Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

23-25 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

    Publication Year: 2000
    Request permission for commercial reuse | |PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 15
    Request permission for commercial reuse | |PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Knowledge management in industry and government: the conflict between security and knowledge sharing

    Publication Year: 2000, Page(s):160 - 169
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB)

    Today the trend in both industry and government is to establish electronic knowledge management systems based upon trust and sharing that connect thousands of users. Corporations are linking as many as 85,000 employees, supplying them with information at their desktops. Connecting all Department of Energy facilities involves over 100,000 people. While electronic security problems in industry can p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electrostatic field detectors, the seaside and the desert wind?

    Publication Year: 2000, Page(s):151 - 159
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (588 KB)

    In the early 1960's the first ideas were developed by leading companies in Germany (Siemens, Wachtel, etc) to design an intrusion detection system following a capacitance measurement principle. The first detection electronics and set-ups were designed for indoor use (jewellery shops, museums, etc..) but in 1964 the first capacitive detectors for outdoor use i.e. perimeter security systems appeared... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio frequency-based personnel location systems

    Publication Year: 2000, Page(s):141 - 150
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (944 KB)

    This paper presents the technologies available to locate the origin of radio frequency transmissions for Personnel Location Systems. The development and application of these systems will be discussed. A new class of signal strength location systems will be introduced that sets the standard for locating accuracy in indoor and campus environments. Many technologies have been applied to locating radi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assisting the UK government's CCTV initiative

    Publication Year: 2000, Page(s):113 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (368 KB)

    The paper discusses the technology being used in a UK Government initiative under which £153m is being made available to “crime reduction partnerships” in England and Wales to install CCTV in public areas. The aim is to reduce crime and the fear of crime. So far, the Government has awarded a total of £33m to more than 180 schemes. The perception in Government circles is tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing information and operations in a smart card through biometrics

    Publication Year: 2000, Page(s):52 - 55
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (404 KB)

    Many systems need portable media in which to store sensible data, such as smart cards. The information can be protected by the user with their personal identification number (PIN), or through biometrics. Unfortunately, there isn't a smart card that can verify the biometric template inside it, performing this task in the terminal. The author has developed algorithms and data structures needed to so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screener threat detection performance with three dimensional X-ray imaging

    Publication Year: 2000, Page(s):178 - 191
    Cited by:  Papers (2)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (688 KB)

    The paper covers the test and evaluation of screener performance using three-dimensional (3D) X-ray presentation versus the conventional two-dimensional (2D) X-ray projection. The application of 3D imaging is currently being used in the medical and environmental industry. Just recently, 3D imaging has been applied to X-ray machines for aviation security. In particular the AXis 3DTM was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trunking versus conventional radio systems

    Publication Year: 2000, Page(s):137 - 140
    Cited by:  Papers (1)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (372 KB)

    Correctional Service Canada (CSC) has recently replaced the ageing, out-of-date radio communications systems in all major CSC facilities with new conventional digital radio systems. Based on very specific and restrictive operational requirements coupled with developments in digital radio technology and the Associated Public Communications Officers (APCO) Project 25 digital radio standards, it was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operational requirements for security measures

    Publication Year: 2000, Page(s):64 - 70
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (504 KB)

    Many physical and procedural security measures have not met users' needs because the implications of what is required have not been fully thought through. An operational requirement is a statement of needs based upon a thorough and systematic assessment of the problems to be solved and the hoped for outcomes. It should provide the link between a high level need and the system procurement process. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggressive lighting [security]

    Publication Year: 2000, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (788 KB)

    A review of glare lighting systems installed on UK Government sites has identified that there were inconsistencies between installations. This prompted the study on which the paper is based. The idea of using bright light shining outwards from a secure perimeter as an aid to security is not new. The lighting is intended to provide a glare field which inhibits persons approaching the site from perc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMETHYST: automatic alarm assessment: operational experience

    Publication Year: 2000, Page(s):107 - 112
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (648 KB)

    The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by using video assessment to enhance the Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS alarms and pass to an operator only those alarms that are likely to be caused by an intruder. It will t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric identification system using a radial basis network

    Publication Year: 2000, Page(s):47 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (252 KB)

    The paper describes an efficient face identification method using a probabilistic neural net. Our system is compared to the method presented at ICCST'99, based on the Karhunen-Loeve transform for feature extraction (reduction of dimensionality of the input image), and a feedforward multilayer perceptron neural net, implemented as a classifier device, that performed the identification process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novelty in synergistic radar technology, by adding intrusion location capability

    Publication Year: 2000, Page(s):29 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (452 KB)

    There is a new trend in the outdoor security market that demands more precision in identifying the crossing area of an intruder. Often called “intrusion location capability”, this capability also presents inherent features such as; more accuracy in camera pre-set positioning, temporary disabling of sub-zone and individual sensitivity level per sub-zone. However, even though the market ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Miniaturized explosives preconcentrators for use in man-portable explosives detection systems

    Publication Year: 2000, Page(s):222 - 227
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (372 KB)

    This paper describes the function and testing of miniaturized chemical concentrating devices that are designed to enhance the capabilities of portable trace explosive detection systems, such as those based on ion mobility spectrometry (IMS). These preconcentrators are based upon a patented design first developed for use in personnel portals, in which explosive vapor and/or residue is adsorbed onto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability assessment of a bottle content tester for use in airports by screeners

    Publication Year: 2000, Page(s):174 - 177
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (248 KB)

    Explosives may be concealed as a liquid or slurry in bottles in carry-on or checked baggage. To alleviate the uncertainty associated with screening liquid containers, devices are currently in development to screen bottles. These bottle-screening devices will provide a mechanism for airport security personnel to quickly and precisely examine liquids in bottles. Currently, airport security personnel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CATV - interactive security and communication system

    Publication Year: 2000, Page(s):124 - 136
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (596 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are arising and new services are being established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop and establish such services, the dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BioIS study. Comparative study of biometric identification systems

    Publication Year: 2000, Page(s):60 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB)

    On 1st April 1999, work on the a.m. BioIS Study commenced. This study was initiated by the Federal Criminal Investigation Office of Germany (BKA) in close cooperation with the German Information Security Agency (BSI). The study includes a field investigation, in which 11 physiological (static) and behaviour-specific (dynamic) systems, which were available and supported in Germany, were installed a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical considerations in site access management systems

    Publication Year: 2000, Page(s):77 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (604 KB)

    Site Access Management Systems (SAM) within the UK have evolved throughout the 90's, utilising increasingly more powerful and sophisticated hardware, more advanced communications services, and more effective software, thus providing improved user interfaces and better data/image handling characteristics. The requirement for SAMS in secure establishments came about from a desire to increase the act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Barriers [security]

    Publication Year: 2000, Page(s):100 - 106
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (588 KB)

    It is widely accepted that a single barrier or a series of barriers can protect a secure site from attack. Although the presence of a barrier may deter an attack, in many cases its most important function is to delay an attack. A barrier is considered effective if it can delay an attacker for a period longer than it takes a response force to respond to the attack. At present, there are varying vie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of feature extraction techniques in automatic face recognition systems for security applications

    Publication Year: 2000, Page(s):40 - 46
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (632 KB)

    The paper is aimed at analyzing the performance of two different state-of-the-art automatic face recognition systems. One of the key issues regarding face recognition is the election of convenient features for representing identity in facial images. Multivariate analysis and Gabor analysis are alternative methods for accomplishing this feature extraction stage. Consequently, two different approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelli-FIELDTM the next generation, electrostatic field disturbance sensor

    Publication Year: 2000, Page(s):22 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB)

    Outdoor perimeter volumetric field disturbance sensors must reliably detect perturbations to the field caused by an intruder, while rejecting noise and environmental changes that may be orders of magnitude greater than the target response. Currently, E-Field(R) systems are widely deployed in nuclear, correctional and industrial sites to provide perimeter security. These systems are eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Blast/FX, an explosive effects analysis software tool

    Publication Year: 2000, Page(s):218 - 221
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (332 KB)

    Recent events have highlighted the threat posed by terrorist bombings. To address these evolving security concerns, the FAA identified the need to have an improved capability to assess the effects of explosions against civil aviation facilities and their occupants. For many engineers and security specialists, the need to assess the risks to buildings from explosions represents a new and often impo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated detection system for large vehicle-bombs

    Publication Year: 2000, Page(s):201 - 206
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (524 KB)

    The Large Vehicle-Bomb Detection System (LVBDS), an automated drive-through system capable of detecting and identifying several explosive and taggant materials, is described. LVBDS is a fully automatic system, integrating trace chemical explosives detection with access control and video monitoring components to assist in the identification of a vehicle and driver. Although it is readily adaptable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication

    Publication Year: 2000, Page(s):242 - 250
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (864 KB)

    With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information, including news reports, stock fluctuations, mobile banks, e-commerce and browse the Internet at any time, anywhere. For current devices with lower power and finite computing capability, it is not suitable to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.