Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

23-25 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Applications of Blast/FX, an explosive effects analysis software tool

    Publication Year: 2000, Page(s):218 - 221
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Recent events have highlighted the threat posed by terrorist bombings. To address these evolving security concerns, the FAA identified the need to have an improved capability to assess the effects of explosions against civil aviation facilities and their occupants. For many engineers and security specialists, the need to assess the risks to buildings from explosions represents a new and often impo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Laser based explosives detection

    Publication Year: 2000, Page(s):207 - 217
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Transport Canada (TC) and the Federal Aviation Administration (FAA) have been active players in the research and development of trace explosive detection systems (TEDS). Under the direction of TC, private industry has been asked to develop devices meeting more and more stringent criteria. The recent development of a specification for TEDS by TC will provide industry with a clear blueprint for deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated detection system for large vehicle-bombs

    Publication Year: 2000, Page(s):201 - 206
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The Large Vehicle-Bomb Detection System (LVBDS), an automated drive-through system capable of detecting and identifying several explosive and taggant materials, is described. LVBDS is a fully automatic system, integrating trace chemical explosives detection with access control and video monitoring components to assist in the identification of a vehicle and driver. Although it is readily adaptable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The RADAR Flashlight three years later: an update on developmental progress

    Publication Year: 2000, Page(s):257 - 259
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The RADAR Flashlight was developed to be a law enforcement tool. It can detect the respiration signature of a motionless individual standing up to 5 meters behind a 20 centimeter hollow core concrete block wall. Wooden doors typical of those found on most homes are almost transparent to the system. Dry plywood, particle board and wall board do not attenuate the signal significantly. Most system ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction of site access management systems across the defence estate

    Publication Year: 2000, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The paper examines the introduction by the UK's Ministry of Defence (MOD) of Site Access Management Systems (SAMS, formerly known as Technical Access Control Systems (TACS)) into the Defence Estate. The MOD's association with SAMS came about as a result of a number of events that focused the attention of the MOD on the need to explore all options to better the security of access, particularly in r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of an on-the-job training mastery test

    Publication Year: 2000, Page(s):197 - 200
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    The effectiveness of the national aviation security system is highly dependent upon people, especially those employed as checkpoint screeners. The training of these individuals is critical to their performance on the job (K. Moore, 1991). The Federal Aviation Administration (FAA) is very interested in enhancing screener training and further improving their readiness for the job. The FAA's aviation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Electronic Post Office

    Publication Year: 2000, Page(s):251 - 256
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    This paper describes the Secure Electronic Post Office (SEPO), a new electronic mail (e-mail) system that provides authentication, authorization, secure communications, pipeline, multiple receiver, anti-reply attack, assurance of message reception and routing control. SEPO is easy to implement, cross-platform, to build a regional or global e-mail system. For the internationalization purpose, the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operational requirements for security measures

    Publication Year: 2000, Page(s):64 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Many physical and procedural security measures have not met users' needs because the implications of what is required have not been fully thought through. An operational requirement is a statement of needs based upon a thorough and systematic assessment of the problems to be solved and the hoped for outcomes. It should provide the link between a high level need and the system procurement process. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development and validation of a test of X-ray screener readiness

    Publication Year: 2000, Page(s):192 - 196
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Advances in the threat against civil aviation have made it imperative that all security screening personnel have mastered critical knowledge, skills, and abilities for their position at the checkpoint. To accurately assess the level of screener mastery, the FAA plans to field a valid, reliable, and non-biased test for initial screener training: the Screener Readiness Test (SRT). This new approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric identification system using a radial basis network

    Publication Year: 2000, Page(s):47 - 51
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    The paper describes an efficient face identification method using a probabilistic neural net. Our system is compared to the method presented at ICCST'99, based on the Karhunen-Loeve transform for feature extraction (reduction of dimensionality of the input image), and a feedforward multilayer perceptron neural net, implemented as a classifier device, that performed the identification process View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure databases: state of the art

    Publication Year: 2000, Page(s):228 - 237
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Most of the relational database management systems (RDBMS) used nowadays provide some limited security mechanisms, and facilities offer capabilities to define roles and establish audit trails. Users of RDBMSs are used to working with discretionary access control (DAC) policies. This kind of security is sufficient for a great majority of information systems, however an increasing number of organisa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fire detection with temperature sensor arrays

    Publication Year: 2000, Page(s):262 - 268
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    We show how to locate a fire in a closed room by an array of sophisticated temperature sensors. Solving this problem enables not only the automatic fire extinguishing in buildings such as museums, warehouses, shopping malls, computer rooms, etc., but also a better understanding of the causes of fire. Consequently, this approach might be also very useful for fire prevention and fire detection View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggressive lighting [security]

    Publication Year: 2000, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    A review of glare lighting systems installed on UK Government sites has identified that there were inconsistencies between installations. This prompted the study on which the paper is based. The idea of using bright light shining outwards from a secure perimeter as an aid to security is not new. The lighting is intended to provide a glare field which inhibits persons approaching the site from perc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication

    Publication Year: 2000, Page(s):242 - 250
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information, including news reports, stock fluctuations, mobile banks, e-commerce and browse the Internet at any time, anywhere. For current devices with lower power and finite computing capability, it is not suitable to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management in industry and government: the conflict between security and knowledge sharing

    Publication Year: 2000, Page(s):160 - 169
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Today the trend in both industry and government is to establish electronic knowledge management systems based upon trust and sharing that connect thousands of users. Corporations are linking as many as 85,000 employees, supplying them with information at their desktops. Connecting all Department of Energy facilities involves over 100,000 people. While electronic security problems in industry can p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio frequency-based personnel location systems

    Publication Year: 2000, Page(s):141 - 150
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    This paper presents the technologies available to locate the origin of radio frequency transmissions for Personnel Location Systems. The development and application of these systems will be discussed. A new class of signal strength location systems will be introduced that sets the standard for locating accuracy in indoor and campus environments. Many technologies have been applied to locating radi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BioIS study. Comparative study of biometric identification systems

    Publication Year: 2000, Page(s):60 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    On 1st April 1999, work on the a.m. BioIS Study commenced. This study was initiated by the Federal Criminal Investigation Office of Germany (BKA) in close cooperation with the German Information Security Agency (BSI). The study includes a field investigation, in which 11 physiological (static) and behaviour-specific (dynamic) systems, which were available and supported in Germany, were installed a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMETHYST: automatic alarm assessment: operational experience

    Publication Year: 2000, Page(s):107 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by using video assessment to enhance the Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS alarms and pass to an operator only those alarms that are likely to be caused by an intruder. It will t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screener threat detection performance with three dimensional X-ray imaging

    Publication Year: 2000, Page(s):178 - 191
    Cited by:  Papers (2)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    The paper covers the test and evaluation of screener performance using three-dimensional (3D) X-ray presentation versus the conventional two-dimensional (2D) X-ray projection. The application of 3D imaging is currently being used in the medical and environmental industry. Just recently, 3D imaging has been applied to X-ray machines for aviation security. In particular the AXis 3DTM was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CATV - interactive security and communication system

    Publication Year: 2000, Page(s):124 - 136
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are arising and new services are being established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop and establish such services, the dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of feature extraction techniques in automatic face recognition systems for security applications

    Publication Year: 2000, Page(s):40 - 46
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The paper is aimed at analyzing the performance of two different state-of-the-art automatic face recognition systems. One of the key issues regarding face recognition is the election of convenient features for representing identity in facial images. Multivariate analysis and Gabor analysis are alternative methods for accomplishing this feature extraction stage. Consequently, two different approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrepid digital microwave: a new approach to bistatic radar

    Publication Year: 2000, Page(s):17 - 21
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Southwest Microwave Inc. (SMI) introduced the world's first commercially viable bistatic microwave intrusion detection sensor in 1971. Bistatic microwave has become the paradigm for high security perimeters, and SMI products have become industry standards. With the introduction of intrepid digital microwave, SMI brings the latest in digital signal processing (DSP) and power and data networking to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Miniaturized explosives preconcentrators for use in man-portable explosives detection systems

    Publication Year: 2000, Page(s):222 - 227
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    This paper describes the function and testing of miniaturized chemical concentrating devices that are designed to enhance the capabilities of portable trace explosive detection systems, such as those based on ion mobility spectrometry (IMS). These preconcentrators are based upon a patented design first developed for use in personnel portals, in which explosive vapor and/or residue is adsorbed onto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.