{"title":"安全生物识别系统设计","authors":"S. Yanushkevich","doi":"10.1109/EST.2012.30","DOIUrl":null,"url":null,"abstract":"The focus of this keynote is to introduce the biometric-based physical access system design approach, which allows for the thwarting of various attacks. Building a model of the attack to make predictions concerning the behavior of the system under study is the first step in designing a biometric system. In such models, effects of attacks are studied by monitoring symptoms of the attacks. For the modeling of biometric tools before they are prototyped, other modeling techniques should be used, in particular, probabilistic modeling based on belief networks.","PeriodicalId":314247,"journal":{"name":"2012 Third International Conference on Emerging Security Technologies","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Biometric System Design\",\"authors\":\"S. Yanushkevich\",\"doi\":\"10.1109/EST.2012.30\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The focus of this keynote is to introduce the biometric-based physical access system design approach, which allows for the thwarting of various attacks. Building a model of the attack to make predictions concerning the behavior of the system under study is the first step in designing a biometric system. In such models, effects of attacks are studied by monitoring symptoms of the attacks. For the modeling of biometric tools before they are prototyped, other modeling techniques should be used, in particular, probabilistic modeling based on belief networks.\",\"PeriodicalId\":314247,\"journal\":{\"name\":\"2012 Third International Conference on Emerging Security Technologies\",\"volume\":\"91 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-09-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third International Conference on Emerging Security Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EST.2012.30\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2012.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The focus of this keynote is to introduce the biometric-based physical access system design approach, which allows for the thwarting of various attacks. Building a model of the attack to make predictions concerning the behavior of the system under study is the first step in designing a biometric system. In such models, effects of attacks are studied by monitoring symptoms of the attacks. For the modeling of biometric tools before they are prototyped, other modeling techniques should be used, in particular, probabilistic modeling based on belief networks.