Skip to main content

Part of the book series: International Series on Microprocessor-Based Systems Engineering ((ISCA,volume 3))

  • 224 Accesses

Abstract

Recognizing the need to protect information while it is being transmitted, industry has responded by developing and offering for sale a wide variety of communications protection devices or terminals. Security measures applied to the links can vary depending on a number of factors including: the speed of the link, the coupling and modulation technique used, whether the link is dedicated or switched, and others.1 Security considerations can be either physical or logical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

Cited References

  1. H.B. Becker, “Securing Distributed Systems: Gaining by ‘Losing’ Control,” Data Management, p. 24, March 1978.

    Google Scholar 

  2. W.R. Widmer, “Encryption Methods in Modern Data Communication Networks,” The 17th Carnaham Conference on Security Technology, ETH Zurich, Switzerland, Oct. 4–6, 1983.

    Google Scholar 

  3. K. Cohen and M.D. Garvey, “Data-encryption ‘box’ Secures Comm Systems Easily,” Electronic Design, pp. 159–163, April 16, 1981.

    Google Scholar 

  4. W.E. Osborne, “Long-Range Infrared Intruder Alarm Resists Fault Triggering,” Electronics, pp.111–113, November 20, 1972.

    Google Scholar 

  5. P. Wägli and J. Muggli, “Infrared Techniques in Security Systems,” Jurneés D’electronique 1982, Lausanne, Switzerland, Oct. 12–14, 1982.

    Google Scholar 

  6. H. Luck and K.R. Hase, “Signal Detection Aspects in Automatic Fire Detection,” Fire Safety Journal 6, pp. 233–240, 1983.

    Article  Google Scholar 

  7. H. Luck, “Signal Detection in Automatic Security Systems,” Proceedings of EUSIPCO-83, pp. 483–486, Erlangen, W. Germany, Sept. 12–16, 1983.

    Google Scholar 

  8. S.G. Twiselton, “A Modern Home Security System Using Existing Technology,” International Conference on Consumer Electronics, June 6–8, 1984, Chicago, Ill. 1984.

    Google Scholar 

  9. J. Darby, et al., “Vulnerability Analysis and Integrated Security System Design: The Technical Approach,” 1983 Conference on Crime Countermeasures and Security, pp.21–27, May 11–13, 1983.

    Google Scholar 

  10. T.S. Perry and P. Wallich, “Can Computer Crime Be Stopped? IEEE Spectrum, pp. 34–45, May 1984.

    Google Scholar 

  11. J.M. Nye, “Users’ Guide: Voice & Data Communications Protection Equipment,” NTIA-GR-80–9, Washington, DC, December 1980.

    Google Scholar 

  12. W. Twaddell, “Encryption Surge Fails to Materialize; Chip Makers Await Algorithm Shakeout,” EDN, p.84, August 18, 1983.

    Google Scholar 

  13. Intel Corp., Component Data Catalog, Santa Clara, CA, 1981.

    Google Scholar 

  14. D.L. Andrew, “Opportunities for Photoelectronic Beams for Indoor and Outdoor Security,” International Carnaham Conference on Security Technology, Zurich, Oct. 4–6, 1983.

    Google Scholar 

  15. Best Bits/Applications of Microprocessors, “Watching for Criminals,” IEEE Spectrum, p. 26, January 1984.

    Google Scholar 

General References

  • L.J. Hoffman, Modern Mothods for Computer Security and Privacy, New Jersey: Prentice-Hall Inc., 1977.

    Google Scholar 

  • D.B. Parker, Computer Security Management, Virginia: Reston Publishing Co., 1981.

    Google Scholar 

  • D. Parker, Fighting Computer Crime, New York: Charles Scribner’s Sons, 1983.

    Google Scholar 

  • A.D. Wyner, “An Analog Scrambling Scheme Which Does not Expand Bandwidth, Part I: Discrete Time, ” IEEE Trans. IT-25, 3, p. 261–274, May 1979.

    Article  MathSciNet  Google Scholar 

  • B. Schanning, “Securing Data Inexpensively Via Public Keys,” Computer Design, pp.105–108, April 5, 1983.

    Google Scholar 

  • C.H. Meyer and S.M. Matyas, Cryptography: A New Dimension in Computer Data Security, New York: Wiley, 1982.

    MATH  Google Scholar 

  • N. R. Pillai, et ai, “The Use of a Microprocessor- Based Programmable Controller in a Fossil Fired Generating Station,” IEECE’83, Toronto, Canada, Sept. 26–28, 1983.

    Google Scholar 

  • G.A. Kravetz, “Fail-Safe Rapid-Transit Engineering Ensures Reliability, Passenger Safety,” Electronics, pp.152–154, May 17, 1984.

    Google Scholar 

  • D.D. Dows, “Operating Systems Key Security With Basic Software Mechanisms, Electronics, pp. 122–127, March 8, 1984.

    Google Scholar 

  • P. Wells, “On-Chip Hardware Supports Computer Security Features,” Electronics, pp. 128–130, March 8, 1984.

    Google Scholar 

  • R. Checchio and C. Rosen, “A Method for Providing Secure Access to a Sensitive System,” Fourth Annual Phoenix Conference on Computers and Communications, Phoenix, Arizona, March 20–22, 1985.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1985 D. Reidel Publishing Company, Dordrecht, Holland

About this chapter

Cite this chapter

Georgopoulos, C.J. (1985). Interfaces in μP- Based Security and Alarm Systems. In: Interface Fundamentals in Microprocessor-Controlled Systems. International Series on Microprocessor-Based Systems Engineering, vol 3. Springer, Dordrecht. https://doi.org/10.1007/978-94-009-5470-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-94-009-5470-0_16

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-010-8915-9

  • Online ISBN: 978-94-009-5470-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics