By Topic

2007 41st Annual IEEE International Carnahan Conference on Security Technology

Date 8-11 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 60
  • [Front cover]

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2007, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Welcome from - Ottawa, Canada 2007

    Publication Year: 2007, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (185 KB) | HTML iconHTML
    Freely Available from IEEE
  • Memoriam [Kenneth D. Hopper, 1925-2007]

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (301 KB) | HTML iconHTML
    Freely Available from IEEE
  • Executive Committee Emeritus

    Publication Year: 2007, Page(s): nil5
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • ICCST Executive Committee

    Publication Year: 2007, Page(s): nil6
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • International Advisory Committee

    Publication Year: 2007, Page(s): nil6
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • History note [History of the Carnahan Conference on Security Technology]

    Publication Year: 2007, Page(s):nil7 - nil8
    Request permission for commercial reuse | PDF file iconPDF (736 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Conference History

    Publication Year: 2007, Page(s): nil9
    Request permission for commercial reuse | PDF file iconPDF (976 KB)
    Freely Available from IEEE
  • 2007 IEEE ICCST Program

    Publication Year: 2007, Page(s):nil10 - nil14
    Request permission for commercial reuse | PDF file iconPDF (952 KB)
    Freely Available from IEEE
  • Back-Up Papers

    Publication Year: 2007, Page(s): nil15
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2007, Page(s):nil16 - nil17
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • It's All About the System: Changing the Way We Think About Designing Security Systems

    Publication Year: 2007, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1325 KB) | HTML iconHTML

    Today's world demands new ways of thinking about security solutions. The problem space is complex and ambiguous. Solutions must be multidimensional, incorporating not only technology, but the social, economic, political, and religious dynamics of a security intervention. A facilitator-led experiential training program was designed for our technical staff that leads them out of the box. The course ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Initiative to Improve the State of Information Security at Local Governments in Japan

    Publication Year: 2007, Page(s):8 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2606 KB) | HTML iconHTML

    This paper describes the current state of information security at local governments in Japan and recommends two approaches in order to come up with a better information security management framework. The Hyogo Prefectural Government, which has been playing a leading role in providing measures for safety and security of Japanese society since the Great Hanshin Awaji Earthquake, is used as a good re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical Energy Infrastructure Protection in the Arab Gulf using Multiple Technological Platforms

    Publication Year: 2007, Page(s):18 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1076 KB) | HTML iconHTML

    This paper addresses some basic issues related to protecting the energy infrastructure in the Persian Gulf region. The analysis and models presented in this paper are applicable in Canada and any other part of the world as well. The study describes the general characteristics of the oil production and transportation and their vulnerabilities to terrorist attacks. Then the paper proceeds to present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-Line Signature Verification by Dynamic Time Warping and Gaussian Mixture Models

    Publication Year: 2007, Page(s):23 - 29
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1062 KB) | HTML iconHTML

    Handwriting signature is the most diffuse mean for personal identification. Lots of works have been carried out to get reasonable errors rates within automatic signature verification on-line. Most of the algorithms that have been used for matching work by features extraction. This paper deals with the analysis of discriminative powers of the features that can be extracted from an on-line signature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Quality and Minutiae Count Comparison for Genuine and Artificial Fingerprints

    Publication Year: 2007, Page(s):30 - 36
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1617 KB) | HTML iconHTML

    The vulnerabilities of biometric sensors have been discussed extensively in the literature and popularized in films and television shows. This research examines the image quality of an artificial print as compared to a genuine finger, and examines the characteristics of the two, including minutiae counts and image quality, as repeated samples are taken. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing security with correlation-based fingerprint matching

    Publication Year: 2007, Page(s):37 - 43
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1231 KB) | HTML iconHTML

    The new generation of high resolution and touch-less fingerprint sensors can provide high resolution features, also known as level 3 features, in addition to macroscopic and microscopic features. Level 3 features matching will increase the system security to the governmental and Police levels. Unfortunately, traditional fingerprint matching techniques are not adapted to this new scenario and canno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vascular Biometric Systems And Their Security Evaluation

    Publication Year: 2007, Page(s):44 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1663 KB) | HTML iconHTML

    When considering Biometrics for a Personal Identification System, different modalities have to be considered, as to choose the one that best fits the particular Application Requirements. From the several modalities existing nowadays, Vascular systems have appeared in scene lately. Vein-based identification is claimed to be as reliable as fingerprint or iris, but with the usability of hand geometry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low Cost Multimodal Biometric identification System Based on Hand Geometry, Palm and Finger Print Texture

    Publication Year: 2007, Page(s):52 - 58
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1636 KB) | HTML iconHTML

    This paper presents a multimodal biometric identification system based on the combination of geometrical, palm and finger print features of the human hand. The right hand images are acquired by a commercial scanner with a 150 dpi resolution. The geometrical features are obtained from the binarized images and consist on 15 measures. A support vector machines is used as verifier. The palm print and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Security Threats to Consumers: Hype vs. Reality

    Publication Year: 2007, Page(s):59 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1126 KB) | HTML iconHTML

    Radio frequency identification (RFID) tags are being adopted rapidly by retail giants such as Wal-Mart In the near future these tags will be used for item level tracking of consumer products such as milk cartons, television sets, and clothing. While this technology brings many benefits to consumers, such as increased convenience and efficiency through automation, it has also caused a lot of concer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Risk Management Method Based on the AS/NZS 4360 Standard

    Publication Year: 2007, Page(s):64 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (719 KB) | HTML iconHTML

    This paper presents a new risk management method to analyze general security risks and to determine which countermeasures should be implemented in order to avoid them. It is appropriate for any kind of security users, as it studies the responses from a list of general security questions about different aspects of the studied installation security, circumstances and environment. Australian-New Zeal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Large Applications Against Command Injections

    Publication Year: 2007, Page(s):69 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1795 KB) | HTML iconHTML

    The ability to produce more secure software or to improve the security of existing software is a growing concern and a real challenge for the field of software engineering. Among the various existing types of software vulnerabilities, command injections are particularly common. It is a difficult problem to address, having seemingly endless variations. We present here a unified, formal definition o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Known Shipper Supply Chain Security Solutions in the USA & Europe

    Publication Year: 2007, Page(s): 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Summary form only given. The known shipper concept for air cargo security is an example of a management-based regulatory regime. Firms are required to produce plans that comply with general criteria outlining how to achieve the security goals in question. These plans are subject to approval by regulators, and often developed with their assistance. The plans generally require firms to produce docum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bacterial Survivability and Transferability on Biometric Devices

    Publication Year: 2007, Page(s):80 - 84
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB) | HTML iconHTML

    The purpose of this study was to investigate bacterial recovery and transfer from three biometric sensors and the survivability of bacteria on the devices. The modalities tested were fingerprint, hand geometry and hand vein recognition, all of which require sensor contact with the hand or fingers to collect the biometric. Each sensor was tested separately with two species of bacteria, Staphylococc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.