New Pathways in Identity Management

In this paper, identity management is discussed. Identification and authentication of individuals accessing computer systems have always been components of cybersecurity. This paper reviews the technical details of biometric identification and verification. It covers the major approaches (for exampl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE security & privacy 2010-11, Vol.8 (6), p.64-67
Hauptverfasser: Clark, Paul C., Cook, Glenn R., Fisher, Edward L., Fulp, John D., Linhoff, Valerie, Irvine, Cynthia E.
Format: Magazinearticle
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In this paper, identity management is discussed. Identification and authentication of individuals accessing computer systems have always been components of cybersecurity. This paper reviews the technical details of biometric identification and verification. It covers the major approaches (for example, fingerprints and irises) with respect to acquisition of biometric data, matching techniques, antispoofing techniques, and current standards. And also covers biometrics' uses and limitations.
ISSN:1540-7993
1558-4046
DOI:10.1109/MSP.2010.183