TITLE

Federal Regulations Changing the Way of Port Identification

AUTHOR(S)
Wolford, Erin J.
PUB. DATE
July 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2009, Vol. 46 Issue 7, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the implementation of Transportation Work Identification Credential (TWIC) in the U.S. It notes that with TWIC, aside from having smart card checking in workers and visitors, there will be biometric readers. It highlights the Port of Los Angeles, California and Port of Savannah, Georgia that have installed a vascular biometric reader in lieu with TWIC. Furthermore, it states that ports in the country are testing the TWIC program-related technology.
ACCESSION #
42844353

 

Related Articles

  • Performance improvement using an automation system for recognition of multiple parametric features based on human footprint. DEVADOSS, AMBETH KUMAR VISAM; MALAISHAMY, RAMAKRISHNAN; SUBRAMANIAM, MALATHI; DEVADOSS, ASHOK KUMAR VISVAM // Kuwait Journal of Science;2015, Vol. 42 Issue 1, p109 

    Rapid increase in population growth has made the mankind to delve in appropriate identification of individuals through biometrics. Foot Print Recognition System is a new challenging area involved in the Personal recognition that is easy to capture and distinctive. Foot Print has its own...

  • STATE OF ART: HAND BIOMETRIC. Benziane, Sarâh; Benyettou, Abdelkader // International Journal of Advances in Engineering & Technology;Jan2012, Vol. 1 Issue 6, p1 

    This paper present a state of art about biometric hand, different techniques used.Biometric is essentially used to avoid risks of password easy to find or Stoll; with as slogan save Time and Attendance. We can note that biometrics is a true alternative to the passwords and other identifiers to...

  • Hiding Fingerprint in Face using Scattered LSB Embedding Steganographic Technique for Smart card based Authentication system. Brindha, S.; Vennila, Ila. // International Journal of Computer Applications;Jul2011, Vol. 26, p51 

    Smart card technology is currently recognized as the most appropriate technology for identity applications that must meet critical security requirements. Smart cards provide the secure, convenient and cost-effective ID technology that stores the enrolled biometric template and compares it to the...

  • Statistical Analysis of Fingerprint Pattern. Jajal, Brijesh; Desai, Vipul // International Journal of Computational Intelligence Research;2009, Vol. 5 Issue 2, p123 

    Fingerprints are the ridge and furrow patterns on the tip of the finger and have been used extensively for personal identification of people. A number of approaches to fingerprint classification have been developed. Some of the earliest approaches did not make use of the rich information in the...

  • Review On: Finger Vein Detection Using Repeated Line, Even Gabor and Median Filter. Turka, Komal; Kaur, Gurpreet // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p3695 

    Vein pattern is the network of blood vessels beneath a person's skin. This vein pattern can be used to authenticate the identity of an individual. The finger-vein patterns are believed to be quite unique, even in the case of identical twins and even between the different fingers of an...

  • Privacy and prejudice: whose ID is it anyway? Graham-Rowe, Duncan // New Scientist;9/17/2005, Vol. 187 Issue 2517, p20 

    The article investigates the impact of widespread use of biometrics on society. It discusses biometrics with special reference to digital identity. It also focuses on the consequences of this revolution on the personal privacy of millions of people across the globe. Digital identity has now...

  • 2 factor authentication. Bowers, Tom; Damore, Kelley // Information Security;Aug2006, Vol. 9 Issue 8, p30 

    The article identifies the strengths and weaknesses of various user identification and authentication technologies used in the U.S. Regulatory requirements such as the Health Insurance Portability and Accountability Act are forcing organizations to implement authentication and identity...

  • A Comparative Study of Biometric Technologies with Reference to Human Interface.  // International Journal of Computer Applications;Jan2011, Vol. 14, p10 

    The article presents a study regarding biometric technologies to human interface. It says that biometrics offer several advantages including person's biometric traits are cannot be lost, it has unique traits that are difficult to copy, and biometrics requires the presence of the person to be...

  • Making Contact with Positive Material Identification.  // Quality;Oct2007, Vol. 46 Issue 10, Special section p34 

    The article focuses on the implementation of the Positive Material Identification program by DCI Inc. in St. Cloud, Minnesota. The program was made to verify and guarantee complete traceability of materials which would validate all raw materials before the manufacture of its equipment began. The...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics