首页 > 最新文献

2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
CZT/NaI hybrid hand-held performance evaluation CZT/NaI混合型手持性能评估
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654934
W. Russ, D. Nakazawa, I. Hau, M. Morichi
New hybrid spectroscopic systems directly combine spectra from detectors with very different energy resolutions, accommodating standard analyses of the output hybrid spectrum. Hand-held hybrid systems consisting of a 0.5 cm3 cadmium zinc telluride detector combined with either a 1 cm3 NaI(Tl) scintillator mounted on a photomultiplier tube or a 1 cm3 CsI(Tl) mounted on a silicon photomultiplier were evaluated for performance by source measurements for a variety of acquisition times. Repeated 300 second background measurements were analyzed and found a small increase in false alarm rate for the hybrid combinations compared to the individual component detectors. Repeated measurements with a 100 μR/h 137Cs source and acquisition times of 5, 10, 30, 100, and 300 seconds were analyzed, with the results showing that hybridization significantly enhances peak detectability relative to the individual constituent detectors, especially at shorter times. At 5 and 10 seconds, the probability of detection was more than twice that of the individual components. The hybrid approach enables the consideration of a greater variety of measurement system solutions in terms of cost and performance.
新的混合光谱系统直接结合来自探测器的光谱与非常不同的能量分辨率,适应输出混合光谱的标准分析。手持式混合系统由0.5 cm3镉碲化锌探测器与安装在光电倍增管上的1 cm3 NaI(Tl)闪烁体或安装在硅光电倍增管上的1 cm3 CsI(Tl)组成,通过源测量来评估各种采集时间的性能。对重复的300秒背景测量进行了分析,发现混合组合的误报率比单独的组件检测器略有增加。用100 μR/h 137Cs源和5、10、30、100和300秒的采集时间进行了重复测量,结果表明,相对于单个成分检测器,杂交显著提高了峰的可检出性,特别是在较短的时间内。在5秒和10秒时,检测到的概率是单个组件的两倍多。这种混合方法能够在成本和性能方面考虑更多种类的测量系统解决方案。
{"title":"CZT/NaI hybrid hand-held performance evaluation","authors":"W. Russ, D. Nakazawa, I. Hau, M. Morichi","doi":"10.1109/THS.2010.5654934","DOIUrl":"https://doi.org/10.1109/THS.2010.5654934","url":null,"abstract":"New hybrid spectroscopic systems directly combine spectra from detectors with very different energy resolutions, accommodating standard analyses of the output hybrid spectrum. Hand-held hybrid systems consisting of a 0.5 cm3 cadmium zinc telluride detector combined with either a 1 cm3 NaI(Tl) scintillator mounted on a photomultiplier tube or a 1 cm3 CsI(Tl) mounted on a silicon photomultiplier were evaluated for performance by source measurements for a variety of acquisition times. Repeated 300 second background measurements were analyzed and found a small increase in false alarm rate for the hybrid combinations compared to the individual component detectors. Repeated measurements with a 100 μR/h 137Cs source and acquisition times of 5, 10, 30, 100, and 300 seconds were analyzed, with the results showing that hybridization significantly enhances peak detectability relative to the individual constituent detectors, especially at shorter times. At 5 and 10 seconds, the probability of detection was more than twice that of the individual components. The hybrid approach enables the consideration of a greater variety of measurement system solutions in terms of cost and performance.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125811910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Single-bit DFA using multiple-byte laser fault injection 使用多字节激光故障注入的单比特DFA
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655079
M. Agoyan, J. Dutertre, A. Mirbaha, D. Naccache, Anne-Lise Ribotta, A. Tria
Laser fault injection is known as a fault attack method on cryptographic systems. This work provides practical experiments on an 8-bit 0.35µm microcontroller with no countermeasures. It explains how, with a laser beam that creates multiple-byte faults, it is still possible to perform single-bit/byte Differential Fault Analysis (DFA). It requires spatial and temporal adjustments for laser shooting and faulty results classification. This underlines the need to protect cryptographic devices, such as biometric passports and smart cards against surgical faults targeting one or several single-bits on specific bytes in memory.
激光故障注入是一种针对密码系统的故障攻击方法。这项工作提供了一个没有对策的8位0.35 μ m微控制器的实际实验。它解释了如何使用产生多字节故障的激光束,仍然可以执行单比特/字节差分故障分析(DFA)。需要对激光射击进行时空调整和故障结果分类。这强调了保护加密设备的必要性,例如生物识别护照和智能卡,防止针对内存中特定字节的一个或几个单比特的外科故障。
{"title":"Single-bit DFA using multiple-byte laser fault injection","authors":"M. Agoyan, J. Dutertre, A. Mirbaha, D. Naccache, Anne-Lise Ribotta, A. Tria","doi":"10.1109/THS.2010.5655079","DOIUrl":"https://doi.org/10.1109/THS.2010.5655079","url":null,"abstract":"Laser fault injection is known as a fault attack method on cryptographic systems. This work provides practical experiments on an 8-bit 0.35µm microcontroller with no countermeasures. It explains how, with a laser beam that creates multiple-byte faults, it is still possible to perform single-bit/byte Differential Fault Analysis (DFA). It requires spatial and temporal adjustments for laser shooting and faulty results classification. This underlines the need to protect cryptographic devices, such as biometric passports and smart cards against surgical faults targeting one or several single-bits on specific bytes in memory.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130950143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Prototyping Fusion Center information sharing; implementing policy reasoning over cross-jurisdictional data transactions occurring in a decentralized environment 原型融合中心信息共享;对分散环境中发生的跨管辖数据事务实现策略推理
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655091
K. Krasnow Waterman, Sam Wang
In 2004, the White House and then Congress determined there should be an “Information Sharing Environment” that facilitates the flow of critical information for counterterrorism, related law enforcement, and disaster management activities. That work has been progressing but a major challenge is how to create technologies that: ensure compliance with laws and policies of the federal government, 50 states, and individual agencies; convey appropriate data that would support access control and privilege decisions in different jurisdictions; and achieve accountability and transparency for this activity. We have built a prototype of Fusion Center information sharing that shows significant progress in the representation of law in a policy language, the reasoning of that law over data transactions occurring in a web environment (internet or intranet), acquiring necessary information from authoritative sources wherever they reside in the decentralized environment, and providing both a binary response suitable for automated workflow implementation and a detailed justification suitable for human validation of the conclusion. In this paper, we briefly describe the technologies employed for serializing the data and policy, reasoning over the rules contained in the policy, and displaying the results to users. These combine to provide a powerful tool supporting a range of necessary governmental functions including access control, privilege management, audit, periodic reporting, and risk modeling.
2004年,白宫和随后的国会决定建立一个“信息共享环境”,促进反恐、相关执法和灾害管理活动的关键信息流动。这项工作一直在取得进展,但一个主要挑战是如何创造技术:确保遵守联邦政府、50个州和各个机构的法律和政策;传达适当的数据,以支持不同司法管辖区的访问控制和特权决策;并实现这一活动的问责制和透明度。我们已经建立了一个融合中心信息共享的原型,它显示了在政策语言中法律的表示、在网络环境(互联网或内部网)中发生的数据交易中法律的推理、从权威来源获取必要的信息,无论它们位于分散的环境中,并提供适合于自动化工作流实现的二进制响应和适合于人工验证结论的详细证明。在本文中,我们简要描述了用于序列化数据和策略、对策略中包含的规则进行推理以及将结果显示给用户的技术。这些组合起来提供了一个强大的工具,支持一系列必要的政府功能,包括访问控制、特权管理、审计、定期报告和风险建模。
{"title":"Prototyping Fusion Center information sharing; implementing policy reasoning over cross-jurisdictional data transactions occurring in a decentralized environment","authors":"K. Krasnow Waterman, Sam Wang","doi":"10.1109/THS.2010.5655091","DOIUrl":"https://doi.org/10.1109/THS.2010.5655091","url":null,"abstract":"In 2004, the White House and then Congress determined there should be an “Information Sharing Environment” that facilitates the flow of critical information for counterterrorism, related law enforcement, and disaster management activities. That work has been progressing but a major challenge is how to create technologies that: ensure compliance with laws and policies of the federal government, 50 states, and individual agencies; convey appropriate data that would support access control and privilege decisions in different jurisdictions; and achieve accountability and transparency for this activity. We have built a prototype of Fusion Center information sharing that shows significant progress in the representation of law in a policy language, the reasoning of that law over data transactions occurring in a web environment (internet or intranet), acquiring necessary information from authoritative sources wherever they reside in the decentralized environment, and providing both a binary response suitable for automated workflow implementation and a detailed justification suitable for human validation of the conclusion. In this paper, we briefly describe the technologies employed for serializing the data and policy, reasoning over the rules contained in the policy, and displaying the results to users. These combine to provide a powerful tool supporting a range of necessary governmental functions including access control, privilege management, audit, periodic reporting, and risk modeling.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"547 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Determination of optimal boundary for algorithmic method of plastic scintillator-based radiation detector against nuclear terrorism 针对核恐怖主义的塑料闪烁体辐射探测器算法最优边界的确定
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654988
S. Kwak, S. Jang, Hosik Yoo
A plastic scintillator-based radiation portal monitoring system has played an important role in preventing and detecting illicit trafficking of nuclear and radioactive materials. The limited spectroscopic information of the plastic scintillator material makes it difficult to discriminate radioactive materials of concern from naturally occurring radioactive materials (NORM) or background radiation. This has an impact on operations and surveillance costs. Various studies including energy windowing algorithm have been conducted to deal with this problem. However, few papers have been published on how to determine the optimal boundary of energy windowing algorithm. This paper discusses the algorithmic method for a plastic scintillator-based radiation detection system and how to determine the optimal boundary of the energy windowing. Comparing the calculated and experimental results, it appeared that the algorithmic method using energy window boundary presented in this paper could improve the ability of a plastic scintillator-based radiation detection system to discriminate certain threat materials from NORM or background radiation. Furthermore, nuclear materials (natural and low-enriched uranium) which have the similar spectral distributions with ambient background radiation could also be separated from it.
基于塑料闪烁体的辐射门户监测系统在预防和检测核材料和放射性材料的非法贩运方面发挥了重要作用。由于塑料闪烁体材料的光谱信息有限,很难从自然存在的放射性物质(NORM)或本底辐射中区分出关注的放射性物质。这对行动和监测费用产生了影响。为了解决这一问题,人们进行了包括能量窗算法在内的各种研究。然而,关于如何确定能量窗算法的最优边界的研究却很少。本文讨论了基于塑料闪烁体的辐射探测系统的算法方法,以及如何确定能量窗口的最佳边界。计算结果与实验结果的比较表明,本文提出的基于能量窗边界的算法可以提高基于塑料闪烁体的辐射探测系统从NORM或本底辐射中识别某些威胁物质的能力。此外,与环境背景辐射具有相似光谱分布的核材料(天然和低浓缩铀)也可以从中分离出来。
{"title":"Determination of optimal boundary for algorithmic method of plastic scintillator-based radiation detector against nuclear terrorism","authors":"S. Kwak, S. Jang, Hosik Yoo","doi":"10.1109/THS.2010.5654988","DOIUrl":"https://doi.org/10.1109/THS.2010.5654988","url":null,"abstract":"A plastic scintillator-based radiation portal monitoring system has played an important role in preventing and detecting illicit trafficking of nuclear and radioactive materials. The limited spectroscopic information of the plastic scintillator material makes it difficult to discriminate radioactive materials of concern from naturally occurring radioactive materials (NORM) or background radiation. This has an impact on operations and surveillance costs. Various studies including energy windowing algorithm have been conducted to deal with this problem. However, few papers have been published on how to determine the optimal boundary of energy windowing algorithm. This paper discusses the algorithmic method for a plastic scintillator-based radiation detection system and how to determine the optimal boundary of the energy windowing. Comparing the calculated and experimental results, it appeared that the algorithmic method using energy window boundary presented in this paper could improve the ability of a plastic scintillator-based radiation detection system to discriminate certain threat materials from NORM or background radiation. Furthermore, nuclear materials (natural and low-enriched uranium) which have the similar spectral distributions with ambient background radiation could also be separated from it.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127819793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coordination and situational awareness for inter-organizational disaster response 组织间灾害响应的协调和态势感知
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654974
Cedric Ulmer Jorn Franke, F. Charoy, F. Charoy
Managing the disaster response, involving many heterogeneous organizations, challenges information system support for coordinating their activities. Current means for coordination such as e-mail exchange, white boards, phone or web-based mission diaries provide only very limited support. One problem is managing the temporal coordination of the response activities of different organizations to unify and synchronize their efforts. It is important that activities can be flexible defined and that each organization can integrate activities of other organizations into their plans. This implies also that several coordinators in different organizations exist. The status and awareness of activities as well as conflicts, when coordinating them, needs to be provided to all interested stake holders in real-time. We provide a model and a system to support this scenario. It is implemented in the Google Wave collaboration infrastructure based on open standards.
管理灾难响应涉及许多异构组织,这对协调其活动的信息系统支持提出了挑战。目前的协调手段,如电子邮件交流、白板、电话或基于网络的任务日记,只能提供非常有限的支持。一个问题是管理不同组织的响应活动的时间协调,以统一和同步他们的努力。重要的是,活动可以灵活地定义,并且每个组织都可以将其他组织的活动集成到他们的计划中。这也意味着在不同的组织中存在几个协调员。在协调活动和冲突时,需要实时向所有感兴趣的利益相关者提供活动和冲突的状态和意识。我们提供了一个模型和一个系统来支持这个场景。它在基于开放标准的谷歌Wave协作基础设施中实现。
{"title":"Coordination and situational awareness for inter-organizational disaster response","authors":"Cedric Ulmer Jorn Franke, F. Charoy, F. Charoy","doi":"10.1109/THS.2010.5654974","DOIUrl":"https://doi.org/10.1109/THS.2010.5654974","url":null,"abstract":"Managing the disaster response, involving many heterogeneous organizations, challenges information system support for coordinating their activities. Current means for coordination such as e-mail exchange, white boards, phone or web-based mission diaries provide only very limited support. One problem is managing the temporal coordination of the response activities of different organizations to unify and synchronize their efforts. It is important that activities can be flexible defined and that each organization can integrate activities of other organizations into their plans. This implies also that several coordinators in different organizations exist. The status and awareness of activities as well as conflicts, when coordinating them, needs to be provided to all interested stake holders in real-time. We provide a model and a system to support this scenario. It is implemented in the Google Wave collaboration infrastructure based on open standards.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computational model for automatic cargo container inspection systems 集装箱自动检验系统的计算模型
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654985
C. Chang, M. He, M. H. Nguyen
A US law mandating non-intrusive imaging and radiation detection by 2012 for 100% of US-bound containers at international ports has provoked widespread concern that the resulting congestion would hinder trade significantly. To address this issue, we present as a viable alternative an advanced computational model to implement computer automation for dual-energy X-ray imaging technique to detect and recognize nuclear and radiological material smuggled in cargo containers. Successful computer automation enables the dual-energy X-ray imaging technique to efficiently sense and recognize radiological and/or nuclear materials, especially shielded Highly Enriched Uranium (HEU), with high detection accuracy, a low positive-false-alarm rate, and negligible impact on freight movement. Thus, dual-energy X-ray inspection can feasibly be used to efficiently inspect 100% of cargo containers entering the US.
美国一项法律规定,到2012年,所有运往美国的国际港口集装箱都必须进行非侵入式成像和辐射检测,这引发了人们的广泛担忧,担心由此产生的拥堵将严重阻碍贸易。为了解决这个问题,我们提出了一个先进的计算模型,作为一个可行的替代方案,实现双能x射线成像技术的计算机自动化,以探测和识别货物集装箱走私的核和放射性材料。成功的计算机自动化使双能x射线成像技术能够有效地感知和识别放射性和/或核材料,特别是屏蔽高浓缩铀(HEU),具有高检测精度,低正误报警率,对货物运输的影响可以忽略不计。因此,双能x射线检查可以有效地检查100%进入美国的货物集装箱。
{"title":"Computational model for automatic cargo container inspection systems","authors":"C. Chang, M. He, M. H. Nguyen","doi":"10.1109/THS.2010.5654985","DOIUrl":"https://doi.org/10.1109/THS.2010.5654985","url":null,"abstract":"A US law mandating non-intrusive imaging and radiation detection by 2012 for 100% of US-bound containers at international ports has provoked widespread concern that the resulting congestion would hinder trade significantly. To address this issue, we present as a viable alternative an advanced computational model to implement computer automation for dual-energy X-ray imaging technique to detect and recognize nuclear and radiological material smuggled in cargo containers. Successful computer automation enables the dual-energy X-ray imaging technique to efficiently sense and recognize radiological and/or nuclear materials, especially shielded Highly Enriched Uranium (HEU), with high detection accuracy, a low positive-false-alarm rate, and negligible impact on freight movement. Thus, dual-energy X-ray inspection can feasibly be used to efficiently inspect 100% of cargo containers entering the US.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122620888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Testing methodology for cargo radiography systems 货物射线照相系统的试验方法
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655029
S. Erickson, B. Knutson, John Heavener, Celestino Abrego
This paper describes the considerations involved in creating a plan for testing cargo radiography systems for use in the detection of nuclear material covertly passing through a port of entry. There are three sources of test types than can be used in these tests; they come from existing standards, from concepts developed in modeling the systems, and from analogs to the actual use planned for the systems. Each of these sources has individual factors to be taken into account, and the paper attempts to list the key factors needed in constructing the test plan and to describe the principal issues related to each. These tests need to produce data which can help determine both how to incrementally improve the technology and also to assess how it might fit into a suite of inspection systems.
本文描述了在制定用于探测秘密通过入境口岸的核材料的货物射线照相系统测试计划时所涉及的考虑。可用于这些测试的测试类型有三种来源;它们来自现有的标准,来自系统建模中开发的概念,以及来自为系统计划的类比和实际使用。这些资源中的每一个都有需要考虑的单独的因素,本文试图列出构建测试计划所需的关键因素,并描述与每一个相关的主要问题。这些测试需要产生数据,这些数据可以帮助确定如何逐步改进技术,也可以评估它如何适合一套检查系统。
{"title":"Testing methodology for cargo radiography systems","authors":"S. Erickson, B. Knutson, John Heavener, Celestino Abrego","doi":"10.1109/THS.2010.5655029","DOIUrl":"https://doi.org/10.1109/THS.2010.5655029","url":null,"abstract":"This paper describes the considerations involved in creating a plan for testing cargo radiography systems for use in the detection of nuclear material covertly passing through a port of entry. There are three sources of test types than can be used in these tests; they come from existing standards, from concepts developed in modeling the systems, and from analogs to the actual use planned for the systems. Each of these sources has individual factors to be taken into account, and the paper attempts to list the key factors needed in constructing the test plan and to describe the principal issues related to each. These tests need to produce data which can help determine both how to incrementally improve the technology and also to assess how it might fit into a suite of inspection systems.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPIDER: Enabling interoperable information sharing between public institutions for efficient disaster recovery and response 信息平台:在公共机构之间实现可互操作的信息共享,以实现有效的灾难恢复和响应
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655061
S. Subik, S. Rohde, T. Weber, C. Wietfeld
The interoperability of the data sharing across different organizations is key for the efficient management of large-scale incidents. The system introduced in this paper will provide multi-disciplinary rescue teams with an integrated and intelligent communication and information system for efficient data sharing and emergency process management before, during and after major incidents. The project SPIDER (Security System for Public Institutions in Disastrous Emergency scenaRios) is part of the national research initiative Scenario based Civil Security Research and substantially funded by the German government. It will (a) facilitate a standardized XML based interface for a service oriented interoperability architecture and (b) provide substantial new insight on how to enable components in distinct critical networks for secure collaboration. With respect to (a), these interfaces will be coupled with recommendations on the orchestration of the provided services. As heterogeneous crisis information systems require standardized gateways, SPIDER uses Web Services in order to mutually interact. Thus, a fail-save communication infrastructure (b) that interconnects the required components is indispensable. Especially the usage of modern systems and the consequential high demand to the data rate pose a challenge to the system. The combination of (a) and (b) will lead to a holistic approach for digital crisis management.
跨不同组织的数据共享的互操作性是有效管理大规模事件的关键。本文介绍的系统将为多学科救援队伍提供一个集成的、智能的通信和信息系统,以便在重大事件发生之前、期间和之后进行有效的数据共享和应急过程管理。“灾难性紧急情况下公共机构安全系统”项目是国家研究倡议“基于情景的公民安全研究”的一部分,由德国政府大量资助。它将(a)为面向服务的互操作性体系结构提供一个标准化的基于XML的接口,(b)为如何在不同的关键网络中启用组件以实现安全协作提供实质性的新见解。关于(a),这些接口将与有关所提供服务的编排的建议相结合。由于异构危机信息系统需要标准化的网关,因此SPIDER使用Web Services来实现相互交互。因此,连接所需组件的故障保存通信基础设施(b)是必不可少的。特别是现代系统的使用和随之而来的对数据速率的高要求对系统提出了挑战。(a)和(b)的结合将导致数字危机管理的整体方法。
{"title":"SPIDER: Enabling interoperable information sharing between public institutions for efficient disaster recovery and response","authors":"S. Subik, S. Rohde, T. Weber, C. Wietfeld","doi":"10.1109/THS.2010.5655061","DOIUrl":"https://doi.org/10.1109/THS.2010.5655061","url":null,"abstract":"The interoperability of the data sharing across different organizations is key for the efficient management of large-scale incidents. The system introduced in this paper will provide multi-disciplinary rescue teams with an integrated and intelligent communication and information system for efficient data sharing and emergency process management before, during and after major incidents. The project SPIDER (Security System for Public Institutions in Disastrous Emergency scenaRios) is part of the national research initiative Scenario based Civil Security Research and substantially funded by the German government. It will (a) facilitate a standardized XML based interface for a service oriented interoperability architecture and (b) provide substantial new insight on how to enable components in distinct critical networks for secure collaboration. With respect to (a), these interfaces will be coupled with recommendations on the orchestration of the provided services. As heterogeneous crisis information systems require standardized gateways, SPIDER uses Web Services in order to mutually interact. Thus, a fail-save communication infrastructure (b) that interconnects the required components is indispensable. Especially the usage of modern systems and the consequential high demand to the data rate pose a challenge to the system. The combination of (a) and (b) will lead to a holistic approach for digital crisis management.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
The application of internet of things(IOT) in emergency management system in China 物联网在中国应急管理系统中的应用
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655073
Zhang Ji, Qi Anwen
In Aug, 2009, Chinese Premier WEN Jiabao brought forward the concept of "sensing China", the internet of things (IOT) has become the national strategy of China since then. After that, Secretary of Beijing Municipal Government LIU Qi, put forward to the concept of "sensing Beijing", and hope IOT can be new industrial motivation of Beijing development. Furthermore, in January 2010, GUO Jinlong, Mayor of Beijing Municipal Government officially remarked that "IOT construction in Beijing should start from the city security and emergency management applications". Pilot projects of IOT now focus on the new features related to Emergency Management Systems.
2009年8月,中国总理温家宝提出“感知中国”的概念,物联网(IOT)从此成为中国的国家战略。随后,北京市政府秘书刘淇提出了“感知北京”的概念,希望物联网能够成为北京发展的新产业动力。2010年1月,北京市政府市长郭金龙正式提出“北京市物联网建设应从城市安全应急管理应用入手”。物联网的试点项目现在集中在与应急管理系统相关的新功能上。
{"title":"The application of internet of things(IOT) in emergency management system in China","authors":"Zhang Ji, Qi Anwen","doi":"10.1109/THS.2010.5655073","DOIUrl":"https://doi.org/10.1109/THS.2010.5655073","url":null,"abstract":"In Aug, 2009, Chinese Premier WEN Jiabao brought forward the concept of \"sensing China\", the internet of things (IOT) has become the national strategy of China since then. After that, Secretary of Beijing Municipal Government LIU Qi, put forward to the concept of \"sensing Beijing\", and hope IOT can be new industrial motivation of Beijing development. Furthermore, in January 2010, GUO Jinlong, Mayor of Beijing Municipal Government officially remarked that \"IOT construction in Beijing should start from the city security and emergency management applications\". Pilot projects of IOT now focus on the new features related to Emergency Management Systems.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115947326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Securing IPv6 network infrastructure: A new security model 保护IPv6网络基础设施:一种新的安全模型
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654971
Abdur Rahim Choudhary, Alan Sekelsky
Nation's network infrastructure such as the Global Information Grid (GIG) for the Department of Defense (DoD) and the OneNet for the Homeland Security Department are tran-sitioning to the Internet Protocol version 6 (IPv6) per DoD CIO Memorandum of June 2003 and the Office of Management and Budget memorandum OMB-05–22. There exist IPv6 specific security vulnerabilities in these network infrastructures that need to be mitigated in order to achieve security parity with the existing IPv4 operations. From the perspective of the Homeland Security technologies, the existence of additional security vulnerabilities implies a possibility for two pronged threats. First, the IPv6 specific vulnerabilities reduce the security posture of the network infrastructure itself; second, other critical infrastructure sectors that depend on IPv6 need additional protection. For example, the future supervisory control and data acquisition (SCADA) industrial capabilities would increasingly use the IPv6 infrastructure, as would the voice communications, the voice and video collaboration, and sharing of data such as the image data and surveillance and reconnaissance data. This paper presents three contiguous results. First, it briefly presents the new IPv6 capabilities; second, it presents a brief analysis of the security vulnerabilities arising from these capabilities; and third, it presents a new security model for IPv6 network infrastructures that has the potential to mitigate these vulnerabilities. The new model is based on the end-to-end connectivity that is restored in IPv6, thus allowing the use of host based security (HBS) systems together with the perimeter security devices. However, the use of HBS complicates the security trust management. Therefore the third component of the model is introduced, namely a policy based security management (PBSM) approach. The PBSM approach allows the secure deployment of the host based security systems. It provides the capabilities needed to specify the trust zones via a set of security policy rules that together specify a trust zone. Hosts belong to one or more trust zones. Accordingly, the host based security policies are derived from the zone security policies for all the zones to which a host belongs. In addition, the PBSM approach has the potential to support more sophisticated security capabilities such as a risk adaptive access control and dynamic security response to a changing operational picture. The capabilities are needed to enable net-centric security operations.
国家网络基础设施,如国防部的全球信息网格(GIG)和国土安全部的OneNet,根据2003年6月国防部CIO备忘录和管理和预算办公室备忘录OMB-05-22,正在过渡到互联网协议版本6 (IPv6)。这些网络基础设施中存在IPv6特定的安全漏洞,需要减轻这些漏洞,以实现与现有IPv4操作的安全对等。从国土安全技术的角度来看,额外安全漏洞的存在意味着两种威胁的可能性。首先,IPv6特有的漏洞降低了网络基础设施本身的安全态势;其次,其他依赖IPv6的关键基础设施部门需要额外的保护。例如,未来的监控和数据采集(SCADA)工业能力将越来越多地使用IPv6基础设施,语音通信、语音和视频协作以及图像数据、监视和侦察数据等数据共享也是如此。本文给出了三个连续的结果。首先,简要介绍了IPv6的新功能;其次,简要分析了这些功能带来的安全漏洞;第三,它为IPv6网络基础设施提出了一个新的安全模型,该模型有可能减轻这些漏洞。新模型基于在IPv6中恢复的端到端连接,从而允许使用基于主机的安全(HBS)系统和周边安全设备。然而,HBS的使用使安全信任管理变得复杂。因此,引入了该模型的第三个组件,即基于策略的安全管理(PBSM)方法。PBSM方法允许基于主机的安全系统的安全部署。它提供了通过一组安全策略规则指定信任区域所需的功能,这些规则一起指定信任区域。主机属于一个或多个信任区域。因此,基于主机的安全策略来源于主机所属所有区域的区域安全策略。此外,PBSM方法还具有支持更复杂的安全功能的潜力,例如风险自适应访问控制和对不断变化的操作情况的动态安全响应。这些能力是实现以网络为中心的安全操作所必需的。
{"title":"Securing IPv6 network infrastructure: A new security model","authors":"Abdur Rahim Choudhary, Alan Sekelsky","doi":"10.1109/THS.2010.5654971","DOIUrl":"https://doi.org/10.1109/THS.2010.5654971","url":null,"abstract":"Nation's network infrastructure such as the Global Information Grid (GIG) for the Department of Defense (DoD) and the OneNet for the Homeland Security Department are tran-sitioning to the Internet Protocol version 6 (IPv6) per DoD CIO Memorandum of June 2003 and the Office of Management and Budget memorandum OMB-05–22. There exist IPv6 specific security vulnerabilities in these network infrastructures that need to be mitigated in order to achieve security parity with the existing IPv4 operations. From the perspective of the Homeland Security technologies, the existence of additional security vulnerabilities implies a possibility for two pronged threats. First, the IPv6 specific vulnerabilities reduce the security posture of the network infrastructure itself; second, other critical infrastructure sectors that depend on IPv6 need additional protection. For example, the future supervisory control and data acquisition (SCADA) industrial capabilities would increasingly use the IPv6 infrastructure, as would the voice communications, the voice and video collaboration, and sharing of data such as the image data and surveillance and reconnaissance data. This paper presents three contiguous results. First, it briefly presents the new IPv6 capabilities; second, it presents a brief analysis of the security vulnerabilities arising from these capabilities; and third, it presents a new security model for IPv6 network infrastructures that has the potential to mitigate these vulnerabilities. The new model is based on the end-to-end connectivity that is restored in IPv6, thus allowing the use of host based security (HBS) systems together with the perimeter security devices. However, the use of HBS complicates the security trust management. Therefore the third component of the model is introduced, namely a policy based security management (PBSM) approach. The PBSM approach allows the secure deployment of the host based security systems. It provides the capabilities needed to specify the trust zones via a set of security policy rules that together specify a trust zone. Hosts belong to one or more trust zones. Accordingly, the host based security policies are derived from the zone security policies for all the zones to which a host belongs. In addition, the PBSM approach has the potential to support more sophisticated security capabilities such as a risk adaptive access control and dynamic security response to a changing operational picture. The capabilities are needed to enable net-centric security operations.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
2010 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1