نتایج جستجو برای: biometrics access control
تعداد نتایج: 1614058 فیلتر نتایج به سال:
The issue in today’s society is access, whether entering into a restricted building like an office or home, or attempting to access a bank account or credit card. An individual must prove their identity before authorized for utilization. Bruce Schneier, a well-known security expert and CEO of Counterpane Internet Security, states the need to be able to identify, authenticate, and authorize indi...
Mobile devices are rapidly becoming the most popular user end computing and networking device. Mobile devices are often used to access and store personal information. Due to their size and portability, they are a common target for thieves and malicious activity. Unauthorized authentication of mobile devices can result in a great deal of damage to the legitimate owner. However, securing mobile d...
In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With its help it is possible to highly protect a system from any external attacker but an internal attacker still has direct access to all stored biometric data. This risk shall be avoided by using biometric encryption with an...
Conventional access control solutions rely on a single authentication to verify a user’s identity but do nothing to ensure the authenticated user is indeed the same person using the system afterwards. Without continuous monitoring, unauthorized individuals have an opportunity to “hijack” or “tailgate” the original user’s session. Continuous authentication attempts to remedy this security loopho...
بیومتریکها ابزاری برای تعیین هویت و یا تایید هویت افراد هستند .از این میان سیستمهای عنبیه نگاری به دلیل منحصربفرد بودن الگوی عنبیه و عدم امکان کپی برداری مصنوعی از آن و پایداری ویژگیهای عنبیه درصد خطای بسیار ناچیزی دارند و به همین دلیل دارای قابلیت اطمینان بالایی هستند. به طور کلی یک سیستم بازشناسی عنبیه شامل چهار بخش دریافت یک دنباله از تصاویر، مکانیابی عنبیه، استخراج ویژگی، مقایسه و تطبیق است...
Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analy...
In a modern, civilized and advanced society, reliable authentication and authorization of individuals are becoming more essential tasks in several aspects of daily activities and as well as many different important applications such as in financial transactions, access control, travel and immigration, healthcare etc. In some situations, when individual equipment is required for confirmation of ...
Biometric technologies are increasingly being used in a diverse range of contexts, from immigration control, to banking and personal computing. However, there has been little research that has investigated how biometrics are perceived across these different environments. This paper describes a qualitative investigation of the effect of context on attitudes towards biometric technology. Data col...
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید