S. Caskey, Adam D. Williams, L. Crabtree, John Russell
{"title":"Logical Foundations for Protecting Materials and Facilities from those with Malicious Intent?Proposed 1st Principles for Security Systems.","authors":"S. Caskey, Adam D. Williams, L. Crabtree, John Russell","doi":"10.2172/1881671","DOIUrl":null,"url":null,"abstract":"Introduction The implementation of processes to protect us and our resources from those with malicious intent has been witnessed within every known civilization. This long history of developing protective solutions that meet the operational, environmental, technological, and intellectual constraints of a given time provides useful lessons learned and insights. Additionally, significant efforts in the U.S. has been put forth in recent decades to leverage this observations and insights to protect critical pieces of infrastructure. Yet, these lessons and insights still tend to be applied in an ad hoc fashion. This paper will explore a collection of proposed 1 principles, aiming to demonstrate that these principles are the fundamental concepts of security.","PeriodicalId":134533,"journal":{"name":"Proposed for presentation at the INMM/ESARDA 2021 held August 23-September 1, 2021 in VIrtual, Virtual","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proposed for presentation at the INMM/ESARDA 2021 held August 23-September 1, 2021 in VIrtual, Virtual","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2172/1881671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Introduction The implementation of processes to protect us and our resources from those with malicious intent has been witnessed within every known civilization. This long history of developing protective solutions that meet the operational, environmental, technological, and intellectual constraints of a given time provides useful lessons learned and insights. Additionally, significant efforts in the U.S. has been put forth in recent decades to leverage this observations and insights to protect critical pieces of infrastructure. Yet, these lessons and insights still tend to be applied in an ad hoc fashion. This paper will explore a collection of proposed 1 principles, aiming to demonstrate that these principles are the fundamental concepts of security.