首页 > 最新文献

2016 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
A new approach to automatic signature complexity assessment 一种新的签名复杂度自动评估方法
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815678
O. Miguel-Hurtado, R. Guest, Thomas Chatzisterkotis
Understanding signature complexity has been shown to be a crucial facet for both forensic and biometric appbcations. The signature complexity can be defined as the difficulty that forgers have when imitating the dynamics (constructional aspects) of other users signatures. Knowledge of complexity along with others facets such stability and signature length can lead to more robust and secure automatic signature verification systems. The work presented in this paper investigates the creation of a novel mathematical model for the automatic assessment of the signature complexity, analysing a wider set of dynamic signature features and also incorporating a new layer of detail, investigating the complexity of individual signature strokes. To demonstrate the effectiveness of the model this work will attempt to reproduce the signature complexity assessment made by experienced FDEs on a dataset of 150 signature samples.
理解签名的复杂性已经被证明是法医和生物识别应用的一个关键方面。签名复杂性可以定义为伪造者在模仿其他用户签名的动态(构造方面)时所具有的难度。对复杂性以及稳定性和签名长度等其他方面的了解可以导致更健壮和安全的自动签名验证系统。本文提出的工作研究了一种用于自动评估签名复杂性的新型数学模型的创建,分析了更广泛的动态签名特征集,并结合了新的细节层,研究了单个签名笔画的复杂性。为了证明该模型的有效性,本工作将尝试在150个签名样本的数据集上再现有经验的fde所做的签名复杂性评估。
{"title":"A new approach to automatic signature complexity assessment","authors":"O. Miguel-Hurtado, R. Guest, Thomas Chatzisterkotis","doi":"10.1109/CCST.2016.7815678","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815678","url":null,"abstract":"Understanding signature complexity has been shown to be a crucial facet for both forensic and biometric appbcations. The signature complexity can be defined as the difficulty that forgers have when imitating the dynamics (constructional aspects) of other users signatures. Knowledge of complexity along with others facets such stability and signature length can lead to more robust and secure automatic signature verification systems. The work presented in this paper investigates the creation of a novel mathematical model for the automatic assessment of the signature complexity, analysing a wider set of dynamic signature features and also incorporating a new layer of detail, investigating the complexity of individual signature strokes. To demonstrate the effectiveness of the model this work will attempt to reproduce the signature complexity assessment made by experienced FDEs on a dataset of 150 signature samples.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"66 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80936422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human activity recognition using optical flow based feature set 基于光流特征集的人体活动识别
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815694
S. S. Kumar, M. John
An optical flow based approach for recognizing human actions and human-human interactions in video sequences has been addressed in this paper. We propose a local descriptor built by optical flow vectors along the edges of the action performer(s). By using the proposed feature descriptor with multi-class SVM classifier, recognition rates as high as 95.69% and 94.62% have been achieved for Weizmann action dataset and KTH action dataset respectively. The recognition rate achieved is 92.7% for UT interaction Set_1, 90.21% for UT interaction Set_2. The results demonstrate that the method is simple and efficient.
本文研究了一种基于光流的方法来识别视频序列中的人类行为和人与人之间的互动。我们提出了一个由沿动作表演者边缘的光流矢量构建的局部描述子。将所提出的特征描述符与多类SVM分类器结合使用,对Weizmann动作数据集和KTH动作数据集的识别率分别高达95.69%和94.62%。UT相互作用Set_1的识别率为92.7%,UT相互作用Set_2的识别率为90.21%。结果表明,该方法简单、有效。
{"title":"Human activity recognition using optical flow based feature set","authors":"S. S. Kumar, M. John","doi":"10.1109/CCST.2016.7815694","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815694","url":null,"abstract":"An optical flow based approach for recognizing human actions and human-human interactions in video sequences has been addressed in this paper. We propose a local descriptor built by optical flow vectors along the edges of the action performer(s). By using the proposed feature descriptor with multi-class SVM classifier, recognition rates as high as 95.69% and 94.62% have been achieved for Weizmann action dataset and KTH action dataset respectively. The recognition rate achieved is 92.7% for UT interaction Set_1, 90.21% for UT interaction Set_2. The results demonstrate that the method is simple and efficient.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83223317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Transitioning security software and hardware systems for use on unsecured or externally connected networks 将安全软件和硬件系统转换为在不安全或外部连接的网络上使用
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815721
R. Kulchyski
The threat of online attacks has become a growing concern in technological environments across the globe. As is quite obvious, having a physical security system tampered with maliciously over an internet connection can be an enormous threat. Historically many security sensor companies have avoided this concern by leaving their security networks isolated from the external internet Presently we approach an age where operating an isolated network on a client site will become less and less appealing to the client With the added benefits of monitoring from their own network, use of existing infrastructure, remote connectivity options and the threat and or fear of an uncontrolled network on their site, many customers have a desire to have their security system on their own monitored, externally connected network An exploration is taken into the process of converting a product using its isolation for network security, into a product that can be dropped with confidence into an externally connected or potentially unsecure network environment. A range of concepts are covered at varying depths, including testing tools for getting started, encryption and reverse engineering, penetration testing, tools used for adding security and the difficulties and logistics of keeping patches up to date and virus definitions current.
网络攻击的威胁已成为全球技术环境日益关注的问题。很明显,通过互联网连接恶意篡改物理安全系统可能是一个巨大的威胁。从历史上看,许多安全传感器公司通过将其安全网络与外部互联网隔离来避免这种担忧。现在我们接近这样一个时代,在客户端站点上运行一个孤立的网络对客户的吸引力越来越小,因为客户可以从自己的网络进行监控,使用现有的基础设施,远程连接选项以及威胁或担心他们站点上不受控制的网络。许多客户都希望自己的安全系统受到监控,外部连接的网络。探索将使用其网络安全隔离的产品转换为可以放心地放入外部连接或可能不安全的网络环境的产品的过程。本书从不同的深度涵盖了一系列概念,包括用于入门的测试工具、加密和逆向工程、渗透测试、用于增加安全性的工具,以及保持补丁更新和病毒定义最新的困难和后勤。
{"title":"Transitioning security software and hardware systems for use on unsecured or externally connected networks","authors":"R. Kulchyski","doi":"10.1109/CCST.2016.7815721","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815721","url":null,"abstract":"The threat of online attacks has become a growing concern in technological environments across the globe. As is quite obvious, having a physical security system tampered with maliciously over an internet connection can be an enormous threat. Historically many security sensor companies have avoided this concern by leaving their security networks isolated from the external internet Presently we approach an age where operating an isolated network on a client site will become less and less appealing to the client With the added benefits of monitoring from their own network, use of existing infrastructure, remote connectivity options and the threat and or fear of an uncontrolled network on their site, many customers have a desire to have their security system on their own monitored, externally connected network An exploration is taken into the process of converting a product using its isolation for network security, into a product that can be dropped with confidence into an externally connected or potentially unsecure network environment. A range of concepts are covered at varying depths, including testing tools for getting started, encryption and reverse engineering, penetration testing, tools used for adding security and the difficulties and logistics of keeping patches up to date and virus definitions current.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"120 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89376160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric encryption system for increased security 生物识别加密系统,提高安全性
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815700
Ranjith Jayapal, Pramod Govindan
Security is very important in present day life. In this computer-networked world, most of the activities are computer based, and the data transactions arc protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords might be related to an individual that can lead to dictionary attacks. Indeed, remembering several passwords become a tedious task. Biometrics is a science that measures individual physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome use of complex passwords. Our research uses the features of biometrics to efficiently implement a biometric encryption system with high level of security.
安全在当今生活中是非常重要的。在这个计算机联网的世界里,大多数活动都是以计算机为基础的,数据交易受到密码的保护。这些密码可以识别各种实体,如银行账户、手机等。人们可能会重复使用相同的密码,或者密码可能与可能导致字典攻击的个人相关。事实上,记住几个密码成了一项乏味的任务。生物计量学是一门以独特的方式测量个人身体特征的科学。因此,生物识别技术作为一种方法,取代了复杂密码的繁琐使用。我们的研究利用生物识别技术的特点,有效地实现了一个具有高安全性的生物识别加密系统。
{"title":"Biometric encryption system for increased security","authors":"Ranjith Jayapal, Pramod Govindan","doi":"10.1109/CCST.2016.7815700","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815700","url":null,"abstract":"Security is very important in present day life. In this computer-networked world, most of the activities are computer based, and the data transactions arc protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords might be related to an individual that can lead to dictionary attacks. Indeed, remembering several passwords become a tedious task. Biometrics is a science that measures individual physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome use of complex passwords. Our research uses the features of biometrics to efficiently implement a biometric encryption system with high level of security.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"11 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75417136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Online and offline conformance checking of inter-organizational business processes with incomplete process logs 使用不完整的流程日志进行组织间业务流程的在线和离线一致性检查
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815702
A. C. D'Iddio, C. Schunck, F. Arcieri, M. Talamo
Ensuring the compliance of inter-organizational business processes with security, privacy and workflow requirements poses significant challenges. For compliance checking a specification of the process model which contains important requirements like causal dependencies among actions must be compared to the available data from the process execution. Complete execution data may only become available by combining distributed event logs which are maintained and stored independently by the participants. Frequently the information in combined event logs is found to be of limited reliability and quality: the overall maturity of some event logs may be low, the temporal structure of events may be unclear/imprecise (e.g. when logs of different organizations are combined), confidentiality constraints may prevent certain activities from being logged and logs may be partially corrupted. We propose an approach using abstraction techniques based on over-approximation and under-approximation for checking the compliance of incomplete process logs with a given process specification. Such methods are widely used in Model Checking to model unmanageable information about the states of a system (state explosion). Here these techniques are applied to model unavailable information, in particular incomplete event descriptions. We show under what conditions deviations from a specification can be confirmed as anomalies and when a process can be certified as correct even in the presence of incomplete event descriptions. The methods described here can be adopted for post mortem investigation, for the prevention and detection of security anomalies and for assessing the maturity level of event logs.
确保组织间业务流程与安全性、隐私性和工作流需求的遵从性构成了重大挑战。对于合规性检查,必须将包含重要需求(如操作之间的因果依赖关系)的流程模型规范与流程执行的可用数据进行比较。只有将参与者独立维护和存储的分布式事件日志结合起来,才能获得完整的执行数据。经常发现合并事件日志中的信息可靠性和质量有限:一些事件日志的整体成熟度可能较低,事件的时间结构可能不清楚/不精确(例如,当不同组织的日志合并时),机密性约束可能阻止记录某些活动,日志可能部分损坏。我们提出了一种使用基于过近似和欠近似的抽象技术来检查不完整过程日志是否符合给定过程规范的方法。这种方法被广泛应用于模型检查中,对系统状态的不可管理信息(状态爆炸)进行建模。在这里,这些技术被应用于建模不可用的信息,特别是不完整的事件描述。我们展示了在什么条件下,对规范的偏离可以被确认为异常,以及即使在存在不完整事件描述的情况下,什么时候可以证明过程是正确的。这里描述的方法可以用于事后调查、安全异常的预防和检测,以及评估事件日志的成熟度级别。
{"title":"Online and offline conformance checking of inter-organizational business processes with incomplete process logs","authors":"A. C. D'Iddio, C. Schunck, F. Arcieri, M. Talamo","doi":"10.1109/CCST.2016.7815702","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815702","url":null,"abstract":"Ensuring the compliance of inter-organizational business processes with security, privacy and workflow requirements poses significant challenges. For compliance checking a specification of the process model which contains important requirements like causal dependencies among actions must be compared to the available data from the process execution. Complete execution data may only become available by combining distributed event logs which are maintained and stored independently by the participants. Frequently the information in combined event logs is found to be of limited reliability and quality: the overall maturity of some event logs may be low, the temporal structure of events may be unclear/imprecise (e.g. when logs of different organizations are combined), confidentiality constraints may prevent certain activities from being logged and logs may be partially corrupted. We propose an approach using abstraction techniques based on over-approximation and under-approximation for checking the compliance of incomplete process logs with a given process specification. Such methods are widely used in Model Checking to model unmanageable information about the states of a system (state explosion). Here these techniques are applied to model unavailable information, in particular incomplete event descriptions. We show under what conditions deviations from a specification can be confirmed as anomalies and when a process can be certified as correct even in the presence of incomplete event descriptions. The methods described here can be adopted for post mortem investigation, for the prevention and detection of security anomalies and for assessing the maturity level of event logs.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82284925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An integrated multidisciplinary model for security management and related supporting integrated technological system 安全管理的多学科集成模型及其配套集成技术体系
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815690
F. Garzia
The purpose of this paper is to illustrate a general Integrated Multidisciplinary Model for Security Management (IMMSM), the related optimized implementation technique based on Genetic Algorithms (GAs) and the supporting Integrated Technological System Framework (ITSF) which can be adopted in most situations and which has produced interesting results, both from a theoretical and practical point of view, in security management, and even from a cost/benefit point of view in different existing organizations which have started to adopt the IMMSM and have started to modify their already existing technological systems to support it through the above mentioned ITSF.
本文的目的是说明一个通用的集成多学科安全管理模型(IMMSM),基于遗传算法(GAs)和支持集成技术系统框架(ITSF)的相关优化实现技术,可以在大多数情况下采用,并从理论和实践的角度来看,在安全管理中产生了有趣的结果。甚至从成本/效益的角度来看,不同的现有机构已经开始采用imsm,并开始修改其现有的技术系统,以通过上述的资讯科技基金来支持它。
{"title":"An integrated multidisciplinary model for security management and related supporting integrated technological system","authors":"F. Garzia","doi":"10.1109/CCST.2016.7815690","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815690","url":null,"abstract":"The purpose of this paper is to illustrate a general Integrated Multidisciplinary Model for Security Management (IMMSM), the related optimized implementation technique based on Genetic Algorithms (GAs) and the supporting Integrated Technological System Framework (ITSF) which can be adopted in most situations and which has produced interesting results, both from a theoretical and practical point of view, in security management, and even from a cost/benefit point of view in different existing organizations which have started to adopt the IMMSM and have started to modify their already existing technological systems to support it through the above mentioned ITSF.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"133 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74876959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Vulnerabilities of biometric systems integrated in mobile devices: An evaluation 集成在移动设备中的生物识别系统的漏洞:评估
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815677
Ines Goicoechea-Telleria, J. Liu-Jimenez, R. Sánchez-Reillo, Wendy Ponce-Hernandez
With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies to evaluate the security of fingerprint biometric systems embedded in mobile devices. Then, this methodology is applied on 5 different smartphones for a security evaluation and their ability' to reject false fingerprints is compared.
随着越来越多的人拥有带有指纹传感器的智能手机,有必要能够评估和比较不同智能手机拒绝假指纹的能力,因为攻击者可以访问敏感数据(银行账户,图片,文件)。为此,需要一个共同的基础来执行可比较的安全性评估。本文综合了几种方法来评估嵌入在移动设备中的指纹生物识别系统的安全性。然后,将这种方法应用于5种不同的智能手机进行安全评估,并比较它们拒绝假指纹的能力。
{"title":"Vulnerabilities of biometric systems integrated in mobile devices: An evaluation","authors":"Ines Goicoechea-Telleria, J. Liu-Jimenez, R. Sánchez-Reillo, Wendy Ponce-Hernandez","doi":"10.1109/CCST.2016.7815677","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815677","url":null,"abstract":"With the growing number of people that own a smartphone with a fingerprint sensor, it is necessary to be able to assess and compare different smartphones' ability to reject false fingerprints, as attackers could have access to sensitive data (bank accounts, pictures, documents). For this end, a common ground is needed to perform comparable security evaluations. This paper unifies several methodologies to evaluate the security of fingerprint biometric systems embedded in mobile devices. Then, this methodology is applied on 5 different smartphones for a security evaluation and their ability' to reject false fingerprints is compared.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74165121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
System for monitoring natural disasters using natural language processing in the social network Twitter 在社交网络Twitter中使用自然语言处理来监测自然灾害的系统
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815686
Miguel Maldonado, D. Alulema, D. Morocho, Marida Proano
This paper presents the design and implementation of an automated system that allows monitoring the social network Twitter, making a connection to the API, to filter content according to four categories (volcanic, telluric, fires and climatological) which affect Ecuador because of its geographical location, taking into account that these cannot be easily predicted, and stores all tweets in a database for analysis. The filtering process is performed by using the NLTK tool with which the frequency of a word is determined within a tweet, to be classified later in one of the proposed categories. The results for each category are displayed on a web page that contains real-time statistics of the database. This work provides access to information on natural disasters because they are classified.
本文介绍了一个自动化系统的设计和实现,该系统可以监控社交网络Twitter,连接到API,根据四个类别(火山,大地,火灾和气候)过滤内容,这些类别影响厄瓜多尔的地理位置,考虑到这些不容易预测,并将所有推文存储在数据库中进行分析。过滤过程是通过使用NLTK工具来执行的,该工具可以在tweet中确定单词的频率,然后将其分类到提议的类别之一中。每个类别的结果显示在包含数据库实时统计信息的网页上。这项工作提供了获取自然灾害信息的途径,因为这些信息是保密的。
{"title":"System for monitoring natural disasters using natural language processing in the social network Twitter","authors":"Miguel Maldonado, D. Alulema, D. Morocho, Marida Proano","doi":"10.1109/CCST.2016.7815686","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815686","url":null,"abstract":"This paper presents the design and implementation of an automated system that allows monitoring the social network Twitter, making a connection to the API, to filter content according to four categories (volcanic, telluric, fires and climatological) which affect Ecuador because of its geographical location, taking into account that these cannot be easily predicted, and stores all tweets in a database for analysis. The filtering process is performed by using the NLTK tool with which the frequency of a word is determined within a tweet, to be classified later in one of the proposed categories. The results for each category are displayed on a web page that contains real-time statistics of the database. This work provides access to information on natural disasters because they are classified.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77143436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Airport security system standards development: Challenges and outcomes 机场安全系统标准发展:挑战与成果
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815716
C. Wilkinson, Art Kosatka
The complexity of security systems at airports within the United States - indeed, worldwide - has grown significantly over the years in response to increasing threats and regulatory developments. Initially, each airport developed its own security system without recourse to unified standards. The result was a mixed bag of proprietary systems which were typically over budget, poorly integrated, did not fully meet security requirements, and were both difficult and expensive to maintain. To address this, in the early 90s the ACC (Airports Consultants Council) chaired an RTCA Federal Advisory Committee to develop performance standards for staff access control systems to permit access to security-related areas of an airport. This was followed several years later by TSA's technical guidelines for checked baggage and passenger screening systems. Tying these together, a comprehensive document known within the industry as “The Guidelines”, (The full title is: “Recommended Security Guidelines for Airport Planning, Design and Construction “) was commissioned by TSA in 2006 to replace an earlier 2001 FAA version. This was updated in 2011, and a revision is currently underway for a 4th iteration. The RTCA access control standards are currently in their 7th iteration and the checkpoint and baggage guidelines in their 5th and 6th iteration respectively: demonstrating the need to update such standards regularly, as technology and regulatory requirements change to meet the changing threat. The RTCA access control standard is a substantial document, totaling over 300 pages. The checked baggage guidelines are over 500 pages; the checkpoint guidelines are over 150 pages. Together with “The Guidelines” they comprise a comprehensive set of airport security guidance, frequently referenced throughout the world. This paper reviews how the content of each of these standards was developed: how the developmental activity was funded: how participation by airport professionals contributed, and how the various documents continue to be coordinated. It addresses the issue of uneven technology development cycles and requirements, both within each document and between documents, and how to handle these changes without developing “silos”, as well as providing details of how these challenges were addressed in the access control system standards and the Guidelines.
多年来,为了应对日益增加的威胁和监管方面的发展,美国——实际上是全世界——机场安全系统的复杂性显著增加。最初,每个机场都开发了自己的安全系统,没有统一的标准。结果是一个混合的专有系统,这些系统通常超出预算,集成不良,不能完全满足安全需求,并且维护起来既困难又昂贵。为了解决这个问题,在90年代初,ACC(机场顾问委员会)主持了一个RTCA联邦咨询委员会,以制定工作人员进入控制系统的性能标准,以允许进入机场与安全有关的区域。几年后,美国运输安全管理局制定了托运行李和乘客安检系统的技术指南。将这些结合在一起,TSA于2006年委托编写了一份全面的文件,业内称为“指南”(全称是:“机场规划、设计和建设安全指南推荐”),以取代2001年FAA的版本。该版本于2011年更新,目前正在进行第4次迭代的修订。RTCA访问控制标准目前处于第7次迭代,检查点和行李指南分别处于第5次和第6次迭代:随着技术和监管要求的变化,以满足不断变化的威胁,需要定期更新这些标准。RTCA访问控制标准是一个重要的文件,总共超过300页。托运行李指南超过500页;检查点指南有150多页。它们连同“指引”组成了一套全面的机场保安指引,在世界各地经常被引用。本文回顾了每一项标准的内容是如何制定的;发展活动是如何获得资助的;机场专业人员的参与是如何作出贡献的;以及各种文件是如何继续协调的。它解决了每个文件内部和文件之间技术开发周期和需求不均衡的问题,以及如何在不形成“孤岛”的情况下处理这些变化,并提供了如何在访问控制系统标准和指南中解决这些挑战的详细信息。
{"title":"Airport security system standards development: Challenges and outcomes","authors":"C. Wilkinson, Art Kosatka","doi":"10.1109/CCST.2016.7815716","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815716","url":null,"abstract":"The complexity of security systems at airports within the United States - indeed, worldwide - has grown significantly over the years in response to increasing threats and regulatory developments. Initially, each airport developed its own security system without recourse to unified standards. The result was a mixed bag of proprietary systems which were typically over budget, poorly integrated, did not fully meet security requirements, and were both difficult and expensive to maintain. To address this, in the early 90s the ACC (Airports Consultants Council) chaired an RTCA Federal Advisory Committee to develop performance standards for staff access control systems to permit access to security-related areas of an airport. This was followed several years later by TSA's technical guidelines for checked baggage and passenger screening systems. Tying these together, a comprehensive document known within the industry as “The Guidelines”, (The full title is: “Recommended Security Guidelines for Airport Planning, Design and Construction “) was commissioned by TSA in 2006 to replace an earlier 2001 FAA version. This was updated in 2011, and a revision is currently underway for a 4th iteration. The RTCA access control standards are currently in their 7th iteration and the checkpoint and baggage guidelines in their 5th and 6th iteration respectively: demonstrating the need to update such standards regularly, as technology and regulatory requirements change to meet the changing threat. The RTCA access control standard is a substantial document, totaling over 300 pages. The checked baggage guidelines are over 500 pages; the checkpoint guidelines are over 150 pages. Together with “The Guidelines” they comprise a comprehensive set of airport security guidance, frequently referenced throughout the world. This paper reviews how the content of each of these standards was developed: how the developmental activity was funded: how participation by airport professionals contributed, and how the various documents continue to be coordinated. It addresses the issue of uneven technology development cycles and requirements, both within each document and between documents, and how to handle these changes without developing “silos”, as well as providing details of how these challenges were addressed in the access control system standards and the Guidelines.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83157152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interaction evaluation of a mobile voice authentication system 一种移动语音认证系统的交互评价
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815697
O. Miguel-Hurtado, Ramón Blanco-Gonzalo, R. Guest, Chiara Lunerti
Biometric recognition is nowadays widely used in smartphones, making the users' authentication easier and more transparent than PIN codes or patterns. Starting from this idea, the EU project PIDaaS aims to create a secure authentication system through mobile devices based on voice and face recognition as two of the most reliable and user-accepted modalities. This work introduces the project and the first PIDaaS usability evaluation carried out by means of the well-known HBSI model In this experiment, participants interact with a mobile device using the PIDaaS system under laboratory conditions: video recorded and assisted by an operator. Our findings suggest variability among sessions in terms of usability and feed the next PIDaaS HCI design.
如今,生物识别技术被广泛应用于智能手机,它使用户的身份验证比PIN码或图案更容易、更透明。从这个想法出发,欧盟PIDaaS项目旨在通过基于语音和面部识别的移动设备创建一个安全的身份验证系统,这是两种最可靠和用户接受的模式。这项工作介绍了该项目以及通过著名的HBSI模型进行的第一次PIDaaS可用性评估。在该实验中,参与者在实验室条件下使用PIDaaS系统与移动设备进行交互:由操作员录制和辅助的视频。我们的研究结果表明,在可用性方面,会话之间存在差异,并为下一个PIDaaS HCI设计提供了依据。
{"title":"Interaction evaluation of a mobile voice authentication system","authors":"O. Miguel-Hurtado, Ramón Blanco-Gonzalo, R. Guest, Chiara Lunerti","doi":"10.1109/CCST.2016.7815697","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815697","url":null,"abstract":"Biometric recognition is nowadays widely used in smartphones, making the users' authentication easier and more transparent than PIN codes or patterns. Starting from this idea, the EU project PIDaaS aims to create a secure authentication system through mobile devices based on voice and face recognition as two of the most reliable and user-accepted modalities. This work introduces the project and the first PIDaaS usability evaluation carried out by means of the well-known HBSI model In this experiment, participants interact with a mobile device using the PIDaaS system under laboratory conditions: video recorded and assisted by an operator. Our findings suggest variability among sessions in terms of usability and feed the next PIDaaS HCI design.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89867841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2016 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1