2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) 2017
DOI: 10.1109/aiccsa.2017.147
|View full text |Cite
|
Sign up to set email alerts
|

Design of a 3D Virtual World to Implement a Logical Access Control Mechanism Based on Fingerprints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Another research direction is how to ensure that avatars themselves, as digital entities, can be protected from unauthorized access by imposters, and how the identity of the users can be managed within the social VR system. Although some authors have called for access control and identity management for avatars in social VR (Gavrilova and Yampolskiy, 2010;Yampolskiy et al, 2012;Bader and Ben Amara, 2014a;Bader and Ben Amara, 2016;Bader and Ben Amara, 2017;Freeman et al, 2020) are the only authors we found that explored this topic and proposed technical solutions.…”
Section: Access Control and Identity Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…Another research direction is how to ensure that avatars themselves, as digital entities, can be protected from unauthorized access by imposters, and how the identity of the users can be managed within the social VR system. Although some authors have called for access control and identity management for avatars in social VR (Gavrilova and Yampolskiy, 2010;Yampolskiy et al, 2012;Bader and Ben Amara, 2014a;Bader and Ben Amara, 2016;Bader and Ben Amara, 2017;Freeman et al, 2020) are the only authors we found that explored this topic and proposed technical solutions.…”
Section: Access Control and Identity Managementmentioning
confidence: 99%
“…In response to the problems mentioned above, we hope to find corresponding protection mechanisms or potential countermeasures in the literature. While 13 papers (Gavrilova and Yampolskiy, 2010;Boukhris et al, 2011;Mohamed and Yampolskiy, 2012;Yampolskiy et al, 2012;Bader and Ben Amara, 2014a;Bader and Ben Amara, 2014b;Bader and Ben Amara, 2016;Bader and Ben Amara, 2017;Falchuk et al, 2018;Pfeuffer et al, 2019;John et al, 2020;Lake, 2020) have explicitly addressed one or several identity and privacy issues and proposed corresponding protection mechanisms, works that have presented techniques or design guidelines that provide potential solutions in the area of virtual reality are also included and analyzed. Based on their characteristics and objectives, we have subdivided them into the following categories.…”
Section: Protectionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Bader et al [118] addressed the issue of virtual worlds' platforms being equipped with only password-based authentication mechanisms by proposing a methodology to design a virtual world platform to implement a biometrical authentication mechanism. They used a 3D toolkit to build a complete virtual space and opted for a client-server configuration.…”
Section: Physical Biometricsmentioning
confidence: 99%
“…Yao, Yingying's research [14] advocates the use of decentralized identifiers and trusted authority for authenticating users' real identities and linking them to the metaverse. Meanwhile, Samira Bader's research [15] focuses on authenticating metaverse users based on their biometric information.…”
Section: Introductionmentioning
confidence: 99%