Proceedings of the 2013 ACM Workshop on Digital Identity Management 2013
DOI: 10.1145/2517881.2517890
|View full text |Cite
|
Sign up to set email alerts
|

Towards standardizing trusted evidence of identity

Abstract: Evidence of identity (EOI), sometimes mentioned as breeder documents in a physical representation form, refers to a single or a set of evidence that can be used to provide confidence to the claimed identity. Trust of evidence of identity needs prudential assessment by an authority or a service provider before such evidence of identity can be accepted for identity verification or eligibility evaluation purposes. This is especially the case when such purposes have a high risk of cost, security, and other critica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…In this work, we have presented a concrete approach on the protection of multimodal biometric templates, underlying critical privacy issues, while focusing on the suggestions for future research. Multimodal biometric systems are mostly discussed for the impact of their use on publicly accepted, reliable identification systems [31], [53], overcoming the obstacles of uni-modal ones.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this work, we have presented a concrete approach on the protection of multimodal biometric templates, underlying critical privacy issues, while focusing on the suggestions for future research. Multimodal biometric systems are mostly discussed for the impact of their use on publicly accepted, reliable identification systems [31], [53], overcoming the obstacles of uni-modal ones.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…In addition to the idea that biometric characteristics are only useful in forensics, the pronounced necessity for reliable day-to-day transactions, has led to a range of applications that verify the identity of a person using human properties. Systems are increasingly being deployed and used throughout the world [53], from limited simple home or business applications (the controlled access to a room), to large-scale projects, which are involved in societal functions, such as user verification for on-line transactions (e.g. banking ePayments, mobile devices).…”
Section: Introductionmentioning
confidence: 99%
“…For security checkpoints, the source reliability and information credibility are represented by the probabilistic variables such as false ID, multiple ID of the same person, and features of intentional data alteration in the chip (e.g., biometric traits and text data), as well as a false life-cycle history [11] , [49] .…”
Section: Standardization Of the R-t-b Measures Using Admiralty Codementioning
confidence: 99%
“…Let us assume that in training algorithms for validation of ID (node V ) and identification of ID source reliability (node R), synthetic data was used to represent rare events such as false ID, multiple ID of the same person, and features of intentional data alteration in the chip (e.g. biometric traits and text data) as well as a false life cycle history [50]. Probabilities of these threats are represented in Conditional Probabilities Tables (CPTs) for nodes V and R: P (V = v 2 ) = 0.01 and P (R = r 3 ) = 0.2 ≡ low (Fig.…”
Section: B Synthetic Data Traitsmentioning
confidence: 99%