TITLE

Combining Biometrics with ESSO

PUB. DATE
October 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the advantages of combining a biometrics with ESSO solution. A biometric-enabled ESSO solution matches each user by correlating against known set of references taking into account. The solution captures images at higher speeds resulting in less image blur distortion. The credentials are stored centrally using strong security and privacy safeguards.
ACCESSION #
22710623

 

Related Articles

  • One Leader's Perspective on Identification and Access Control. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Jul2009, Vol. 46 Issue 7, p48 

    The author discusses the identification and access control in the U.S. He points out the need to secure individual identity and control access in key infrastructure systems. He cites the insights of Michael Chertoff, who is the Secretary to the Department of Homeland Security in the country,...

  • A MA ÉS A HOLNAP BELÉPTETŐ RENDSZEREINEK AUTOMATIKUS SZEMÉLYAZONOSÍTÓ ELJÁRÁSAI BIZTONSÁGTECHNIKAI SZEMPONTBÓL. Ákos, Bunyitai // Hadmérnök;2011, Vol. 5 Issue 1, p22 

    This article gives a brief summary of well known, widely used and user friendly identification methods, which can be the basis of the future's access control systems. It is about the main specifics of information-, object- and biometry based methods. The purpose is demonstration via logical...

  • Applying Biometrics. Spence, Bill; Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p28 

    Part II. Looks at the practical side of where biometrics fit into access control systems. Applications of the biometric technology; Monitoring of all doors by an access control system; Gathering of credential against which future access attempts are compared; Storing of templates in the...

  • TOUCH AND GO. Couch, Christina // PM Network;Feb2016, Vol. 30 Issue 2, p9 

    The article reports that the biometric security market is expected to be worth 25 billion dollars by 2020. The biometric technologies have existed for a few decades, but they are surging in popularity to combat high-profile security breaches. As the biometric systems enter new markets, the...

  • Locks to Fingerprints - Access Basics. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Nov2008, Vol. 45 Issue 11, p88 

    The author reflects on the basics of access control. He argues that in terms of safety, biometrics is more useful than key locks. He mentions that the implementation of a policy that dictates how and when to collect keys is just a waste of time. He believes that the concept of verifying the...

  • UNCOERCIBILITY IN E-VOTING AND E-AUCTIONING MECHANISMS USING DENIABLE ENCRYPTION. Howlader, Jaydeep; Nair, Vivek; Basu, Saikat; Mal, A. K. // International Journal of Network Security & Its Applications;Mar2011, Vol. 3 Issue 2, p97 

    The uncoercibility to prevent rigging in e-voting and e-auction have been studied in different literatures. It is realized that the notion of a virtual booth and untappable channel are required to prevent coerciveness. Virtual booth protects the candidates to cast their private values without...

  • Biometrics -- Getting Personal and Liking It. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Feb2011, Vol. 48 Issue 2, p42 

    The article focuses on the use of biometrics-based system integrated with access controls in handling homeless individuals. It says that the integration of biometrics to any existing access control application was simplified; thus, eliminating extra network infrastructure costs. It also states...

  • Voucher Web Metering Using Identity Management Systems. Alarifi, Fahad // International Journal of Security & Its Applications;Apr2012, Vol. 6 Issue 2, p391 

    Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher scheme that uses an identity management systems solution to incorporate a Web Metering function. The proposed scheme runs transparently to the visitor and utilises...

  • Equivalent Key Recovery Attack to H2-MAC. Fanbao Liu; Tao Xie; Changxiang Shen // International Journal of Security & Its Applications;Apr2012, Vol. 6 Issue 2, p397 

    In this paper, we propose an eficient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). We can successfully recover the equivalent key of H2-MAC in about 2n=2...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics