首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Biometrics assisted secure network transactions 生物识别技术协助安全的网络交易
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107849
V. O. Kunnil, A. Pillai, S. Mil'shtein
Biometric methods of authentication such as fingerprints, hand geometry, face recognition, voice, retina and iris scan are being increasingly used for security purposes. However online transactions still use traditional knowledge based, i.e., Personal Identification Number (PIN) or password for authentication. Such methods have proved ineffective over the course of time. Traditional key based authentication has been in use over the years, but not many forays have been made in to securing network transactions using biometrics. The length of the authentication key used in authentication systems is an important piece of the authentication process. In non-biometric authentication processes such as passwords or PIN numbers, depending on the length of the key, the information may be vulnerable to access by unauthorized users. Our system makes conventional key based authentication obsolete by replacing or supplementing the normal key characters with a personal identifier of the user. Without this biometric key the service is inaccessible. In this study we propose novel authentication protocol, based on use of a contactless undistorted fingerprint images to generate authentication key. The authentication process will be reinforced by randomly selected areas of a fingerprint that are used to generate keys. An additional layer of security is provided by using blood vessel map to determine a live finger is being used. We assert that usage of contactless, thus non-distorted, fingerprint as input to generate single session keys will enhance security of network transactions because of the amount of information in randomly selected segments of a fingerprint which is available to generate unique keys.
生物识别认证方法,如指纹、手部几何、面部识别、声音、视网膜和虹膜扫描,正越来越多地用于安全目的。然而,网上交易仍然使用传统的知识为基础,即个人识别号码(PIN)或密码进行身份验证。随着时间的推移,这些方法被证明是无效的。传统的基于密钥的身份验证已经使用了多年,但是使用生物识别技术保护网络事务的尝试并不多。身份验证系统中使用的身份验证密钥的长度是身份验证过程的重要组成部分。在非生物特征认证过程中,如密码或PIN码,根据密钥的长度,信息可能容易被未经授权的用户访问。我们的系统通过用用户的个人标识符替换或补充正常的密钥字符,使传统的基于密钥的身份验证过时。没有这个生物识别密钥,服务是不可访问的。在这项研究中,我们提出了一种新的认证协议,基于使用非接触式未失真的指纹图像来生成认证密钥。身份验证过程将通过指纹中随机选择用于生成密钥的区域来加强。通过使用血管图来确定正在使用的活手指,提供了额外的安全层。我们断言,使用非接触式,因此非扭曲的指纹作为输入来生成单个会话密钥将增强网络交易的安全性,因为指纹的随机选择片段中的信息量可用于生成唯一密钥。
{"title":"Biometrics assisted secure network transactions","authors":"V. O. Kunnil, A. Pillai, S. Mil'shtein","doi":"10.1109/THS.2011.6107849","DOIUrl":"https://doi.org/10.1109/THS.2011.6107849","url":null,"abstract":"Biometric methods of authentication such as fingerprints, hand geometry, face recognition, voice, retina and iris scan are being increasingly used for security purposes. However online transactions still use traditional knowledge based, i.e., Personal Identification Number (PIN) or password for authentication. Such methods have proved ineffective over the course of time. Traditional key based authentication has been in use over the years, but not many forays have been made in to securing network transactions using biometrics. The length of the authentication key used in authentication systems is an important piece of the authentication process. In non-biometric authentication processes such as passwords or PIN numbers, depending on the length of the key, the information may be vulnerable to access by unauthorized users. Our system makes conventional key based authentication obsolete by replacing or supplementing the normal key characters with a personal identifier of the user. Without this biometric key the service is inaccessible. In this study we propose novel authentication protocol, based on use of a contactless undistorted fingerprint images to generate authentication key. The authentication process will be reinforced by randomly selected areas of a fingerprint that are used to generate keys. An additional layer of security is provided by using blood vessel map to determine a live finger is being used. We assert that usage of contactless, thus non-distorted, fingerprint as input to generate single session keys will enhance security of network transactions because of the amount of information in randomly selected segments of a fingerprint which is available to generate unique keys.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constrained classification for infrastructure threat assessment 基础设施威胁评估的约束分类
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107853
K. P. Lennox, L. Glascoe
Validated computer simulation is an important aspect of critical infrastructure vulnerability assessment. The high computational cost of such models limits the number of threat scenarios that may be directly evaluated, which leads to a need for statistical emulation to predict outcomes for additional scenarios. Our particular area of interest is statistical methods for emulating complex computer codes that predict if a particular tunnel/explosive configuration results in the breaching of an underground transportation tunnel. In this case, there is considerable a priori information as to the properties of this breach classification boundary. We propose a constrained classifier, in the form of a parametric support vector machine, that allows us to incorporate expert knowledge into the shape of the decision boundary. We demonstrate the effectiveness of this technique with both a simulation study and by applying the method to a tunnel breach data set. This analysis reveals that constrained classification can offer substantial benefits for small sample sizes. The technique may be used either to provide a final classification result in the face of extremely limited data or as an interim step to guide adaptive sampling.
验证计算机仿真是关键基础设施脆弱性评估的一个重要方面。这种模型的高计算成本限制了可以直接评估的威胁场景的数量,这导致需要统计模拟来预测其他场景的结果。我们特别感兴趣的领域是模拟复杂计算机代码的统计方法,这些代码可以预测特定的隧道/爆炸配置是否会导致地下运输隧道的破坏。在这种情况下,关于这个缺口分类边界的性质有相当多的先验信息。我们提出了一个约束分类器,以参数支持向量机的形式,允许我们将专家知识合并到决策边界的形状中。我们通过模拟研究和将该方法应用于隧道破口数据集来证明该技术的有效性。这一分析表明,约束分类可以为小样本量提供实质性的好处。该技术既可用于在数据极其有限的情况下提供最终分类结果,也可作为指导自适应采样的过渡步骤。
{"title":"Constrained classification for infrastructure threat assessment","authors":"K. P. Lennox, L. Glascoe","doi":"10.1109/THS.2011.6107853","DOIUrl":"https://doi.org/10.1109/THS.2011.6107853","url":null,"abstract":"Validated computer simulation is an important aspect of critical infrastructure vulnerability assessment. The high computational cost of such models limits the number of threat scenarios that may be directly evaluated, which leads to a need for statistical emulation to predict outcomes for additional scenarios. Our particular area of interest is statistical methods for emulating complex computer codes that predict if a particular tunnel/explosive configuration results in the breaching of an underground transportation tunnel. In this case, there is considerable a priori information as to the properties of this breach classification boundary. We propose a constrained classifier, in the form of a parametric support vector machine, that allows us to incorporate expert knowledge into the shape of the decision boundary. We demonstrate the effectiveness of this technique with both a simulation study and by applying the method to a tunnel breach data set. This analysis reveals that constrained classification can offer substantial benefits for small sample sizes. The technique may be used either to provide a final classification result in the face of extremely limited data or as an interim step to guide adaptive sampling.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting ethnicity and gender from iris texture 从虹膜纹理预测种族和性别
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107909
S. Lagree, K. Bowyer
Previous researchers have reported success in predicting ethnicity and in predicting gender from features of the iris texture. This paper is the first to consider both problems using similar experimental approaches. Contributions of this work include greater accuracy than previous work on predicting ethnicity from iris texture, empirical evidence that suggests that gender prediction is harder than ethnicity prediction, and empirical evidence that ethnicity prediction is more difficult for females than for males.
先前的研究人员已经成功地通过虹膜纹理的特征来预测种族和性别。本文首次使用类似的实验方法来考虑这两个问题。这项工作的贡献包括比以前从虹膜纹理预测种族的工作更高的准确性,经验证据表明性别预测比种族预测更难,经验证据表明种族预测对女性比男性更困难。
{"title":"Predicting ethnicity and gender from iris texture","authors":"S. Lagree, K. Bowyer","doi":"10.1109/THS.2011.6107909","DOIUrl":"https://doi.org/10.1109/THS.2011.6107909","url":null,"abstract":"Previous researchers have reported success in predicting ethnicity and in predicting gender from features of the iris texture. This paper is the first to consider both problems using similar experimental approaches. Contributions of this work include greater accuracy than previous work on predicting ethnicity from iris texture, empirical evidence that suggests that gender prediction is harder than ethnicity prediction, and empirical evidence that ethnicity prediction is more difficult for females than for males.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Phenomenological scattering analysis of an RF Area Secure Perimeter 射频区域安全周界的现象学散射分析
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107913
C. Rappaport, Y. Rodriguez-Vaqueiro, J. Martinez-Lorenzo, B. Gonzalez-Valdes, John Beaty, A. Morgenthaler, W. Naqvi
Surveillance of perimeters is essential, especially for critical infrastructure such as transportation hubs, power stations, chemical facilities and others. There are many approaches to perimeter surveillance, but most of these require large upfront investments. This investigation uses advanced electromagnetic modeling techniques with real human body geometries to establish the best set of detectable features using the Wireless Area Secure Perimeter (WASP) system geometry. Using the frequency, power level, network configuration, and antennas employed by WASP, predictions on limits to target recognition are presented, along with recommendations for system reconfiguration for improving target characterization.
对周边环境进行监控至关重要,尤其是对交通枢纽、发电站、化学设施等关键基础设施。周边监控有很多方法,但大多数都需要大量的前期投资。本研究使用先进的电磁建模技术和真实的人体几何形状,利用无线区域安全周界(WASP)系统几何形状建立最佳的可检测特征集。利用WASP使用的频率、功率水平、网络配置和天线,对目标识别的限制进行了预测,并提出了改进目标表征的系统重构建议。
{"title":"Phenomenological scattering analysis of an RF Area Secure Perimeter","authors":"C. Rappaport, Y. Rodriguez-Vaqueiro, J. Martinez-Lorenzo, B. Gonzalez-Valdes, John Beaty, A. Morgenthaler, W. Naqvi","doi":"10.1109/THS.2011.6107913","DOIUrl":"https://doi.org/10.1109/THS.2011.6107913","url":null,"abstract":"Surveillance of perimeters is essential, especially for critical infrastructure such as transportation hubs, power stations, chemical facilities and others. There are many approaches to perimeter surveillance, but most of these require large upfront investments. This investigation uses advanced electromagnetic modeling techniques with real human body geometries to establish the best set of detectable features using the Wireless Area Secure Perimeter (WASP) system geometry. Using the frequency, power level, network configuration, and antennas employed by WASP, predictions on limits to target recognition are presented, along with recommendations for system reconfiguration for improving target characterization.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System-aware security for nuclear power systems 核电系统的系统感知安全
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107875
Rick A. Jones, Troy V. Nguyen, B. Horowitz
As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions. In this paper we layout a new systems engineering focused approach for addressing these threats: referred to as System-Aware Security for Nuclear Power Systems. This security architecture resides at the application layer and is based on smart reusable system security services. Furthermore, to show how such an architecture can enhance the security of nuclear power systems, this paper present a vision for this architectural formulation for a Nuclear Power Plant Turbine Control System.
正如最近公布的伊朗Stuxnet攻击所显示的那样,支持我们国家核电站的设备生产商存在嵌入式感染的重大威胁,这无法通过推进外围安全解决方案来完全解决。在本文中,我们提出了一种新的系统工程方法来解决这些威胁:称为核电系统的系统感知安全。这种安全体系结构位于应用层,基于智能可重用的系统安全服务。此外,为了展示这种体系结构如何提高核电系统的安全性,本文提出了核电厂涡轮控制系统的这种体系结构的构想。
{"title":"System-aware security for nuclear power systems","authors":"Rick A. Jones, Troy V. Nguyen, B. Horowitz","doi":"10.1109/THS.2011.6107875","DOIUrl":"https://doi.org/10.1109/THS.2011.6107875","url":null,"abstract":"As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions. In this paper we layout a new systems engineering focused approach for addressing these threats: referred to as System-Aware Security for Nuclear Power Systems. This security architecture resides at the application layer and is based on smart reusable system security services. Furthermore, to show how such an architecture can enhance the security of nuclear power systems, this paper present a vision for this architectural formulation for a Nuclear Power Plant Turbine Control System.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134229258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Attribution requirements for next generation Internets 下一代互联网的归属要求
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107894
Jeffrey Hunker, C. Gates, M. Bishop
The notion of attribution is usually tied to identity: the ability to associate the originator of something with that data. This notion is both a simplification of the myriad aspects of attribution, and a masking of many different types of attribution under the rubric of “identity.” Current efforts at attribution of data in the network focus either on traceback of packets or signing data at various network layers, and management of the keys involved. As the Internet evolves into the next generation network, and people implement testbeds to facilitate that evolution, they can design support mechanisms for other forms of attribution. What types of attribution should those mechanisms support? This paper presents requirements for attribution that will be useful both in the next generation infrastructure and in the data it manages.
归因的概念通常与身份联系在一起:将某些内容的创建者与该数据联系起来的能力。这个概念既简化了归因的无数方面,又在“身份”的标题下掩盖了许多不同类型的归因。当前网络中数据归属的工作集中在数据包的回溯或在各个网络层对数据进行签名,以及所涉及的密钥的管理。随着Internet向下一代网络演进,人们实现了促进这种演进的测试平台,他们可以为其他形式的归属设计支持机制。这些机制应该支持哪些类型的归因?本文提出了在下一代基础设施及其管理的数据中有用的归属要求。
{"title":"Attribution requirements for next generation Internets","authors":"Jeffrey Hunker, C. Gates, M. Bishop","doi":"10.1109/THS.2011.6107894","DOIUrl":"https://doi.org/10.1109/THS.2011.6107894","url":null,"abstract":"The notion of attribution is usually tied to identity: the ability to associate the originator of something with that data. This notion is both a simplification of the myriad aspects of attribution, and a masking of many different types of attribution under the rubric of “identity.” Current efforts at attribution of data in the network focus either on traceback of packets or signing data at various network layers, and management of the keys involved. As the Internet evolves into the next generation network, and people implement testbeds to facilitate that evolution, they can design support mechanisms for other forms of attribution. What types of attribution should those mechanisms support? This paper presents requirements for attribution that will be useful both in the next generation infrastructure and in the data it manages.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Technology transition of network defense visual analytics: Lessons learned from case studies 网络防御可视化分析的技术转型:案例研究的经验教训
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107916
B. O'Brien, A. D'Amico, Mark Larkin
Despite more than a decade of significant government investment in network defense research and technology development, there have been relatively few successful transitions across the chasm between research and operational use. Prior work describes approaches to crossing the “valley of death” from the perspective of the government sponsor or independent tester. The researcher and developer's perspective offered in this paper adds to our understanding of the challenges faced and solutions applied to deployment of advanced technologies into operational environments. The paper describes lessons learned from recent transitions of two information assurance technologies — the VIAssist® netflow visualization tool and the MeerCAT® wireless vulnerability analysis tool — into operational use by the Department of Homeland Security (DHS) and the Department of Defense (DoD).
尽管十多年来,政府在网络防御研究和技术开发方面进行了大量投资,但在研究和作战使用之间的鸿沟上,成功的过渡相对较少。先前的工作描述了从政府赞助者或独立测试者的角度跨越“死亡之谷”的方法。本文提供的研究人员和开发人员的观点增加了我们对将先进技术部署到操作环境中所面临的挑战和解决方案的理解。本文描述了从最近两种信息保障技术(VIAssist®netflow可视化工具和MeerCAT®无线漏洞分析工具)过渡到国土安全部(DHS)和国防部(DoD)实际使用的经验教训。
{"title":"Technology transition of network defense visual analytics: Lessons learned from case studies","authors":"B. O'Brien, A. D'Amico, Mark Larkin","doi":"10.1109/THS.2011.6107916","DOIUrl":"https://doi.org/10.1109/THS.2011.6107916","url":null,"abstract":"Despite more than a decade of significant government investment in network defense research and technology development, there have been relatively few successful transitions across the chasm between research and operational use. Prior work describes approaches to crossing the “valley of death” from the perspective of the government sponsor or independent tester. The researcher and developer's perspective offered in this paper adds to our understanding of the challenges faced and solutions applied to deployment of advanced technologies into operational environments. The paper describes lessons learned from recent transitions of two information assurance technologies — the VIAssist® netflow visualization tool and the MeerCAT® wireless vulnerability analysis tool — into operational use by the Department of Homeland Security (DHS) and the Department of Defense (DoD).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Next generation RASR TALONTM A remote robotic rapid area sensitive site reconnaissance platform 下一代RASR TALONTM远程机器人快速区域敏感现场侦察平台
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107861
Peter Wells, Q. America, Ted Lobb, Howard LaValley, J. Rezac, T. Chyba
In a joint collaboration, QinetiQ North America (QNA), Idaho National Labs (INL) and ITT are developing a ground robotic platform that provides real time remote sensitive site assessment with sensor fused area mapping, dynamic obstacle detection and avoidance, and path planning that can be retrofitted to the over 3000 fielded TALONs to date. This platform is developed under Defense Threat Reduction Agency (DTRA) Rapid Area Sensitive-Site Reconnaissance (RASR) Advanced Technical Demonstration (ATD) in conjunction with the Edgewood Chemical Biological Center. The RASR platform provides Warfighters, Civil Support Teams and First Responders with marked improvements in enhanced situational awareness and remote assessment tools.
在一项联合合作中,QinetiQ北美公司(QNA)、爱达荷国家实验室(INL)和ITT公司正在开发一种地面机器人平台,该平台可以提供实时远程敏感站点评估,包括传感器融合区域映射、动态障碍物检测和避免以及路径规划,该平台可以改造到目前为止超过3000台现场talon。该平台是由国防威胁减少局(DTRA)与Edgewood化学生物中心联合开发的快速区域敏感点侦察(RASR)先进技术演示(ATD)。RASR平台为作战人员、民事支援小组和第一响应者提供了显著改进的增强态势感知和远程评估工具。
{"title":"Next generation RASR TALONTM A remote robotic rapid area sensitive site reconnaissance platform","authors":"Peter Wells, Q. America, Ted Lobb, Howard LaValley, J. Rezac, T. Chyba","doi":"10.1109/THS.2011.6107861","DOIUrl":"https://doi.org/10.1109/THS.2011.6107861","url":null,"abstract":"In a joint collaboration, QinetiQ North America (QNA), Idaho National Labs (INL) and ITT are developing a ground robotic platform that provides real time remote sensitive site assessment with sensor fused area mapping, dynamic obstacle detection and avoidance, and path planning that can be retrofitted to the over 3000 fielded TALONs to date. This platform is developed under Defense Threat Reduction Agency (DTRA) Rapid Area Sensitive-Site Reconnaissance (RASR) Advanced Technical Demonstration (ATD) in conjunction with the Edgewood Chemical Biological Center. The RASR platform provides Warfighters, Civil Support Teams and First Responders with marked improvements in enhanced situational awareness and remote assessment tools.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127493704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling distributed command and control with standards-based geospatial collaboration 通过基于标准的地理空间协作实现分布式命令和控制
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107921
Ray Di Ciaccio, J. Pullen, P. Breimyer
Large-scale disasters present significant incident management challenges due to their size and complexity. Organizations often introduce distinct Concepts of Operations (CONOPs), resources, and tools. Collecting and disseminating real-time information across all responders and organizations presents a difficult, but urgent, technical problem, exemplified by the responses to the 2010 Deep Water Horizon oil spill and the 2011 9.0 magnitude earthquake and ensuing tsunami in Japan. Web-based application capabilities have matured significantly and can provide a distributed, feature-rich, and standards-based collaboration environment for First Responders. This paper describes the Next-Generation Incident Command System (NICS), formerly the Lincoln Distributed Disaster Response System (LDDRS), an open, non-proprietary, distributed, scalable, web-based situational awareness system for First Responders. NICS is developed by MIT Lincoln Laboratory (MIT LL), in partnership with the California Department of Forestry and Fire Protection (CAL FIRE), under the sponsorship of the Department of Homeland Security Science & Technology Directorate (S&T).
大规模灾难由于其规模和复杂性,给事件管理带来了重大挑战。组织经常引入不同的操作概念(CONOPs)、资源和工具。在所有响应者和组织中收集和传播实时信息是一个困难但紧迫的技术问题,2010年深水地平线漏油事件和2011年日本9.0级地震及随后的海啸的响应就是一个例子。基于web的应用程序功能已经非常成熟,可以为First Responders提供一个分布式的、功能丰富的、基于标准的协作环境。本文介绍了下一代事件指挥系统(NICS),即林肯分布式灾难响应系统(LDDRS),这是一种开放的、非专有的、分布式的、可扩展的、基于网络的第一响应者态势感知系统。NICS由麻省理工学院林肯实验室(MIT LL)与加州林业和消防部(CAL Fire)合作开发,在国土安全部科学与技术局(S&T)的赞助下。
{"title":"Enabling distributed command and control with standards-based geospatial collaboration","authors":"Ray Di Ciaccio, J. Pullen, P. Breimyer","doi":"10.1109/THS.2011.6107921","DOIUrl":"https://doi.org/10.1109/THS.2011.6107921","url":null,"abstract":"Large-scale disasters present significant incident management challenges due to their size and complexity. Organizations often introduce distinct Concepts of Operations (CONOPs), resources, and tools. Collecting and disseminating real-time information across all responders and organizations presents a difficult, but urgent, technical problem, exemplified by the responses to the 2010 Deep Water Horizon oil spill and the 2011 9.0 magnitude earthquake and ensuing tsunami in Japan. Web-based application capabilities have matured significantly and can provide a distributed, feature-rich, and standards-based collaboration environment for First Responders. This paper describes the Next-Generation Incident Command System (NICS), formerly the Lincoln Distributed Disaster Response System (LDDRS), an open, non-proprietary, distributed, scalable, web-based situational awareness system for First Responders. NICS is developed by MIT Lincoln Laboratory (MIT LL), in partnership with the California Department of Forestry and Fire Protection (CAL FIRE), under the sponsorship of the Department of Homeland Security Science & Technology Directorate (S&T).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130150308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Separating the baby from the bathwater: Toward a generic and practical framework for anonymization 从洗澡水中分离婴儿:走向一个通用和实用的匿名框架
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107839
S. Shapiro
Anonymization — the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual — has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization's utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.
匿名化——删除或以其他方式转换信息的过程,以减少将其与可识别的个人联系起来的能力——最近受到了很多批评,但许多方面对它的兴趣仍然很高。潜在的用例,包括那些在国土安全领域发现的用例,比那些对匿名化的效用产生怀疑的事件所代表的用例差异要大得多。然而,有效和高效地处理这种多样性带来了挑战。本文将介绍国土安全部科学技术局正在开发的表格文本数据的通用匿名化方法。这种方法将匿名化视为一种单一的、非排他性的隐私风险控制,要与其他潜在的控制一起考虑。它所描述的匿名化过程既是一个程序化的风险管理过程,也是一个技术过程。它的目标是使匿名化更多地成为一种系统工程活动。
{"title":"Separating the baby from the bathwater: Toward a generic and practical framework for anonymization","authors":"S. Shapiro","doi":"10.1109/THS.2011.6107839","DOIUrl":"https://doi.org/10.1109/THS.2011.6107839","url":null,"abstract":"Anonymization — the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual — has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization's utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1