IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.
DOI: 10.1109/ccst.2003.1297601
|View full text |Cite
|
Sign up to set email alerts
|

Securing the biometric model

Abstract: This paper proposes a structured methodology following a full vulnerability analysis of the general .biometric model outlined by Mansfield and Wayman (2002). Based on this analysis, a new multidimensional paradigm named the Biometric Architecture & System Security (BASS) model is proposed, which adds comprehensive security and management layers to the existing biometric model.The BASS model is a structured methodology that guides firms towards employing a solid foundation for any biometric system through the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 2 publications
0
2
0
1
Order By: Relevance
“…Thus, the distance is not considering for the first matching vector, but also navigate to consider the second nearest vector. Generally, this process occurred by KNN algorithm where in our case the (K) value in KNN algorithms is equal to (2). Therefore, the distance percentage calculated to reflect the ration of distance between the two selected vectors based on Eq.3.…”
Section: E Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the distance is not considering for the first matching vector, but also navigate to consider the second nearest vector. Generally, this process occurred by KNN algorithm where in our case the (K) value in KNN algorithms is equal to (2). Therefore, the distance percentage calculated to reflect the ration of distance between the two selected vectors based on Eq.3.…”
Section: E Proposed Systemmentioning
confidence: 99%
“…However, current security system used biometric based methods such as iris, handwriting, fingerprint, sound, DNA, etc. These methods typically proposed to handle the drawbacks of traditional security systems, and to provide a robust identification method with high uniqueness accuracy than traditional methods [2]. Biometric based method also characterized by the following advantages as follow: first, person identification process performed in very fast manner than traditional methods.…”
Section: Introductionmentioning
confidence: 99%
“…Um estudo para os sistemas focados em defesa contra FRR (False Rejection Rate), tenta cobrir os claros existentes, acrescentando outros níveis de hierarquia à árvore de ataques [Buhan et al 2006]. Outra abordagem, que integra conceitos de gerenciamento e de segurança, propõe uma metodologia estruturada (BASS model) bastante abrangente na análise de vulnerabilidades [Leniski et al 2003]. A lista a seguir apresenta apenas alguns exemplos de vulnerabilidades:…”
Section: Department Of Defense and Federal Biometric System Protectio...unclassified