1993 Proceedings of IEEE International Carnahan Conference on Security Technology

13-15 Oct. 1993

Filter Results

Displaying Results 1 - 25 of 49
  • Proceedings of IEEE International Carnahan Conference on Security Technology

    Publication Year: 1993
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Future law enforcement and internal security communications architectures employing advanced technologies

    Publication Year: 1993, Page(s):194 - 202
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB)

    The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrity and security in AM/FM-GIS

    Publication Year: 1993, Page(s):203 - 207
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with form... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying system security using Petri Nets

    Publication Year: 1993, Page(s):244 - 250
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    A tool for verifying security properties of data is described, based on colored Petri nets. A conceptual data model for complex applications and a mandatory security model based on the principles of Bell-LaPadula are presented. The tool operates on such models, using the Petri net analysis techniques, based on the reachability graph. The absence of interference of sensitive associations, the reach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCTV systems; adding value with new technology

    Publication Year: 1993, Page(s):38 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The author examines the impact which new technologies and techniques will have upon both existing and future closed-circuit television (CCTV) systems. He considers devices ranging from video entry phones to advanced surveillance cameras and proposes ways in which value can be added by extending the range of functions which the devices can perform. Examples are presented which show how the value of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference with reception of VLF switching signals transmitted over local powerlines

    Publication Year: 1993, Page(s):224 - 227
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Swiss power companies require controlled load-shedding to limit peak power loads. They can actively shed the load by sending VLF coded signals along local powerlines to "Decabit" receivers which switch the power to boilers and washing machines in homes. Individual switching codes are also used to change kWh meters from a high daytime tariff to a low night tariff from 10 pm to 6 am. Users of such s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and selection of communication security equipment

    Publication Year: 1993, Page(s):208 - 214
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    The author addresses criteria for selecting communications security (COMSEC) equipment into existing and planned communications systems. Specific areas addressed include needs, threats, value of information, response to threats, user interface issues, key management considerations, cryptographic types, future requirements, compatibility, special COMSEC characteristics, host nation connection appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reduction of nuisance alarms in exterior sensors using ESP

    Publication Year: 1993, Page(s):251 - 253
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Rain has always been a big problem for outdoor intrusion systems, making it necessary to choose between nuisance alarms and poor detection. The author reports on extensive environmental tests and describes a signal processing technique called ESP (enhanced signature processing). This effort produced a detection improvement of approximately 10 dB while suppressing the effects of rain-induced noise ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple motion detection methods in TV image for security purposes

    Publication Year: 1993, Page(s):41 - 43
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    The authors present some simple detection procedures and algorithms for TV security systems implemented on a standard PC for detection and localization of targets. The approach is based on motion detection and target identification procedures suitable for fast and efficient image processing on relatively simple hardware. Both the classical approach (spatiotemporal filtering) and a neural-network-o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concrete at high temperatures above 1000°C

    Publication Year: 1993, Page(s):263 - 268
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Ordinary concrete samples made from the most common Portland Type I cement as well as some uncommon glossy-looking concrete lumps collected from an actual fire scene have been examined using thermal gravity analysis (TGA), differential thermal analysis (DTA), X-ray diffraction, and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) with the aid of an unsealed furnace. Chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on employing traditional Chinese medical knowledge in polygraphy technology

    Publication Year: 1993, Page(s):15 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    A study has been carried out on the use of a polygraph to analyze the psychological reaction intensity difference between the acupoints and the other parts of the human body. The results of employing traditional Chinese medical knowledge in polygraphic technology are presented. The feasibility of the application of acupuncture to lie detection is examined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks

    Publication Year: 1993, Page(s):171 - 188
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1012 KB)

    The authors describes recent experience in countering the growing problem of network integrity security threats. He outlines the need for a security baseline standard for all SS7 (Signaling System #7) networked service providers. In describing the evolving intrusion threats to the global public network, he defines and comments on the seriousness of the problem. The important concept emphasized is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic approach to reconstruct crime scene based on mark-theory

    Publication Year: 1993, Page(s):228 - 234
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The authors consider the use of a CD model to reconstruct a crime scene using the technology of artificial intelligence, with particular reference to gunshot-caused bloodstain evidence. They attempt to incorporate the domain knowledge of mark theory and the experiences of investigators in their expert system, which helps both the investigators and qualifies practitioners to gain enough evidence fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal processing of gravitational field detector for prediction of large seismic waves

    Publication Year: 1993, Page(s):215 - 218
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    The author describes the basic concept and signal processing of a gravitational field detector for prediction of large seismic waves. When the seismograph and the gravitational field detector are set at the same place, the seismograph does not respond until the arrival of the primary wave, but the gravitational field detector will respond to the gravitational field before the primary wave arrival.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk-based approach to design and maintenance of alarm systems for security

    Publication Year: 1993, Page(s):254 - 258
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    Risk-based approaches to the design and maintenance of an alarm system for security are presented. Based on the values of its sensors, the security alarm system identifies all enemies entering the system. In the design problem, a simple systematic method is given to obtain the minimal combination of sensors that can identify all enemies with the minimal error risk. In the maintenance problem, a si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast response CCTV image recall and motion detection

    Publication Year: 1993, Page(s):44 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    An Advanced Alarm Assessment System has resulted from the merging of two CCTV (closed-circuit television) related technologies: (1) a Presearch Image Capture System (PICS) which captures and displays images from before and after an intrusion alarm; and (b) an IMAGO series video sentry and target tracker which detects motion and, optionally, controls camera pan/tilt. The new technology MPICS (Motio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The importance of the site survey in planning and implementing an electronic security system

    Publication Year: 1993, Page(s):58 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    It is noted that the conduct of a detailed site survey is critical to the successful implementation of an electronic security system. The author discusses the rationale for a site survey, the contents of the survey report, and the planning of the site survey, and the composition of the site survey team View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmitting multiple secrets securely in broadcasting networks

    Publication Year: 1993, Page(s):19 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    A method is presented which permits a broadcasting mechanism to securely transmit a single ciphertext with multiple messages. These messages will only be readable by those users who have the appropriate read key(s). The other messages will be undecipherable. This is a generalization of the secure broadcasting problem stated by G. H. Chiou and W. T. Chen (1989) and C. C. Chang and C. H. Lin (1988).... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using smart cards to authenticate passwords

    Publication Year: 1993, Page(s):154 - 156
    Cited by:  Papers (2)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The potential of intelligent vehicle highway systems for enhanced traveler security

    Publication Year: 1993, Page(s):117 - 119
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The author addresses some of the possible security functions that could be applied to transit systems by utilizing the availability of automatic vehicle location systems, broadband digital communication systems, and other IVHS (intelligent vehicle highway systems) functions. Emphasis is placed on the opportunities for security enhancements under the IVHS component for transit, called Advanced Publ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations in outdoor intrusion sensor testing

    Publication Year: 1993, Page(s):66 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The author reviews the role of a test site for outdoor intrusion sensor testing in a commercial environment and describes its application to sensor research, development, product verification, and training. Elements of a test site are reviewed along with its varied uses in the bringing of new sensors to market and performing comparative analyses of existing technologies. Particular references and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WIDE (Wireless Integrated Digital Equipment) System

    Publication Year: 1993, Page(s):189 - 193
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    To deal flexibly with interprefectural criminal cases, the National Police Agency (NPA) developed the mobile radio communication system, the WIDE (Wireless Integrated Digital Equipment) system. The WIDE system, which is usually used for telephone communications, provides a wholesale command function in the event of interprefectural criminal cases. Its wholesale command function makes it possible t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of computer-aided design software with standards for security engineering

    Publication Year: 1993, Page(s):235 - 243
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    The authors give an overview of the development of computer-aided design (CAD) software with standards for security engineering. The intent of the developed software is to increase design productivity and generate CAD standards for security engineering View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCTV operator performance and system design

    Publication Year: 1993, Page(s):32 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    The introduction of the Rotakin test is shown to be an important step toward improving the performance of closed-circuit television (CCTV) systems. Analysis of the alarm event process calls attention to the areas of sensitivity whereby the system can fail. Reference to knowledge in the human visual performance field makes it possible to improve the images presented to the operator, thereby permitt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cryptographic system based upon the continued fraction

    Publication Year: 1993, Page(s):219 - 223
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    The authors propose a cryptographic system in which the sender and the receiver hold the same secret key. The system is a one-key system while the RSA system is a public-key system in which the enciphering key and the deciphering key are not identical. The encoding function in the proposed system is based on a linear equation with two variables. The processes of encoding and decoding are simple in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.