Petri Nets

    Publication Year: 1993, Page(s):244 - 250
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (556 KB)

    A tool for verifying security properties of data is described, based on colored Petri nets. A conceptual data model for complex applications and a mandatory security model based on the principles of Bell-LaPadula are presented. The tool operates on such models, using the Petri net analysis techniques, based on the reachability graph. The absence of interference of sensitive associations, the reach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.