{"title":"Modeling Risks in Biometric-Based Authentication Control Systems","authors":"Shawn C. Eastwood, S. Yanushkevich","doi":"10.1109/EST.2014.12","DOIUrl":null,"url":null,"abstract":"Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Fifth International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2014.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.