skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: CAS. Controlled Access Security

Abstract

The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

Authors:
;  [1]
  1. Los Alamos National Lab., NM (United States)
Publication Date:
Research Org.:
Los Alamos National Lab., NM (United States)
Sponsoring Org.:
USDOE, Washington, DC (United States)
OSTI Identifier:
10197054
Report Number(s):
ESTSC-000666GESPC00
ON: UN94128649
DOE Contract Number:
W-7405-ENG-36
Resource Type:
Technical Report
Resource Relation:
Other Information: DN: Requires system to have a licensed version of the operating system.; PBD: 1 Dec 1989
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; 42 ENGINEERING; C CODES; INTRUSION DETECTION SYSTEMS; COMPUTER PROGRAM DOCUMENTATION; ALARM SYSTEMS; DATA ACQUISITION SYSTEMS; COMPUTERIZED CONTROL SYSTEMS; SECURITY; 990200; 420200; MATHEMATICS AND COMPUTERS; FACILITIES, EQUIPMENT, AND TECHNIQUES

Citation Formats

Martinez, B., and Pomeroy, G. CAS. Controlled Access Security. United States: N. p., 1989. Web.
Martinez, B., & Pomeroy, G. CAS. Controlled Access Security. United States.
Martinez, B., and Pomeroy, G. 1989. "CAS. Controlled Access Security". United States. doi:.
@article{osti_10197054,
title = {CAS. Controlled Access Security},
author = {Martinez, B. and Pomeroy, G.},
abstractNote = {The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = 1989,
month =
}

Technical Report:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that may hold this item. Keep in mind that many technical reports are not cataloged in WorldCat.

Save / Share:
  • The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system`s primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader,more » the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard.« less
  • This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer`s interface is given. Security protocol is described and finally aids for reading the access security code are provided.
  • A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.
  • This synthesis will be of interest to transportation agency administrators, design engineers, maintenance engineers and maintenance staff, traffic engineers, and safety officials. It will also provide useful information to the utilities and telecommunications industries. Information is presented on the state transportation agencies` policies, practices, and experience associated with occupancy of the rights-of-way on controlled- (or Limited-) access highways.