Modeling Risks in Biometric-Based Authentication Control Systems

Shawn C. Eastwood, S. Yanushkevich
{"title":"Modeling Risks in Biometric-Based Authentication Control Systems","authors":"Shawn C. Eastwood, S. Yanushkevich","doi":"10.1109/EST.2014.12","DOIUrl":null,"url":null,"abstract":"Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Fifth International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2014.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.
基于生物特征的认证控制系统建模风险
当代认证控制系统采用生物识别和其他支持技术。这样的系统处理各种风险,应该很好地理解和评估。本文介绍了一种建模风险和测量结果系统性能的方法。该方法是一种基于使用贝叶斯网络建模工具库设计的建模模块。本文以边境管制系统和相应的操作场景为例进行解释。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信