Abstract
Recognizing the need to protect information while it is being transmitted, industry has responded by developing and offering for sale a wide variety of communications protection devices or terminals. Security measures applied to the links can vary depending on a number of factors including: the speed of the link, the coupling and modulation technique used, whether the link is dedicated or switched, and others.1 Security considerations can be either physical or logical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cited References
H.B. Becker, “Securing Distributed Systems: Gaining by ‘Losing’ Control,” Data Management, p. 24, March 1978.
W.R. Widmer, “Encryption Methods in Modern Data Communication Networks,” The 17th Carnaham Conference on Security Technology, ETH Zurich, Switzerland, Oct. 4–6, 1983.
K. Cohen and M.D. Garvey, “Data-encryption ‘box’ Secures Comm Systems Easily,” Electronic Design, pp. 159–163, April 16, 1981.
W.E. Osborne, “Long-Range Infrared Intruder Alarm Resists Fault Triggering,” Electronics, pp.111–113, November 20, 1972.
P. Wägli and J. Muggli, “Infrared Techniques in Security Systems,” Jurneés D’electronique 1982, Lausanne, Switzerland, Oct. 12–14, 1982.
H. Luck and K.R. Hase, “Signal Detection Aspects in Automatic Fire Detection,” Fire Safety Journal 6, pp. 233–240, 1983.
H. Luck, “Signal Detection in Automatic Security Systems,” Proceedings of EUSIPCO-83, pp. 483–486, Erlangen, W. Germany, Sept. 12–16, 1983.
S.G. Twiselton, “A Modern Home Security System Using Existing Technology,” International Conference on Consumer Electronics, June 6–8, 1984, Chicago, Ill. 1984.
J. Darby, et al., “Vulnerability Analysis and Integrated Security System Design: The Technical Approach,” 1983 Conference on Crime Countermeasures and Security, pp.21–27, May 11–13, 1983.
T.S. Perry and P. Wallich, “Can Computer Crime Be Stopped? IEEE Spectrum, pp. 34–45, May 1984.
J.M. Nye, “Users’ Guide: Voice & Data Communications Protection Equipment,” NTIA-GR-80–9, Washington, DC, December 1980.
W. Twaddell, “Encryption Surge Fails to Materialize; Chip Makers Await Algorithm Shakeout,” EDN, p.84, August 18, 1983.
Intel Corp., Component Data Catalog, Santa Clara, CA, 1981.
D.L. Andrew, “Opportunities for Photoelectronic Beams for Indoor and Outdoor Security,” International Carnaham Conference on Security Technology, Zurich, Oct. 4–6, 1983.
Best Bits/Applications of Microprocessors, “Watching for Criminals,” IEEE Spectrum, p. 26, January 1984.
General References
L.J. Hoffman, Modern Mothods for Computer Security and Privacy, New Jersey: Prentice-Hall Inc., 1977.
D.B. Parker, Computer Security Management, Virginia: Reston Publishing Co., 1981.
D. Parker, Fighting Computer Crime, New York: Charles Scribner’s Sons, 1983.
A.D. Wyner, “An Analog Scrambling Scheme Which Does not Expand Bandwidth, Part I: Discrete Time, ” IEEE Trans. IT-25, 3, p. 261–274, May 1979.
B. Schanning, “Securing Data Inexpensively Via Public Keys,” Computer Design, pp.105–108, April 5, 1983.
C.H. Meyer and S.M. Matyas, Cryptography: A New Dimension in Computer Data Security, New York: Wiley, 1982.
N. R. Pillai, et ai, “The Use of a Microprocessor- Based Programmable Controller in a Fossil Fired Generating Station,” IEECE’83, Toronto, Canada, Sept. 26–28, 1983.
G.A. Kravetz, “Fail-Safe Rapid-Transit Engineering Ensures Reliability, Passenger Safety,” Electronics, pp.152–154, May 17, 1984.
D.D. Dows, “Operating Systems Key Security With Basic Software Mechanisms, Electronics, pp. 122–127, March 8, 1984.
P. Wells, “On-Chip Hardware Supports Computer Security Features,” Electronics, pp. 128–130, March 8, 1984.
R. Checchio and C. Rosen, “A Method for Providing Secure Access to a Sensitive System,” Fourth Annual Phoenix Conference on Computers and Communications, Phoenix, Arizona, March 20–22, 1985.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1985 D. Reidel Publishing Company, Dordrecht, Holland
About this chapter
Cite this chapter
Georgopoulos, C.J. (1985). Interfaces in μP- Based Security and Alarm Systems. In: Interface Fundamentals in Microprocessor-Controlled Systems. International Series on Microprocessor-Based Systems Engineering, vol 3. Springer, Dordrecht. https://doi.org/10.1007/978-94-009-5470-0_16
Download citation
DOI: https://doi.org/10.1007/978-94-009-5470-0_16
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-010-8915-9
Online ISBN: 978-94-009-5470-0
eBook Packages: Springer Book Archive