TITLE

Improving the Dependability of an ID Program

AUTHOR(S)
Scaglione, Bernard
PUB. DATE
March 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the aspects to be considered to improve the dependability of an identification (ID) program. To ensure high quality ID program, the author regards the need to undergo the authentication verification process, requiring the formulation of standard criteria for the collection and confirmation of data for identification. It also outlines the standards of the identification process, tracing the hiring and retention of employees and their access to security sensitive areas.
ACCESSION #
37018477

 

Related Articles

  • Biometrics and Privacy. Cimato, Stelvio; Sassi, Roberto; Scotti, Fabio // Recent Patents on Computer Science;Jun2008, Vol. 1 Issue 2, p98 

    By now, biometric systems find already home in a broad range of commercial and institutional applications. They are typically employed to authenticate users before allowing access to restricted areas or services. The interest in biometrics is mainly due to their potential advantages over...

  • An Empirical Analysis of Security System. Garg, Anjali; Garg, Prashant // ICFAI Journal of Systems Management;May2009, Vol. 7 Issue 2, p14 

    Everyone is conscious about security, be it at the market place, the office or the home. It is a matter of everybody's concern. The number of frauds is increasing due to inefficient measures of authentication. The use of Biometric system could be a possible option to overcome the problem of...

  • Cryptanalysis of the convex hull click human identification protocol. Asghar, Hassan; Li, Shujun; Pieprzyk, Josef; Wang, Huaxiong // International Journal of Information Security;Apr2013, Vol. 12 Issue 2, p83 

    Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then...

  • Sift Based Recognition of Finger Knuckle Print. Hemery, Baptiste; Giot, Romain; Rosenberger, Christophe // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2010, p45 

    In this paper, we present a new unimodal method for finger knuckle print authentication. Previous works on this recent biometric modality mainly use image transform such as Radon, Gabor or Fourier. The proposed method is based on the computation of SIFT descriptors on the previously enhanced...

  • MULTIDIMENSIONAL USER AUTHENTICATION. Malanik, David; Jasek, Roman // Annals of DAAAM & Proceedings;Jan2011, p791 

    The commonly used methods for the authentization of people occasionally use only the one method for user verification. This paper deals with the more complex method for successfully authentization of people inside the area with hardly restricted access. The multidimensional user authentication...

  • Two-Factor Authentication.  // Network Dictionary;2007, p499 

    An encyclopedia entry for "Two-Factor Authentication" is presented. It refers to a security process in which two means of identification are provided by the users. One of which is typically a physical token such as a card, and the other one is often something that is memorized, such as a...

  • On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem. Rizomiliotis, Panagiotis; Gritzalis, Stefanos // International Journal of Information Security;Apr2013, Vol. 12 Issue 2, p151 

    At the 2011 Eurocrypt, Kiltz et al., in their best paper price awarded paper, proposed an ultra-lightweight authentication protocol, called $$AUTH$$. While the new protocol is supported by a delicate security proof based on the conjectured hardness of the learning parity with noise problem, this...

  • Study of Effects and Perceptual Analysis in Implementing Biometric Authentication. Gokulkumari, G.; Lakshmi, A. // European Journal of Scientific Research;10/1/2011, Vol. 61 Issue 2, p242 

    Biometrics in high technology sector uses an individual's unique biological traits to determine one's identity. Advances in biometric technology are focusing both on better security and cost effectiveness. Modern methods of authentication differ from traditional methods in several ways. Among...

  • Biometric Authentication and Authorization System for Grid Security. Kathrine, G. Jaspher Willsie; Kirubakaran, E. // International Journal of Hybrid Information Technology;2011, Vol. 4 Issue 4, p43 

    Dynamicity in the data sharing has resulted in resource usage being more and more distributed and more open in nature. The need for problem solving and the distributed nature of data has resulted in the development of grid environment. Authentication is the first step of security requirement for...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics