首页 > 最新文献

43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

英文 中文
Integrated installing ISO 9000 and ISO 27000 management systems on an organization 在组织中集成安装ISO 9000和ISO 27000管理体系
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335527
Chiang Wang, Dwen-Ren Tsai
In response to the diversification and the rapid evolution of business environment, it is a rising tendency that organization needs to adopt some relevant management systems in order to continuously reinforce its information management mechanisms. Meanwhile, the arrangement for introducing any new management system needs to comply with a series of regulatory procedures and standards. In order to exert and maintain multiple management systems in an efficient as well as better quality way, their common/similar management functionalities should be integrated and modularized. For instance, consider the internal control systems of both ISO 9001 Quality Management and ISO 27001 Information Security Management in terms of their documents and records control, correction and prevention, internal audit, management review, and the cyclic management of Plan-Do-Check-Act (PDCA). How to achieve an effective integration and modularization, with an organization's current resources is an important task for the organization in order to carry out its management improvement This research centers on comparison as well as integration of the internal control systems of both ISO 9001 Quality Management and ISO 27001 Information Security Management. We explore the commonality of these two management systems and then proceed to integrate them into an effective management model. We anticipate that such management integration model will benefit the intended management of an organization very efficiently. We adopt an exploratory hypothesis research method to proceed toward our research goal. Then we present our research result with a case study on a private enterprise whose information process center is located across the country. This integration work is still in progress and intends to implement the PDCA cyclic management mechanism for integrated ISO management systems.
为了应对商业环境的多样化和快速变化,组织需要采用一些相关的管理制度来不断加强其信息管理机制是一种上升的趋势。同时,任何新的管理制度的安排都需要遵守一系列的监管程序和标准。为了高效、高质量地发挥和维护多个管理体系,应将其共同/相似的管理功能进行集成和模块化。例如,考虑ISO 9001质量管理和ISO 27001信息安全管理的内部控制系统,就其文件和记录控制,纠正和预防,内部审核,管理评审以及计划-执行-检查-行动(PDCA)的循环管理而言。如何对组织现有的资源进行有效的整合和模块化,是组织进行管理改进的重要任务。本研究的重点是对ISO 9001质量管理和ISO 27001信息安全管理的内部控制体系进行比较和整合。我们将探讨这两种管理体系的共性,然后将它们整合成一种有效的管理模式。我们期望这样的管理集成模型将非常有效地有利于组织的预期管理。我们采用探索性假设研究的方法来实现我们的研究目标。然后以某民营企业为例,介绍了本文的研究成果,该民营企业的信息处理中心位于全国各地。这项整合工作仍在进行中,并打算为整合的ISO管理体系实施PDCA循环管理机制。
{"title":"Integrated installing ISO 9000 and ISO 27000 management systems on an organization","authors":"Chiang Wang, Dwen-Ren Tsai","doi":"10.1109/CCST.2009.5335527","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335527","url":null,"abstract":"In response to the diversification and the rapid evolution of business environment, it is a rising tendency that organization needs to adopt some relevant management systems in order to continuously reinforce its information management mechanisms. Meanwhile, the arrangement for introducing any new management system needs to comply with a series of regulatory procedures and standards. In order to exert and maintain multiple management systems in an efficient as well as better quality way, their common/similar management functionalities should be integrated and modularized. For instance, consider the internal control systems of both ISO 9001 Quality Management and ISO 27001 Information Security Management in terms of their documents and records control, correction and prevention, internal audit, management review, and the cyclic management of Plan-Do-Check-Act (PDCA). How to achieve an effective integration and modularization, with an organization's current resources is an important task for the organization in order to carry out its management improvement This research centers on comparison as well as integration of the internal control systems of both ISO 9001 Quality Management and ISO 27001 Information Security Management. We explore the commonality of these two management systems and then proceed to integrate them into an effective management model. We anticipate that such management integration model will benefit the intended management of an organization very efficiently. We adopt an exploratory hypothesis research method to proceed toward our research goal. Then we present our research result with a case study on a private enterprise whose information process center is located across the country. This integration work is still in progress and intends to implement the PDCA cyclic management mechanism for integrated ISO management systems.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Delay sensitive low-cost security mechanism for mobile IP 延迟敏感的低成本移动IP安全机制
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335570
A. Shah, N. Thanthry, R. Pendse
With the advances in the processing capabilities of wireless devices such as Smart Phones and laptops, the demand for staying connected to the internet has steadily increased. This demand is strengthened further by the introduction of internet connectivity within the airplanes. Mobile IP is one of the protocols that have been proposed to support user/network mobility. Mobile IP introduces new entities such as Home Agent and Foreign Agent to facilitate user/network mobility. As the user/network (mobile client) move from one network to another all their connections need to be handed off from one mobile agent to another to maintain seamless connectivity. While effective handoff mechanism by itself is an active research field, security combined with effective handoff introduces new challenges. While these security mechanisms help in maintaining security and privacy of the user, they introduce additional processing delay thereby affecting the performance. In this paper, the authors propose a novel low cost security mechanism that ensures the security of the communication. It will be shown that the proposed mechanism will secure mobile node communication without affecting the performance. While the proposed architecture requires the mobility agents to cache additional information, the analysis carried out by the authors indicates that the additional cost is compensated by the added security for the communication between the mobile client and the mobility agents.
随着智能手机和笔记本电脑等无线设备处理能力的进步,保持与互联网连接的需求稳步增长。这一需求因飞机内互联网连接的引入而进一步加强。移动IP是支持用户/网络移动性的协议之一。移动IP引入了新的实体,如Home Agent和Foreign Agent,以促进用户/网络的移动性。当用户/网络(移动客户端)从一个网络移动到另一个网络时,他们的所有连接都需要从一个移动代理转移到另一个移动代理,以保持无缝连接。虽然有效的交接机制本身就是一个活跃的研究领域,但将安全与有效交接相结合却带来了新的挑战。虽然这些安全机制有助于维护用户的安全性和隐私,但它们引入了额外的处理延迟,从而影响了性能。在本文中,作者提出了一种新的低成本的安全机制,以确保通信的安全性。结果表明,所提出的机制可以在不影响性能的情况下保证移动节点的通信安全。虽然所提出的架构要求移动代理缓存额外的信息,但作者进行的分析表明,移动客户端与移动代理之间通信的安全性增加弥补了额外的成本。
{"title":"Delay sensitive low-cost security mechanism for mobile IP","authors":"A. Shah, N. Thanthry, R. Pendse","doi":"10.1109/CCST.2009.5335570","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335570","url":null,"abstract":"With the advances in the processing capabilities of wireless devices such as Smart Phones and laptops, the demand for staying connected to the internet has steadily increased. This demand is strengthened further by the introduction of internet connectivity within the airplanes. Mobile IP is one of the protocols that have been proposed to support user/network mobility. Mobile IP introduces new entities such as Home Agent and Foreign Agent to facilitate user/network mobility. As the user/network (mobile client) move from one network to another all their connections need to be handed off from one mobile agent to another to maintain seamless connectivity. While effective handoff mechanism by itself is an active research field, security combined with effective handoff introduces new challenges. While these security mechanisms help in maintaining security and privacy of the user, they introduce additional processing delay thereby affecting the performance. In this paper, the authors propose a novel low cost security mechanism that ensures the security of the communication. It will be shown that the proposed mechanism will secure mobile node communication without affecting the performance. While the proposed architecture requires the mobility agents to cache additional information, the analysis carried out by the authors indicates that the additional cost is compensated by the added security for the communication between the mobile client and the mobility agents.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126718397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulating search comb performance 模拟搜索梳性能
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335540
A. Belyavin
To improve understanding of how to achieve effective performance in an airport search comb a simulation of the complete search process was constructed. The simulation was developed in two stages: a model of the processes underlying the search comb team task was constructed in the Integrated Performance Modelling Environment (IPME) so that the consistency of the task times and reliability could be assessed in terms of overall system performance; and, a spatially consistent model of the search comb was developed, using parameters based on the IPME model to provide a prototype of a generic Synthetic Environment (SE) that can be used to simulate the operation of an airport Search Comb and provide a visualization of the flow.
为了更好地理解如何在机场搜索梳中实现有效的性能,构建了一个完整搜索过程的模拟。仿真分两个阶段进行:在集成性能建模环境(IPME)中构建搜索梳队任务的过程模型,以便根据整体系统性能评估任务时间和可靠性的一致性;并且,开发了搜索梳的空间一致性模型,使用基于IPME模型的参数提供通用合成环境(SE)的原型,该模型可用于模拟机场搜索梳的操作并提供流的可视化。
{"title":"Simulating search comb performance","authors":"A. Belyavin","doi":"10.1109/CCST.2009.5335540","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335540","url":null,"abstract":"To improve understanding of how to achieve effective performance in an airport search comb a simulation of the complete search process was constructed. The simulation was developed in two stages: a model of the processes underlying the search comb team task was constructed in the Integrated Performance Modelling Environment (IPME) so that the consistency of the task times and reliability could be assessed in terms of overall system performance; and, a spatially consistent model of the search comb was developed, using parameters based on the IPME model to provide a prototype of a generic Synthetic Environment (SE) that can be used to simulate the operation of an airport Search Comb and provide a visualization of the flow.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130991646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The impact of color composition on X-ray image interpretation in aviation security screening 航空安检中彩色成分对x射线图像判读的影响
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335539
C. C. von Bastian, A. Schwaninger, S. Michel
In order to improve aviation security, many airports apply Threat Image Projection (TIP) and computer-based X-ray image interpretation training (CBT). One difference between TIP and CBT X-ray images is the algorithm used to merge virtual threat items into X-ray images of passenger bags, resulting in different color nuances. In this study, we tested the influence of merging algorithms on threat object detection performance, reaction time and confidence rating of 12 airport security screeners. The image merging algorithms of the individually adaptive CBT X-Ray Tutor were used. We have found that the hit rate was higher for TIP images compared to CBT images. Accordingly, the mean of confidence ratings was increased for TIP images. The reaction times tended to be shorter for TIP images. The results of our study indicate that the CBT merging algorithm used in this study is more realistic than the tested TIP image merging algorithm.
为了提高航空安全,许多机场采用威胁图像投影(TIP)和基于计算机的x射线图像判读训练(CBT)。TIP和CBT x射线图像之间的一个区别是,该算法用于将虚拟威胁物品合并到乘客行李的x射线图像中,从而产生不同的颜色细微差别。在本研究中,我们测试了合并算法对12个机场安检设备的威胁目标检测性能、反应时间和置信度评级的影响。采用CBT X-Ray Tutor的自适应图像合并算法。我们发现TIP图像的命中率比CBT图像高。因此,对于TIP图像,置信度评级的平均值增加。对于TIP图像,反应时间往往更短。研究结果表明,本文所采用的CBT合并算法比已测试的TIP图像合并算法更具有真实感。
{"title":"The impact of color composition on X-ray image interpretation in aviation security screening","authors":"C. C. von Bastian, A. Schwaninger, S. Michel","doi":"10.1109/CCST.2009.5335539","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335539","url":null,"abstract":"In order to improve aviation security, many airports apply Threat Image Projection (TIP) and computer-based X-ray image interpretation training (CBT). One difference between TIP and CBT X-ray images is the algorithm used to merge virtual threat items into X-ray images of passenger bags, resulting in different color nuances. In this study, we tested the influence of merging algorithms on threat object detection performance, reaction time and confidence rating of 12 airport security screeners. The image merging algorithms of the individually adaptive CBT X-Ray Tutor were used. We have found that the hit rate was higher for TIP images compared to CBT images. Accordingly, the mean of confidence ratings was increased for TIP images. The reaction times tended to be shorter for TIP images. The results of our study indicate that the CBT merging algorithm used in this study is more realistic than the tested TIP image merging algorithm.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131793761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Competency requirements for aviation security 航空保安能力要求
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335574
Mohammad Karimbocus
The aim of this paper is to highlight the central role of the human in aviation security. This means that appropriate competencies are essential for this service to achieve its objective of protecting civil aviation from illegal acts. However, with the advent of automation, and coupled with enhanced awareness to costs, competency requirements have changed significantly. This paper also seeks to identify the reasons that could impede on the effectiveness and efficiency of aviation security, and the means of ensuring that such the human is sufficiently groomed to overcome such impediments.
本文的目的是强调人在航空安全中的核心作用。这意味着,为实现保护民用航空免受非法行为之害的目标,适当的能力是必不可少的。然而,随着自动化的出现,以及对成本意识的增强,能力要求发生了重大变化。本文还试图确定可能妨碍航空安全的效力和效率的原因,以及确保这些人员得到充分培训以克服这些障碍的方法。
{"title":"Competency requirements for aviation security","authors":"Mohammad Karimbocus","doi":"10.1109/CCST.2009.5335574","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335574","url":null,"abstract":"The aim of this paper is to highlight the central role of the human in aviation security. This means that appropriate competencies are essential for this service to achieve its objective of protecting civil aviation from illegal acts. However, with the advent of automation, and coupled with enhanced awareness to costs, competency requirements have changed significantly. This paper also seeks to identify the reasons that could impede on the effectiveness and efficiency of aviation security, and the means of ensuring that such the human is sufficiently groomed to overcome such impediments.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The use of secure RFID to support the resolution of emergency crises 使用安全的RFID来支持解决紧急危机
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335517
G. Baldini, Michael Braun, Erwin Hess, Franco Oliveri, Hermann Seuschek
The resolution of emergency crises and natural disasters is heavily dependent, among other things, on efficient supply chain management to bring the necessary material to the first time responders. The supply chain used in the resolution of emergency crises must have capabilities of agility and flexibility to respond to the challenges, which are typical of these scenarios. Emergency crises are often characterized by a chaotic environment and by a general lack of infrastructures, which are usually degraded or destroyed as a consequence of the source of crisis. Such conditions make the task to maintain the supply chain and provide the delivery of correct equipment and goods to the right places and at the right time more difficult. RFID has been increasingly considered, in the context of emergency crisis scenarios, to address the described challenges and to improve the supply chain. An important requirement is security. RFID devices must not be tampered with and they should be resistant to security attacks (e.g. spoofing, eavesdropping, cloning) to ensure that the supply chain is not disrupted by criminals and that cargo and goods are not stolen. In this context, this paper will present the application and benefits of the recent technological breakthroughs developed by Siemens and Infineon Technologies in the field of secure RFID. This paper will analyze practical utilization of this type of device in the resolution of emergency crises to guarantee the reliability of sealing of the goods and their identification. The establishment of a logistics tracking framework based on secure RFID has the potential to greatly increase the effectiveness of future emergency crises response operations.
除其他外,紧急危机和自然灾害的解决严重依赖有效的供应链管理,以便将必要的材料提供给第一时间作出反应的人。用于解决紧急危机的供应链必须具有敏捷性和灵活性,以应对这些挑战,这是这些情景的典型特征。紧急危机的特点往往是环境混乱和普遍缺乏基础设施,这些基础设施通常因危机的根源而退化或被摧毁。这种情况使得维持供应链和在正确的时间将正确的设备和货物交付到正确的地点的任务变得更加困难。在紧急危机情景的背景下,越来越多地考虑使用RFID来解决所描述的挑战并改善供应链。一个重要的需求是安全性。RFID设备必须不能被篡改,它们应该能够抵抗安全攻击(例如欺骗、窃听、克隆),以确保供应链不被犯罪分子破坏,货物和货物不被盗。在此背景下,本文将介绍西门子和英飞凌技术在安全RFID领域的最新技术突破的应用和好处。本文将分析这种装置在解决紧急危机中的实际应用,以保证货物密封和识别的可靠性。建立基于安全RFID的物流跟踪框架有可能大大提高未来紧急危机响应行动的有效性。
{"title":"The use of secure RFID to support the resolution of emergency crises","authors":"G. Baldini, Michael Braun, Erwin Hess, Franco Oliveri, Hermann Seuschek","doi":"10.1109/CCST.2009.5335517","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335517","url":null,"abstract":"The resolution of emergency crises and natural disasters is heavily dependent, among other things, on efficient supply chain management to bring the necessary material to the first time responders. The supply chain used in the resolution of emergency crises must have capabilities of agility and flexibility to respond to the challenges, which are typical of these scenarios. Emergency crises are often characterized by a chaotic environment and by a general lack of infrastructures, which are usually degraded or destroyed as a consequence of the source of crisis. Such conditions make the task to maintain the supply chain and provide the delivery of correct equipment and goods to the right places and at the right time more difficult. RFID has been increasingly considered, in the context of emergency crisis scenarios, to address the described challenges and to improve the supply chain. An important requirement is security. RFID devices must not be tampered with and they should be resistant to security attacks (e.g. spoofing, eavesdropping, cloning) to ensure that the supply chain is not disrupted by criminals and that cargo and goods are not stolen. In this context, this paper will present the application and benefits of the recent technological breakthroughs developed by Siemens and Infineon Technologies in the field of secure RFID. This paper will analyze practical utilization of this type of device in the resolution of emergency crises to guarantee the reliability of sealing of the goods and their identification. The establishment of a logistics tracking framework based on secure RFID has the potential to greatly increase the effectiveness of future emergency crises response operations.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Information security metric integrating enterprise objectives 集成企业目标的信息安全度量
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335549
B. Karabey, N. Baykal
Security is one of the key concerns in the domain of information technology systems. Maintaining the confidentiality, integrity and availability of such systems, mandates a rigorous prior analysis of the security risks that confront these systems. In order to analyze, mitigate and recover from these risks a metrics based approach is essential in prioritizing the response strategies against these risks. In addition to that the enterprise objectives must be focally integrated in the definition, impact calculation and prioritization phases of this analysis to come up with metrics that are useful both for the technical and managerial communities within an organization. Also the inclusion of enterprise objectives in the identification of information assets will act as a preliminary filter to overcome the real life scalability issues inherent with such threat modeling efforts. Within this study an attack tree based approach will be utilized to offer an information security risk metric that integrates the enterprise objectives with the information asset vulnerabilities within an organization. In the essential step of enterprise resource identification, the resource-based view of a company will be utilized.
安全是信息技术系统领域的关键问题之一。维护这些系统的机密性、完整性和可用性要求对这些系统面临的安全风险进行严格的事先分析。为了分析、减轻这些风险并从中恢复,基于度量的方法对于确定针对这些风险的响应策略的优先级至关重要。除此之外,企业目标必须集中集成在此分析的定义、影响计算和优先级阶段,以提出对组织内的技术和管理社区都有用的度量。此外,在信息资产标识中包含企业目标将作为一个初步的过滤器,以克服这种威胁建模工作所固有的现实生活中的可伸缩性问题。在本研究中,将使用基于攻击树的方法来提供信息安全风险度量,该度量将企业目标与组织内的信息资产漏洞集成在一起。在企业资源识别的关键步骤中,将使用公司的资源基础观。
{"title":"Information security metric integrating enterprise objectives","authors":"B. Karabey, N. Baykal","doi":"10.1109/CCST.2009.5335549","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335549","url":null,"abstract":"Security is one of the key concerns in the domain of information technology systems. Maintaining the confidentiality, integrity and availability of such systems, mandates a rigorous prior analysis of the security risks that confront these systems. In order to analyze, mitigate and recover from these risks a metrics based approach is essential in prioritizing the response strategies against these risks. In addition to that the enterprise objectives must be focally integrated in the definition, impact calculation and prioritization phases of this analysis to come up with metrics that are useful both for the technical and managerial communities within an organization. Also the inclusion of enterprise objectives in the identification of information assets will act as a preliminary filter to overcome the real life scalability issues inherent with such threat modeling efforts. Within this study an attack tree based approach will be utilized to offer an information security risk metric that integrates the enterprise objectives with the information asset vulnerabilities within an organization. In the essential step of enterprise resource identification, the resource-based view of a company will be utilized.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128036454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Discriminative common vector for face identification 人脸识别的判别公共向量
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335551
C. Travieso, Patricia Botella, J. B. Alonso, Miguel A. Ferrer
In this paper, it is proposed a facial biometric identification system, using discriminative common vector. This method reduces the number of characteristics of the different images from the database and selects the most discriminative of them. In this work, transformed domains, such as discrete cosine transformed (DCT), discrete wavelets transformed (DWT), principal component analysis (PCA), linear discriminative analysis (LDA) and independent component analysis (ICA) are also used. As classifier systems a support vector machines (SVM) and a neuronal network (NN) have been utilized. With the above system, a simple and robust system with good results has been obtained. Using DCV, our experiments have reached a success rate of 99.13%±0.23 for ORL and 99.4%±0.35 for Yale.
本文提出了一种基于鉴别公共向量的人脸生物识别系统。该方法从数据库中减少不同图像的特征数量,并从中选择最具判别性的特征。在这项工作中,变换域,如离散余弦变换(DCT),离散小波变换(DWT),主成分分析(PCA),线性判别分析(LDA)和独立成分分析(ICA)也被使用。作为分类器系统,支持向量机(SVM)和神经网络(NN)被广泛使用。采用该系统,系统结构简单,鲁棒性好,取得了良好的效果。使用DCV,我们的实验对ORL的成功率为99.13%±0.23,对Yale的成功率为99.4%±0.35。
{"title":"Discriminative common vector for face identification","authors":"C. Travieso, Patricia Botella, J. B. Alonso, Miguel A. Ferrer","doi":"10.1109/CCST.2009.5335551","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335551","url":null,"abstract":"In this paper, it is proposed a facial biometric identification system, using discriminative common vector. This method reduces the number of characteristics of the different images from the database and selects the most discriminative of them. In this work, transformed domains, such as discrete cosine transformed (DCT), discrete wavelets transformed (DWT), principal component analysis (PCA), linear discriminative analysis (LDA) and independent component analysis (ICA) are also used. As classifier systems a support vector machines (SVM) and a neuronal network (NN) have been utilized. With the above system, a simple and robust system with good results has been obtained. Using DCV, our experiments have reached a success rate of 99.13%±0.23 for ORL and 99.4%±0.35 for Yale.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Writer recognition by characters, words and sentences 作者通过字符、单词和句子识别
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335523
Martin Gehrke, K. Steinke, Robert Dzido
The methods developed in the research project “Herbar Digital” are to help plant taxonomists to master the great amount of material of about 3.5 million dried plants on paper sheets belonging to the Botanic Museum Berlin in Germany. Frequently the collector of the plant is unknown. So a procedure had to be developed in order to determine the writer of the handwriting on the sheet. In the present work the static character is transformed into a dynamic form. This is done with the model of an inert ball which is rolled through the written character. During this off-line writer recognition, different mathematical procedures are used such as the reproduction of the write line of individual characters by Legendre polynomials. When only one character is used, a recognition rate of about 40% is obtained. By combining multiple characters, the recognition rate rises considerably and reaches 98.7% with 13 characters and 93 writers (chosen randomly from the international IAMdatabase [3]). Another approach tries to identify the writer by handwritten words. The word is cut out and transformed into a 6-dimensional time series and compared e.g. by means of DTW-methods. A global statistical approach using the whole handwritten sentences results in a similar recognition rate of more than 98%. By combining the methods, a recognition rate of 99.5% is achieved.
在“草本数字化”研究项目中开发的方法是帮助植物分类学家掌握属于德国柏林植物博物馆的大约350万份纸上干燥植物的大量材料。通常,植物的收集者是未知的。因此,必须开发一种程序来确定纸上笔迹的作者。在这部作品中,静态的特征被转化为动态的形式。这是用一个惰性球的模型来完成的,它通过文字滚动。在这种离线写作者识别过程中,使用了不同的数学过程,例如用勒让德多项式复制单个字符的写作者行。当仅使用一个字符时,识别率约为40%。通过多字符组合,识别率大幅提高,13个字符,93个写作者(从国际iam库中随机抽取[3]),识别率达到98.7%。另一种方法是通过手写的文字来识别作者。将单词剪切并转换为6维时间序列,并通过dtw方法进行比较。使用整个手写句子的全球统计方法的识别率超过98%。该方法的识别率达到99.5%。
{"title":"Writer recognition by characters, words and sentences","authors":"Martin Gehrke, K. Steinke, Robert Dzido","doi":"10.1109/CCST.2009.5335523","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335523","url":null,"abstract":"The methods developed in the research project “Herbar Digital” are to help plant taxonomists to master the great amount of material of about 3.5 million dried plants on paper sheets belonging to the Botanic Museum Berlin in Germany. Frequently the collector of the plant is unknown. So a procedure had to be developed in order to determine the writer of the handwriting on the sheet. In the present work the static character is transformed into a dynamic form. This is done with the model of an inert ball which is rolled through the written character. During this off-line writer recognition, different mathematical procedures are used such as the reproduction of the write line of individual characters by Legendre polynomials. When only one character is used, a recognition rate of about 40% is obtained. By combining multiple characters, the recognition rate rises considerably and reaches 98.7% with 13 characters and 93 writers (chosen randomly from the international IAMdatabase [3]). Another approach tries to identify the writer by handwritten words. The word is cut out and transformed into a 6-dimensional time series and compared e.g. by means of DTW-methods. A global statistical approach using the whole handwritten sentences results in a similar recognition rate of more than 98%. By combining the methods, a recognition rate of 99.5% is achieved.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A rapid deployment guided radar sensor 一种快速部署制导雷达传感器
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335532
K. Harman, B. Hodgins, J. Patchell, M. Maki
A need has long existed for a rapid deployment, terrain following security sensor for use around portable resources, along an avenue of approach, or for the temporary replacement of a failed sensor. Existing solutions such as portable microwave or passive infra-red (PIR) sensors are relatively inexpensive, but cannot work over uneven terrain, around corners, or in foliage. The cost and installation complexity of these sensors increases rapidly as more units are required. The Repels® RF sensor provides many of the required features, but uses sensor cables that are overtly mounted above ground. The OmniTrax® technology was first introduced at the 2004 Carnahan Conference, applying Ultra Wide Band radar principles to a ranging leaky cable guided radar sensor. In 2007, a program called TFDIDS (Terrain Following Deployable Intrusion Detection Sensor) was initiated in conjunction with the US Air Force, to apply the advancements in this ranging technology to the rapid deployment sensor needs defined by the USAF Tactical Automated Sensor System (TASS). This advancement includes a novel invention employing the processing of dual parallel leaky sensor cables, termed Stereo OmniTrax. This processing dramatically improves the discrimination between human intrusion threats and small nuisance targets or environmental effects. The TFDIDS system provides a complete lightweight sensor kit for the rapid deployment (less than 30 minutes) of a 100 m detection zone, and later, for the sensor's retrieval and reuse. TFDIDS interfaces to standard Government Furnished Equipment (GFE) including USAF powering and communications devices. This paper outlines the key elements of the TFDIDS design, describes its components, and explains how TFDIDS provides reliable detection using a surface sensor cable deployment. Initial performance results are presented, from tests conducted at the Senstar SITE in 2008. The test applications include through-the-woods, on tarmac and on typical open field surfaces.
长期以来,人们一直需要一种快速部署的地形跟踪安全传感器,用于便携式资源周围、靠近通道或临时更换故障传感器。现有的解决方案,如便携式微波或被动红外(PIR)传感器相对便宜,但不能在不平坦的地形、拐角处或树叶中工作。随着需要更多的传感器,这些传感器的成本和安装复杂性迅速增加。Repels®射频传感器提供了许多所需的功能,但使用了明显安装在地面上的传感器电缆。OmniTrax®技术首次在2004年卡纳汉会议上推出,将超宽带雷达原理应用于测距泄漏电缆制导雷达传感器。2007年,与美国空军联合启动了一项名为TFDIDS(地形跟随可部署入侵检测传感器)的计划,将这种测距技术的进步应用于美国空军战术自动化传感器系统(TASS)定义的快速部署传感器需求。这项进步包括一项新发明,采用双平行泄漏传感器电缆的处理,称为立体声OmniTrax。这种处理极大地提高了人类入侵威胁和小滋扰目标或环境影响之间的区别。TFDIDS系统提供了一个完整的轻型传感器套件,用于100米探测区域的快速部署(不到30分钟),以及随后的传感器检索和重用。tfdid接口到标准政府配备的设备(GFE),包括美国空军的电源和通信设备。本文概述了TFDIDS设计的关键要素,描述了其组件,并解释了TFDIDS如何使用表面传感器电缆部署提供可靠的检测。介绍了2008年在Senstar SITE进行的测试的初步性能结果。测试应用包括穿过树林,在停机坪和典型的开放场地表面。
{"title":"A rapid deployment guided radar sensor","authors":"K. Harman, B. Hodgins, J. Patchell, M. Maki","doi":"10.1109/CCST.2009.5335532","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335532","url":null,"abstract":"A need has long existed for a rapid deployment, terrain following security sensor for use around portable resources, along an avenue of approach, or for the temporary replacement of a failed sensor. Existing solutions such as portable microwave or passive infra-red (PIR) sensors are relatively inexpensive, but cannot work over uneven terrain, around corners, or in foliage. The cost and installation complexity of these sensors increases rapidly as more units are required. The Repels® RF sensor provides many of the required features, but uses sensor cables that are overtly mounted above ground. The OmniTrax® technology was first introduced at the 2004 Carnahan Conference, applying Ultra Wide Band radar principles to a ranging leaky cable guided radar sensor. In 2007, a program called TFDIDS (Terrain Following Deployable Intrusion Detection Sensor) was initiated in conjunction with the US Air Force, to apply the advancements in this ranging technology to the rapid deployment sensor needs defined by the USAF Tactical Automated Sensor System (TASS). This advancement includes a novel invention employing the processing of dual parallel leaky sensor cables, termed Stereo OmniTrax. This processing dramatically improves the discrimination between human intrusion threats and small nuisance targets or environmental effects. The TFDIDS system provides a complete lightweight sensor kit for the rapid deployment (less than 30 minutes) of a 100 m detection zone, and later, for the sensor's retrieval and reuse. TFDIDS interfaces to standard Government Furnished Equipment (GFE) including USAF powering and communications devices. This paper outlines the key elements of the TFDIDS design, describes its components, and explains how TFDIDS provides reliable detection using a surface sensor cable deployment. Initial performance results are presented, from tests conducted at the Senstar SITE in 2008. The test applications include through-the-woods, on tarmac and on typical open field surfaces.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115421400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
43rd Annual 2009 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1