This system will be undergoing maintenance April 18th between 9:00AM and 12:00PM CDT.

Search Results

open access

Security: Counterfeit Identification and Indentification Fraud Raise Security Concerns

Description: Testimony issued by the General Accounting Office with an abstract that begins "This testimony summarizes some of our recent investigations that demonstrate security vulnerabilities that exist because counterfeit identification can be easily produced and used to create fraudulent identities. It is based in part on the recently issued restricted report Security: Vulnerabilities Found in Driver's License Applications Process. This also encompasses results from security tests we have performed ove… more
Date: September 9, 2003
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department
open access

Security: Counterfeit Identification Raises Homeland Security Concerns

Description: Testimony issued by the General Accounting Office with an abstract that begins "GAO testified about how homeland security is vulnerable to identity fraud. Today, counterfeit identification is easily produced and used to create fraudulent identities. Tests GAO has performed over the past 3 years demonstrate that counterfeit identification documents can be used to (1) enter the United States; (2) purchase firearms; (3) gain access to government buildings and other facilities; (4) obtain genuine i… more
Date: October 1, 2003
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department
open access

Security: Breaches at Federal Agencies and Airports

Description: Testimony issued by the General Accounting Office with an abstract that begins "Pursuant to a congressional request, GAO discussed the potential security risk to the United States posed by the use of stolen or counterfeit law enforcement badges and credentials."
Date: May 25, 2000
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department

Implementation of Scalable Secure Multicasting

Description: A large number of applications like multi-player games, video conferencing, chat groups and network management are presently based on multicast communication. As the group communication model is being deployed for mainstream use, it is critical to provide security mechanisms that facilitate confidentiality, authenticity and integrity in group communications. Providing security in multicast communication requires addressing the problem of scalability in group key distribution. Scalability is a c… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2002
Creator: Vellanki, Ramakrishnaprasad
Partner: UNT Libraries
open access

A Security Model for Mobile Agents using X.509 Proxy Certificates

Description: Mobile agent technology presents an attractive alternative to the client-server paradigm for several network and real-time applications. However, for most applications, the lack of a viable agent security model has limited the adoption of the agent paradigm. This thesis presents a security model for mobile agents based on a security infrastructure for Computational Grids, and specifically, on X.509 Proxy Certificates. Proxy Certificates serve as credentials for Grid applications, and their prim… more
Date: December 2002
Creator: Raghunathan, Subhashini
Partner: UNT Libraries
open access

DirectShow Approach to Low-Cost Multimedia Security Surveillance System

Description: In response to the recent intensive needs for civilian security surveillance, both full and compact versions of a Multimedia Security Surveillance (MSS) system have been built up. The new Microsoft DirectShow technology was applied in implementing the multimedia stream-processing module. Through Microsoft Windows Driver Model interface, the chosen IEEE1394 enabled Fire-i cameras as external sensors are integrated with PC based continuous storage unit. The MSS application also allows multimedia … more
Date: December 2002
Creator: Xiao, Wu
Partner: UNT Libraries
open access

Central Asia’s Security: Issues and Implications for U.S. Interests

Description: The Central Asian states (Kazakhstan, Tajikistan, Turkmenistan, and Uzbekistan) face common security challenges from crime, corruption, terrorism, and faltering commitments to economic and democratic reforms. This report contains information on Central Asia's external security context, security problems and progress, border tensions, crime and corruption, economic and defense security, implications for U.S. interests, U.S. security assistance, and related issues and figures.
Date: February 7, 2006
Creator: Nichol, Jim
Partner: UNT Libraries Government Documents Department
open access

Central Asia’s Security: Issues and Implications for U.S. Interests

Description: The Central Asian states (Kazakhstan, Tajikistan, Turkmenistan, and Uzbekistan) face common security challenges from crime, corruption, terrorism, and faltering commitments to economic and democratic reforms. This report contains information on Central Asia's external security context, security problems and progress, border tensions, crime and corruption, economic and defense security, implications for U.S. interests, U.S. security assistance, and related issues and figures.
Date: April 3, 2003
Creator: Nichol, Jim
Partner: UNT Libraries Government Documents Department
open access

The impact of US-China relations on Taiwan's military spending (1966-1992).

Description: Previous research has shown that Taiwan's military spending is affected either by China's military buildup or the US's military pipeline. This study investigates whether it is also true an ongoing US-China relationship has dynamic effects. Three major findings are obtained from the statistical analyses. First and foremost, the level of US-China conflict has a contemporaneous positive effect on Taiwan's military spending. Second, the analyses also indicate that the volatility of US-China relatio… more
Date: May 2002
Creator: Yu, Tsung-Chi Max
Partner: UNT Libraries
open access

Mobile agent security through multi-agent cryptographic protocols.

Description: An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the f… more
Date: May 2004
Creator: Xu, Ke
Partner: UNT Libraries
open access

Central Asia’s Security: Issues and Implications for U.S. Interests

Description: The Central Asian states (Kazakhstan, Tajikistan, Turkmenistan, and Uzbekistan) face common security challenges from crime, corruption, terrorism, and faltering commitments to economic and democratic reforms. This report contains information on Central Asia's external security context, security problems and progress, border tensions, crime and corruption, economic and defense security, implications for U.S. interests, U.S. security assistance, and related issues and figures.
Date: April 26, 2007
Creator: Nichol, Jim
Partner: UNT Libraries Government Documents Department
open access

Border Security: The Complexity of the Challenge

Description: This report is the first in three-part series of CRS reports that make use of analytical frameworks to better understand complex problems in border security and cast them in terms that facilitate the consideration of alternative policies and practices.
Date: January 24, 2007
Creator: Lake, Jennifer E.
Partner: UNT Libraries Government Documents Department
open access

Data Mining and Homeland Security: An Overview

Description: This report gives an overview of data mining and homeland security. The contents include what the data mining is, limitations of data mining, its uses, issues, and legislation in the 108th, 109th and 110th Congress.
Date: March 28, 2007
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen