{"title":"动态生物识别:为访问控制、隐私和安全问题提供实时解决方案的案例","authors":"S. Simske","doi":"10.1109/BIDS.2009.5507535","DOIUrl":null,"url":null,"abstract":"From a certain perspective, security is broken. The security authorization triangle (possession, knowledge, identity) has in some cases been reduced to a single point (knowledge) because of the limitations to possession attributable to virtualization, and because of the limitations to identity attributable to the use of static biometrics. This paper makes the case for a stronger security rights triangle—privacy, security and access control—underpinned by the resurrection of possession and identity through the use of dynamic biometrics. New technologies in mobile and cloud computing, pattern recognition and user interaction provide a potential path forward for an identity-matching ecosystem in which both privacy and security needs can be accommodated.","PeriodicalId":409188,"journal":{"name":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security\",\"authors\":\"S. Simske\",\"doi\":\"10.1109/BIDS.2009.5507535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"From a certain perspective, security is broken. The security authorization triangle (possession, knowledge, identity) has in some cases been reduced to a single point (knowledge) because of the limitations to possession attributable to virtualization, and because of the limitations to identity attributable to the use of static biometrics. This paper makes the case for a stronger security rights triangle—privacy, security and access control—underpinned by the resurrection of possession and identity through the use of dynamic biometrics. New technologies in mobile and cloud computing, pattern recognition and user interaction provide a potential path forward for an identity-matching ecosystem in which both privacy and security needs can be accommodated.\",\"PeriodicalId\":409188,\"journal\":{\"name\":\"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BIDS.2009.5507535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BIDS.2009.5507535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security
From a certain perspective, security is broken. The security authorization triangle (possession, knowledge, identity) has in some cases been reduced to a single point (knowledge) because of the limitations to possession attributable to virtualization, and because of the limitations to identity attributable to the use of static biometrics. This paper makes the case for a stronger security rights triangle—privacy, security and access control—underpinned by the resurrection of possession and identity through the use of dynamic biometrics. New technologies in mobile and cloud computing, pattern recognition and user interaction provide a potential path forward for an identity-matching ecosystem in which both privacy and security needs can be accommodated.