New Pathways in Identity Management
In this paper, identity management is discussed. Identification and authentication of individuals accessing computer systems have always been components of cybersecurity. This paper reviews the technical details of biometric identification and verification. It covers the major approaches (for exampl...
Gespeichert in:
Veröffentlicht in: | IEEE security & privacy 2010-11, Vol.8 (6), p.64-67 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Magazinearticle |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In this paper, identity management is discussed. Identification and authentication of individuals accessing computer systems have always been components of cybersecurity. This paper reviews the technical details of biometric identification and verification. It covers the major approaches (for example, fingerprints and irises) with respect to acquisition of biometric data, matching techniques, antispoofing techniques, and current standards. And also covers biometrics' uses and limitations. |
---|---|
ISSN: | 1540-7993 1558-4046 |
DOI: | 10.1109/MSP.2010.183 |