Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Engineering

Analysis Of Truck Delays At Container Terminal Security Inspection Stations, Dae-Gwun Yoon May 2007

Analysis Of Truck Delays At Container Terminal Security Inspection Stations, Dae-Gwun Yoon

Dissertations

After September 11, 2001, special attention has been given to the vulnerability at container transportation to terrorist activities. United States Customs and Border Protection (CBP) has set up inspection stations for containers at seaport terminals to screen containers, but this practice affects the truck turnaround time in the seaport by generating additional processing delays.

This dissertation analyses the additional truck turnaround time incurred at the inspection stations under various levels of security. Queuing models were used to estimate truck delay as containers are inspected at two successive security inspection stages. Each stage may utilize one or more inspection equipment. The …


Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen Jan 2007

Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen

Theses

Non Repudiation Secure File Transfer Protocol (NRSFTP) is designed to resolve three main concerns for today's electronic file transfer methodology. The three main concerns are Non-Repudiation, Secure, and Non-Real Time file transfer. Non-repudiation is to assure the receiver that the sender of the document is not an imposter. Secure document transfer is to assure the sender that only the intended receiver will be able to read the document. Non-real-time file transfer is to provide convenient and low cost transportability of the encrypted data from one party to another. With the above three concerns addressed, the NRSFTP protocol can be widely …


Pattern Recognized Surveillance System, Purdue Ect Team Jan 2007

Pattern Recognized Surveillance System, Purdue Ect Team

ECT Fact Sheets

The ultimate objective is to create a complete-decision maker which allows us to detect the new state and initiate appropriate actions taking and analyzing all historical and current information based upon adaptive reasoning. Computers have the ability to extract information from multiple sources and identify and track patterns of activity that are inconsistent with "normal" operations.


Emerging Video Surveillance And Monitoring Technologies, Purdue Ect Team Jan 2007

Emerging Video Surveillance And Monitoring Technologies, Purdue Ect Team

ECT Fact Sheets

The traditional video surveillance applications have some limitations; 1) one unit per one person in one place, 2) the limited area for surveillance due to the location of cameras 3) increasing operating cost, 4) hard reductions in theft and claim rates over the long term. Recently, video technology has grown by leaps and bounds throughout the last few years due to the steep development of Information Technology (IT). The newest video surveillance technologies seem to be taking two aspects: 1) Digital Video Surveillance (DVS) of a turn toward digital video servers using Internet access, and 2) Multi-modal User Interface (MUI).


Air Ventilation Protection System For Building Security, Purdue Ect Team Jan 2007

Air Ventilation Protection System For Building Security, Purdue Ect Team

ECT Fact Sheets

The new technology to solve the limitation of conventional Collective protection equipment (CPE) system has been developed as "Combined ESP/ESF/PCO and microfibrous media CPE application". This concept of this new technology is the combination of the both systems; 1) Microfibrous Material Technology, and 2) Photocataytic Oxidation Technology.


New Access Control Technologies: Biometric Identification, Purdue Ect Team Jan 2007

New Access Control Technologies: Biometric Identification, Purdue Ect Team

ECT Fact Sheets

Biometrics are computerized methods of recognizing people based on physical or behavioral characteristics. The main biometric technologies include face recognition, fingerprint, hand geometry, iris, palm prints, signature and voice. Biometric technologies can work in two modes – authentication (one-to-one matching) and identification (one-to-many) matching. However, only three biometrics are capable of the latter – face, finger and iris.


Acoustic Wave Sensors, Purdue Ect Team Jan 2007

Acoustic Wave Sensors, Purdue Ect Team

ECT Fact Sheets

Modern office buildings are generally considered safe and healthful working environments. However, energy conservation measures have minimized the infiltration of outside air and contributed to the buildup of indoor air contaminants. Three products manufactured by Microsensor Systems Inc. are introduced: HAZMATCAD, CW Sentry Plus, MiniCAD MKII.


Infrared Gas Sensor, Purdue Ect Team Jan 2007

Infrared Gas Sensor, Purdue Ect Team

ECT Fact Sheets

In recent years, the rapid development of monitoring and detecting technology of indoor air quality have been observed. We have seen the two major streams of detection technology introduced so far: Acoustic wave sensor and Infrared gas sensor. The use of a gas monitoring system in the case of that dangerous levels of gases are detected, can help to prevent an explosion or can help to prevent worker injury or exposure to toxic gases.


Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao Jan 2007

Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao

Faculty of Engineering and Information Sciences - Papers: Part A

A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee can check the validity of a nominative signature and further convince a third party to accept this fact. Recently, Huang and Wang proposed such a new scheme at ACISP 2004, and claimed that their scheme is secure under some standard computational assumptions. In this paper, we remark that their scheme is not a nominative signature in fact, since it fails to meet the crucial security requirement: verification untransferability. Specifically, we identify …


Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang Jan 2007

Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2AP, which are recently proposed by Peris-Lopez et al.We identify two e®ective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchro- nization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol runs. The latter attack can disclose all the secret information stored on a tag by interrogating the tag multiple times. Thus it compromises the tag completely. Moreover, we point …


Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong Jan 2007

Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

A nominative signature scheme allows a nominator (or signer) and a nominee (or veri¯er) to jointly generate and publish a signature in such a way that only the nominee can verify the signature and if nec- essary, only the nominee can prove to a third party that the signature is valid. In a recent work, Huang and Wang proposed a new nominative signature scheme which, in addition to the above properties, only allows the nominee to convert a nominative signature to a publicly veri¯able one. In ACISP 2005, Susilo and Mu presented several algorithms and claimed that these algorithms can …


More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr Jan 2007

More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr

Journal of International Technology and Information Management

Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …


Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan Jan 2007

Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan

Journal of International Technology and Information Management

This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …