{"title":"基于生物特征的认证控制系统建模风险","authors":"Shawn C. Eastwood, S. Yanushkevich","doi":"10.1109/EST.2014.12","DOIUrl":null,"url":null,"abstract":"Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.","PeriodicalId":193536,"journal":{"name":"2014 Fifth International Conference on Emerging Security Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Modeling Risks in Biometric-Based Authentication Control Systems\",\"authors\":\"Shawn C. Eastwood, S. Yanushkevich\",\"doi\":\"10.1109/EST.2014.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.\",\"PeriodicalId\":193536,\"journal\":{\"name\":\"2014 Fifth International Conference on Emerging Security Technologies\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Fifth International Conference on Emerging Security Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EST.2014.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Fifth International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2014.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling Risks in Biometric-Based Authentication Control Systems
Contemporary authentication control systems deploy biometric and other supporting technologies. Such systems deal with various risks, which should be well understood and evaluated. This paper introduces an approach to modeling risks and measuring the resulting system performance. This approach is a based on using modeling tools designed from a library of Bayesian network modeling modules. It is explained using the example of border control systems and the corresponding operational scenarios.