PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

BSBI - a Simple Protocol for Remote Verification of Identity

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules. The architecture assumes strict separation of all personal metadata and the actual verification data. The paper also describes a prototype implementation of the protocol and its extension enabling the state of the module to be monitored from the main system. The proposed design solves the problem of using advanced verification methods, especially biometric ones, in systems where direct implementation is not possible due to hardware incompatibilities, insufficient resources or other limitations.
Rocznik
Tom
Strony
50--57
Opis fizyczny
Bibliogr. 15 poz., rys.
Twórcy
autor
  • Research and Academic Computer Network (NASK), Wąwozowa st 18, 02-796 Warszawa, Poland, tomasz.palka@nask.pl
Bibliografia
  • [1] A. Kozakiewicz, A. Felkner, J. Furtak, Z. Zieliński, M. Brudka, and M. Małowidzki, “Secure workstation for special applications”, in Secure and Trust Computing, Data Management, and Applications, C. Lee, J.-M. Seigneur, J. J. Park, R. R. Wagner, Eds., Communications in Computer and Information Science, vol. 187. Berlin: Springer, 2011, pp. 174-181.
  • [2] L. O’Gorman, “Comparing passwords, tokens, and biometrics for user authentication”, Proceedings of the IEEE, vol. 91, no. 12, pp. 2021–2040, 2003.
  • [3] H. K. Lu and A. Ali, “Communication Security between a Computer and a Hardware Token”, in Proc. Third Int. Conf. Sys. ICONS 2008, Cancun, Mexico, 2008, pp. 220–225.
  • [4] R. Molva and G. Tsudik, “Authentication method with impersonal token cards”, in Proc. IEEE Comp. Soc. Symp. Res. Secur. Priv., Oakland, CA, USA, 1993, pp. 56–65.
  • [5] R. M. Bolle, J. H. Connell, S. Pankanti, N. K. Ratha, and A. W. Senior, Guide to Biometrics. New York: Springer, 2004.
  • [6] K. Ślot, Wybrane zagadnienia Biometrii. Warszawa: Wydawnictwo Komunikacji i Łączności, 2008 (in Polish).
  • [7] A. Czajka and A. Pacut, “Iris recognition system based on Zak-Gabor wavelet packets”, J. Telecom. Inform. Technol., no. 4, pp. 10–18, 2010.
  • [8] A. Czajka and A. Pacut, “Iris recognition with adaptive coding”, in Rough Sets and Knowledge Technology, Lecture Notes in Artificial Intelligence, vol. 4481. Berlin: Springer, 2007, pp. 195–202.
  • [9] J. Hassell, Radius – Securing Public Access To Private Resources. O’Reilly & Associates, 2002.
  • [10] P. R. Calhoun, G. Zorn and P. Pan, “DIAMETER Framework Document”, IETF, 2002.
  • [11] B. C. Neuman and T. Ts’o, “Kerberos: an authentication service for computer networks”, IEEE Commun. Mag., vol. 32, no. 9, pp. 33–38, 1994.
  • [12] J. T. Kohl, B. C. Neuman, and T. Y. T’so, “The Evolution of the Ker- beros Authentication System”, in Distributed Open Systems, D. Johansen and F. M. T. Brazier, Eds. Los Alamitos, CA: IEEE Computer Society Press, 1994, pp. 78–94.
  • [13] D. Carrell, “The TACACS+ Protocol Version 1.78”, Network Working Group INTERNET-DRAFT, Cisco Systems, 1997.
  • [14] “Information Technology – BioAPI – Biometric Application Programming Interface – Part 1: BioAPI Specification”, ISO/IEC 19784-1.
  • [15] “Information Technology – BioAPI Interworking Protocol (BIP)”, ISO/IEC 24708.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0017-0006
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.