Management of the Interconnected World 2010
DOI: 10.1007/978-3-7908-2404-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Authentication and Authorization Infrastructures in Trusted Intra-Organizational Relationships

Abstract: Today, the lives of both people and organizations are strongly focused on the creation, development and maintenance of relationships. These are influenced by several factors, amongst which trust plays an important role. Same as in traditional relationships, trust is considered crucial in their digital equivalent; here we can speak of the concept of trust in technology. An example for trust in technology is given by biometric authentication and authorization infrastructures. A possible approach is the use of ty… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Thus the dependency on a dedicated hardware infrastructure is very low compared to alternative methods such as fingerprint or iris recognition, where the broad availability of the required sensory infrastructure in a standardized way cannot be assumed [33]. Consequently, biometric systems based on keystroke dynamics are highly applicable for the implementation of web-based authentication systems [30,33]. Therefore we base the following on such a method.…”
Section: A Methods and System Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus the dependency on a dedicated hardware infrastructure is very low compared to alternative methods such as fingerprint or iris recognition, where the broad availability of the required sensory infrastructure in a standardized way cannot be assumed [33]. Consequently, biometric systems based on keystroke dynamics are highly applicable for the implementation of web-based authentication systems [30,33]. Therefore we base the following on such a method.…”
Section: A Methods and System Descriptionmentioning
confidence: 99%
“…The last case is referred to as Authentication as a Service (AaaS) and described in the following section. Furthermore, [30] surveys quality and security problems related to web-based biometric authentication services in user-centric IdM.…”
Section: Architectural Implications For Strong Authentication In Eidmmentioning
confidence: 99%
“…Trust relationships with the service provider become a critical aspect to be considered each time a user gives an authentication, as highlighted in [4] where this issue is considered in term of risk management: "What is important is risk management, the sister, the dual of trust management. And because risk management makes money, it drives the security world from here on out".…”
Section: Introductionmentioning
confidence: 99%