Scheduled Maintenance on May 23rd, 2017:
IEEE Xplore will undergo an upgrade from 1:00 - 4:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology

24-24 Oct. 2002

Filter Results

Displaying Results 1 - 25 of 38
  • Proceedings IEEE 36th Annual 2002 International Carnahan Conference on Security Technology (Cat. No.02CH37348)

    Publication Year: 2002
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Critical asset protection, perimeter monitoring and threat detection using automated video surveillance - a technology overview with case studies

    Publication Year: 2002
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB)

    Summary form only given. The appeal of automated real-time surveillance is obvious - maximizing efficiency and effectiveness of security personnel and resources while increasing the probability of preventing a serious security breach. The appeal of using video-based solutions includes many considerations. Video is intuitive, readily interpreted and provides immediately actionable intelligence abou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion signature analysis for microwave detection systems

    Publication Year: 2002, Page(s):60 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    The motion signature concept is based on the postulate that an object moving in the beam of a microwave detection system will induce a distinct pattern in the received signal level. It has been proposed that this concept could be used in microwave systems to distinguish between human and non-human movement, hence facilitating superior detection performance. This paper describes an independent stud... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linescan imaging of ballistics projectile markings for identification

    Publication Year: 2002, Page(s):216 - 222
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    The identification of firearms from forensic ballistics specimens is an exacting and intensive activity performed by specialists with extensive experience. The introduction of imaging technology to assist the identification process of firearms has enhanced the ability of forensic ballisticians to conduct analyses of these specimens for identification. The characteristic markings on the cartridge a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system and method for enhanced psychophysiological detection of deception

    Publication Year: 2002, Page(s):50 - 59
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (717 KB) | HTML iconHTML

    Through the pairing of perception (from our sensory systems - visual, auditory, and kinesthetic or VAK) with our representation systems (PS), deception reveals itself by multiple unconscious analog and digital language cues. Thus, indications that a person is being truthful, lying, or actively being deceptive can be recorded and analyzed using devices such as an electroencephalogram (EEG) or magne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compulsive voting

    Publication Year: 2002, Page(s):124 - 133
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    If quizzes, and even polls, are commonly understood not to be good examples of fair and reliable procedures, when they take place on the Internet people's fears are fully justified, at least until their organizers take their security more seriously into account. Nowadays, many of these quizzes and polls with prizes are being manipulated by not especially skilled people using nearly off-the-shelf t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An infrastructure vulnerability assessment methodology for metropolitan areas

    Publication Year: 2002, Page(s):29 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    This paper highlights an infrastructure assessment methodology that can be applied to a metropolitan area or geographical region. The methodology considers and accommodates infrastructure component significance, destructive events (both malevolent acts and natural disasters), and the consequences of a destructive event. The methodology is applied in a logical, sequenced fashion and uses algorithms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CATV security architecture

    Publication Year: 2002, Page(s):209 - 215
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    The areas of television, telecommunication, and information technology are converging, new application areas are arising and new services are being established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop and establish such services, the dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information systems security in an airport environment

    Publication Year: 2002, Page(s):154 - 157
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    The Information Technology Management Reform Act of 1995 (ITMRA), also known as the Clinger-Cohen Act, requires the Chief Information Officers (CIO) of the Executive agencies of the government to develop, maintain and facilitate the implementation of a sound and integrated information technology architecture. The CIOs are responsible to ensure that information security policies, procedures and pra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Microprocessor smart cards with fingerprint user authentication

    Publication Year: 2002, Page(s):46 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Due to the great increase in information technology systems where user authentication is needed, security relies on using PINs or passwords. The scientific community is trying to improve biometric techniques in order for them to be accepted as an alternative to other user authentication schemes. One sector where user identity must be verified is identification cards. In fact, if high level securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving security in information technology using cryptographic hardware modules

    Publication Year: 2002, Page(s):120 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc. But many other security holes have appeared in this kind of applications, making the improvements ach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Flow: a totally integrated transportation security system

    Publication Year: 2002, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Secure Flow is a holistic, integrated methodology that addresses all security vectors (paths that a terrorist may take to introduce a threat object into the transportation system), allowing people, baggage, and cargo to move via various transportation systems in a secure fashion, while maintaining an "ease of access" to these diverse systems through innovative technology, procedures, and training.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMETHYST: automatic alarm assessment

    Publication Year: 2002, Page(s):202 - 208
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    The aim of the AMETHYST (AutoMatic Event auTHentication sYSTem) project is to encourage the development of a high-performance, perimeter-alarm verification system that, using computer-vision, automatically rejects false alarms. AMETHYST will pass to an operator only those alarms that are caused by an intruder. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security system throughput modeling

    Publication Year: 2002, Page(s):144 - 150
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    One of the keys to integrating 100% checked bag screening into airports is identifying realistic throughput rates of various explosive detection system (EDS) machines available to Transportation Security Administration (TSA) planners. This study discusses some of the issues associated with the implementation of EDS equipment and performs an analysis on the throughput of the equipment using modelin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematical morphology approaches for fingerprint thinning

    Publication Year: 2002, Page(s):43 - 45
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Our paper describes the design and implementation of a fingerprint thinning algorithm by means of morphological image processing operations, in order to improve the minutiae map involved. The final goal is to incorporate the thinning algorithm proposed with the minutiae extraction algorithm for fingerprint identification systems, developed and presented at IEEE ICCST'01. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the use of trusted objects to enforce isolation between processes and data

    Publication Year: 2002, Page(s):115 - 119
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    This paper highlights the problem of run-time execution correctness of high-consequence applications in conventional Von Neumann computer architectures. It proposes an approach, trusted objects, in which the application program and data are cryptographically encapsulated in their own environment. The remainder of the paper is organized as follows: after presenting a description of trusted objects,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • US Department of Energy security technologies

    Publication Year: 2002, Page(s):19 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    For over 40 years, the US Department of Energy (DOE) has maintained a program that develops technologies to support safeguards and security policies in the protection of nuclear weapons facilities. Basic security system engineering concepts are still valid, the details of the systems at DOE facilities must constantly be updated to respond to the emerging terrorist threat and capabilities and the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some remarks on very high-rate image compression and its impact on security image data subjective evaluation

    Publication Year: 2002, Page(s):198 - 201
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    The paper deals with selected problems of image transmission through extremely narrow communication channels using very high compression rates. Such conditions are very common in the security technology field. The same problem relates to image retrieval systems when limited storage capacity is available. As an example of a typical security scenario, a seven-segment display was chosen and compresse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel sensor application to increase security of prisoners in community hospitals

    Publication Year: 2002, Page(s):71 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Prisoners in Her Majesty's (HM) Prison Service establishments who require medical treatment are currently taken under guard to civilian community hospitals. PSDB have investigated various means of increasing the security of these prisoners, especially those regarded as presenting a significant risk of escape. PSDB developed the operational requirement for a mattress based pressure sensor alarm sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital video recorder selection for a casino

    Publication Year: 2002, Page(s):223 - 227
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Most casino's CCTV systems still use analog video tape recording but Surveillance Managers within these facilities have to consider the move to digital. The reasons for using digital technology are now quite well understood; better image quality, system flexibility, instant access to images and improved management with no tapes to change and store. Treasure Island spent one and a half years resear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migration of Internet security protocols to the IPSEC framework

    Publication Year: 2002, Page(s):134 - 143
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    Nowadays it is clear that security protocols will implement a very important part of the communications accomplished through the future Internet. Efforts made by the IETF have produced the first Internet Protocol version that includes security services, this framework is called IPSEC and it is a flexible solution designed taking into account the heterogeneity of the Internet. In fact the IPSEC mec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiscale analysis for iris biometrics

    Publication Year: 2002, Page(s):35 - 38
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    In this work, a new biometric identification approach based on the human iris pattern is proposed. The main idea of this technique is to represent features of the iris by multiscale analysis of the corresponding discrete dyadic wavelet transform zero-crossing representation. In this study we consider the iris signature as the mean of the gray values of different contours of virtual circles in a de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart card technology with case studies

    Publication Year: 2002, Page(s):158 - 159
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Smart card technology not only enables secure access to logical and physical applications but also provides inherent value in the areas of security, authentication and multi-application capabilities for a variety of industries in the areas of transportation, banking, telecommunications and public sector. The impact of society on the use of security systems and technology enabled with smart card te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First response to terrorist bombings

    Publication Year: 2002, Page(s):88 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    This paper highlights considerations for a successful response to an incident involving a terrorist bombing. First, it describes the characteristics of bombing as a tactic that make the threat of a bombing highly relevant in a world where the emphasis has shifted to other weapons of mass destruction, such as chemical, biological, and nuclear weapons. It then identifies the roles and responsibiliti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.