نتایج جستجو برای: biometrics access control

تعداد نتایج: 1614058  

2015
Uma Tiwari

There is a need of strong biometric system that resolve the issues related to those who use illegal way to break the system, those with change in psychological and behavioural characteristics and specially to those disable people (people with no limbs, bad retina, facial changes, etc.). The Cephalometric analysis is a strong tool based on image processing of human skull that can be used mathema...

1996
Ravi Sandhu George Mason

2 Abstract Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. In this paper we formally show that lattice-based mandatory access controls can be enforced by appropriate connguration of RBAC c...

2017
M. H. Harrison W. L. Ruzzo

Access Control is the process or mechanism for giving the authority to access the specific resources, applications and system. Access control defines a set of conditions or criteria to access the system and its resources. There are three main accesses Control model first is Mandatory access control model, second is Discretionary access control model and third is Role based access control models...

2016
S. Pravinthraja K. Umamaheswari

Nowadays, Iris recognition is a method of biometric verification of the person authentication process based on the human iris unique pattern, which is applied to control system for high level security. It is a popular system for recognizing humans and essential to understand it. The objective of this method is to assign a unique subject for each iris image for authentication of the person and p...

2014
Rajwinder Kaur Rekha Rani

Biometric system has been actively emerging in various industries and continuing to roll to provide higher security features for access control system. The proposed system simultaneously acquires the finger surface and subsurface features from finger-vein and finger print images. This paper reviews the acquired finger vein and finger texture images are first subjected to pre-processing steps, w...

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

2008
Mads Syska Hansen Martin Kirschmeyer Christian D. Jensen

Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based information, e.g., it is common to have swipe card terminals placed next to doors to restricted ar...

2009
K. N. Jariwala

The biometric person authentication technique based on the pattern of the human iris is well suited to be applied to any access control system requiring a high level of security. Commercial iris recognition systems are currently employed to allow passengers in some airports to be rapidly processed thru security, to allow access to secure areas, and for secure access to computer networks. With i...

Journal: :CoRR 2008
David F. Ferraiolo D. Richard Kuhn

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...

1997
James M. Slack

In this paper, we propose a new security enforcement mechanism and demonstrate how this mechanism can enforce policies for both mandatory access control (MAC) and discretionary access control (DAC) in an object database system. Each class may have a security method that can block messages that leave instances of the class, and can block messages directed to instances of the class. Each supercla...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید