Search

Addressing the dependency problem in access security system architecture design

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000nab a2200000 i 4500</leader>
    <controlfield tag="001">MAP20071027837</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20080418121653.0</controlfield>
    <controlfield tag="007">hzruuu---uuuu</controlfield>
    <controlfield tag="008">970625s1996    usa||||    | |00010|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">80</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20080104597</subfield>
      <subfield code="a">Kobza, John E.</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Addressing the dependency problem in access security system architecture design</subfield>
      <subfield code="c">John E. Kobza and Sheldon H. Jacobson</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The problem studied in this paper is an access control problem in airport security operations; specifically, preventing the introduction of explosives and firearms onto aircraft. This paper presents a method for evaluating when multiple-device security systems with overlapping capabilities are cost effective</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080602574</subfield>
      <subfield code="a">Métodos de evaluación</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080604011</subfield>
      <subfield code="a">Sistemas de seguridad</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080557072</subfield>
      <subfield code="a">Aeropuertos</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080579715</subfield>
      <subfield code="a">Control de acceso</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080554347</subfield>
      <subfield code="a">Explosivos</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080567941</subfield>
      <subfield code="a">Armas de fuego</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080615963</subfield>
      <subfield code="a">Análisis costo-eficiencia</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20080265731</subfield>
      <subfield code="a">Jacobson, Sheldon H.</subfield>
    </datafield>
    <datafield tag="740" ind1="0" ind2=" ">
      <subfield code="a">Risk analysis</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="t">Risk analysis</subfield>
      <subfield code="d">New York and London</subfield>
      <subfield code="g">Vol. 16, nº 6, 1996 ; p. 801-812</subfield>
    </datafield>
  </record>
</collection>