메뉴 건너뛰기




Volumn 27, Issue 7-8, 2008, Pages 260-284

Criteria to evaluate Automated Personal Identification Mechanisms

Author keywords

Accessibility; Automated Personal Identification Mechanism; Biometric identification; Biometric verification; Privacy; Reliability; Risk; Usability; User authentication; Vulnerabilities

Indexed keywords

AUTOMATION; BIOMETRICS; COMPUTER SYSTEMS; RISK ANALYSIS; RISK MANAGEMENT;

EID: 55649096177     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.07.007     Document Type: Article
Times cited : (10)

References (101)
  • 1
    • 19944394275 scopus 로고    scopus 로고
    • Bridging the gap between organizational and user perspectives of security in the clinical domain
    • Adams A., and Blandford A. Bridging the gap between organizational and user perspectives of security in the clinical domain. International Journal of Human Computer Studies 63 1-2 (2005) 175-202
    • (2005) International Journal of Human Computer Studies , vol.63 , Issue.1-2 , pp. 175-202
    • Adams, A.1    Blandford, A.2
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Adams A., and Sasse M.A. Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM 42 12 (1999) 41-46
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 8
    • 55649118506 scopus 로고    scopus 로고
    • [accessed April 2008]
    • Australian Government. Dealing with identity theft (2006). http://www.ag.gov.au/www/agd/rwpattach.nsf/VAP/(03995EABC73F94816C2AF4AA2645824B)∼ID+Theft+DL+Booklet+Final+Art.pdf/$file/ID+Theft+DL+Booklet+Final+Art.pdf [accessed April 2008]
    • (2006) Dealing with identity theft
    • Australian Government1
  • 9
    • 0000453135 scopus 로고
    • What is autobiographical memory?
    • Conway M.A., Rubin D.C., Spinnler H., and Wagenaar W.A. (Eds), Kluwer Academic Publishers
    • Baddeley A. What is autobiographical memory?. In: Conway M.A., Rubin D.C., Spinnler H., and Wagenaar W.A. (Eds). Theoretical perspectives on autobiographical memory (1992), Kluwer Academic Publishers
    • (1992) Theoretical perspectives on autobiographical memory
    • Baddeley, A.1
  • 10
    • 33846813917 scopus 로고    scopus 로고
    • Information lifecycle security risk assessment: a tool for closing security gaps
    • Bernard R. Information lifecycle security risk assessment: a tool for closing security gaps. Computers & Security 26 1 (2007) 26-30
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 26-30
    • Bernard, R.1
  • 14
    • 0035387175 scopus 로고    scopus 로고
    • Ten strikes and you're out: increasing the number of login attempts can improve password usability approach to usable and effective security
    • Brostoff S., and Sasse M.A. Ten strikes and you're out: increasing the number of login attempts can improve password usability approach to usable and effective security. BT Technology Journal 19 3 (2001) 122-131
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Brostoff, S.1    Sasse, M.A.2
  • 24
    • 55649100567 scopus 로고    scopus 로고
    • Dourish P, Delgado de la Flor J, Joseph M. Security as a practical problem: some preliminary observations of everyday mental models, 2003 http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-dourish.pdf.
    • Dourish P, Delgado de la Flor J, Joseph M. Security as a practical problem: some preliminary observations of everyday mental models, 2003 http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-dourish.pdf.
  • 25
    • 0026256545 scopus 로고
    • Computer verification of human users' identity: a theoretical model and some evaluation criteria
    • Fåk V. Computer verification of human users' identity: a theoretical model and some evaluation criteria. Computers & Security 10 7 (1991) 626-636
    • (1991) Computers & Security , vol.10 , Issue.7 , pp. 626-636
    • Fåk, V.1
  • 31
    • 15744404682 scopus 로고    scopus 로고
    • Management of risks in the information age
    • Gerber M., and von Solms R. Management of risks in the information age. Computers & Security 24 (2005) 16-30
    • (2005) Computers & Security , vol.24 , pp. 16-30
    • Gerber, M.1    von Solms, R.2
  • 32
    • 55649091884 scopus 로고    scopus 로고
    • Germain R. Large scale systems in biometrics. In: Jain A, Bolle R, Pankanti S, editors. Personal identification in a networked society 1999. Kluwer Academic Publishers.
    • Germain R. Large scale systems in biometrics. In: Jain A, Bolle R, Pankanti S, editors. Personal identification in a networked society 1999. Kluwer Academic Publishers.
  • 36
    • 55649087161 scopus 로고    scopus 로고
    • Paper 44, Berkeley Center for Law and Technology [accessed April 2008]
    • Hoofnagle C. Measuring identity theft at top banks. Paper 44 (2008), Berkeley Center for Law and Technology. http://repositories.cdlib.org/bclt/lts/44 [accessed April 2008]
    • (2008) Measuring identity theft at top banks
    • Hoofnagle, C.1
  • 37
    • 55649086472 scopus 로고    scopus 로고
    • International Civil Aviation Organisation, Machine readable travel documents, technical report, development of a logical data structure for optical capacity expansion technologies, revision 1.7; 2004a.
    • International Civil Aviation Organisation, Machine readable travel documents, technical report, development of a logical data structure for optical capacity expansion technologies, revision 1.7; 2004a.
  • 38
    • 55649094266 scopus 로고    scopus 로고
    • International Civil Aviation Organisation, Machine readable travel documents, technical report, PKI for machine readable travel documents offering ICC read-only access, version 1.1; 2004b.
    • International Civil Aviation Organisation, Machine readable travel documents, technical report, PKI for machine readable travel documents offering ICC read-only access, version 1.1; 2004b.
  • 40
    • 55649124383 scopus 로고    scopus 로고
    • ISO/IEC 15408-1. Information technology security techniques - evaluation criteria for IT security, part 1: introduction and general model; 2005.
    • ISO/IEC 15408-1. Information technology security techniques - evaluation criteria for IT security, part 1: introduction and general model; 2005.
  • 41
    • 55649105926 scopus 로고    scopus 로고
    • ISO/IEC 19785-1. Information technology - common biometric exchange formats framework, part 1; 2006.
    • ISO/IEC 19785-1. Information technology - common biometric exchange formats framework, part 1; 2006.
  • 42
    • 55649105035 scopus 로고    scopus 로고
    • ISO/IEC 27001. Information technology - security techniques - information security management systems - requirements; 2005.
    • ISO/IEC 27001. Information technology - security techniques - information security management systems - requirements; 2005.
  • 43
    • 55649114708 scopus 로고    scopus 로고
    • ISO/IEC 27002. Information technology - information techniques - code of practice for information security management; 2005.
    • ISO/IEC 27002. Information technology - information techniques - code of practice for information security management; 2005.
  • 44
    • 55649089926 scopus 로고    scopus 로고
    • ISO/IEC 7816-4. Identification cards - integrated circuits cards, organization, security and commands for interchange; 2005.
    • ISO/IEC 7816-4. Identification cards - integrated circuits cards, organization, security and commands for interchange; 2005.
  • 48
    • 33847249519 scopus 로고    scopus 로고
    • Juels A, Molnar D, Wagner D. Security and privacy issues in e-passports. In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks; 2005. p. 74-88.
    • Juels A, Molnar D, Wagner D. Security and privacy issues in e-passports. In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks; 2005. p. 74-88.
  • 49
    • 0028422616 scopus 로고
    • Identity authentication in heterogeneous computing environments: a competitive study for an integrated framework
    • Kanungo S. Identity authentication in heterogeneous computing environments: a competitive study for an integrated framework. Computers & Security 13 3 (1994) 231-253
    • (1994) Computers & Security , vol.13 , Issue.3 , pp. 231-253
    • Kanungo, S.1
  • 51
    • 55649124613 scopus 로고    scopus 로고
    • King MM. Rebus passwords. In: Proceedings of the seventh annual computer security applications conference; 1991. p. 239-43.
    • King MM. Rebus passwords. In: Proceedings of the seventh annual computer security applications conference; 1991. p. 239-43.
  • 53
    • 55649088071 scopus 로고    scopus 로고
    • Bitfrost: the one laptop per child security model
    • [accessed April 2008]
    • Krstić I., and Garfinkel S.L. Bitfrost: the one laptop per child security model. Symposium on usable privacy and security (2007). http://cups.cs.cmu.edu/soups/2007/proceedings/p132_krstic.pdf [accessed April 2008]
    • (2007) Symposium on usable privacy and security
    • Krstić, I.1    Garfinkel, S.L.2
  • 54
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • :685-92.
    • Leech J. Improving user security behaviour. Computers & Security 22 8 (2003) :685-92.
    • (2003) Computers & Security , vol.22 , Issue.8
    • Leech, J.1
  • 56
    • 1642298729 scopus 로고    scopus 로고
    • UK National Physical Laboratory and San Jose State University, Centre for Mathematics and Scientific Computing National Physical Laboratory, UK [accessed April 2008]
    • Mansfield A.J., and Wayman J.L. Best practices in testing and reporting performance of biometric devices version 2.01 (August 2002), UK National Physical Laboratory and San Jose State University, Centre for Mathematics and Scientific Computing National Physical Laboratory, UK. http://www.cesg.gov.uk/site/ast/biometrics/media/BestPractice.pdf [accessed April 2008]
    • (2002) Best practices in testing and reporting performance of biometric devices version 2.01
    • Mansfield, A.J.1    Wayman, J.L.2
  • 57
    • 0036030112 scopus 로고    scopus 로고
    • Impact of artificial "gummy" fingers on fingerprint systems
    • Proceedings of international society for optical engineering [accessed April 2008]
    • Matsumoto T., Matsumoto H., Yamada K., and Hoshino S. Impact of artificial "gummy" fingers on fingerprint systems. Proceedings of international society for optical engineering. Optical security and counterfeit deterrence techniques vol. 4677 (2002) 275-289. http://www.lfca.net/Fingerprint-System-Security-Issues.pdf [accessed April 2008]
    • (2002) Optical security and counterfeit deterrence techniques , vol.4677 , pp. 275-289
    • Matsumoto, T.1    Matsumoto, H.2    Yamada, K.3    Hoshino, S.4
  • 70
    • 55649094257 scopus 로고    scopus 로고
    • The usability of security devices
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly Media Inc
    • Piazzalunga U., Salvaneschi P., and Coffetti P. The usability of security devices. In: Cranor L.F., and Garfinkel S. (Eds). Security and usability (2005), O'Reilly Media Inc
    • (2005) Security and usability
    • Piazzalunga, U.1    Salvaneschi, P.2    Coffetti, P.3
  • 72
    • 33751109662 scopus 로고    scopus 로고
    • Quantifying the quality of web authentication mechanisms - a usability perspective
    • Renaud K. Quantifying the quality of web authentication mechanisms - a usability perspective. Journal of Web Engineering 3 2 (2004) 95-123
    • (2004) Journal of Web Engineering , vol.3 , Issue.2 , pp. 95-123
    • Renaud, K.1
  • 73
    • 35348885452 scopus 로고    scopus 로고
    • Evaluating authentication mechanisms
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly Media Inc
    • Renaud K. Evaluating authentication mechanisms. In: Cranor L.F., and Garfinkel S. (Eds). Security and usability (2005), O'Reilly Media Inc
    • (2005) Security and usability
    • Renaud, K.1
  • 75
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
    • Netherlands: Springer
    • Sasse M.A., Brostoff S., and Weirich D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19 3 (2001) Netherlands: Springer
    • (2001) BT Technology Journal , vol.19 , Issue.3
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 78
    • 55649098862 scopus 로고    scopus 로고
    • Cyber-risk management: technical and insurance controls for enterprise-level security
    • Tipton H.F., and Krause M. (Eds), CRC Press LLC
    • Siegel C.A., Sagalow T.R., and Serritella P. Cyber-risk management: technical and insurance controls for enterprise-level security. In: Tipton H.F., and Krause M. (Eds). Information security management handbook (2003), CRC Press LLC
    • (2003) Information security management handbook
    • Siegel, C.A.1    Sagalow, T.R.2    Serritella, P.3
  • 80
    • 55649110955 scopus 로고    scopus 로고
    • Enterprise Security, British Computer Society [accessed April 2008]
    • Stevens T. Identity, identity, identity. Enterprise Security (2007), British Computer Society. http://www.bcs.org/server.php?show=conWebDoc.11113 [accessed April 2008]
    • (2007) Identity, identity, identity
    • Stevens, T.1
  • 85
    • 55649110954 scopus 로고    scopus 로고
    • UK Biometrics Working Group, The UK Office of the E-Envoy, UK Government Cabinet Office [accessed April 2008]
    • UK Biometrics Working Group. Use of Biometrics for identification and authentication - advice on product selection (2002), The UK Office of the E-Envoy, UK Government Cabinet Office. http://www.cesg.gov.uk/site/ast/biometrics/media/BiometricsAdvice.pdf [accessed April 2008]
    • (2002) Use of Biometrics for identification and authentication - advice on product selection
  • 86
    • 55649084201 scopus 로고    scopus 로고
    • Personal internet security
    • Authority of the House of Lords, The Stationery Office Limited, London [accessed April 2008]
    • UK Government, House of lords science and technology committee. Personal internet security. Report vol. 1 (2007), Authority of the House of Lords, The Stationery Office Limited, London. http://www.publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf [accessed April 2008]
    • (2007) Report , vol.1
    • UK Government, House of lords science and technology committee,1
  • 90
    • 36049049404 scopus 로고    scopus 로고
    • An introduction to biometric authentication systems
    • Wayman J., Jain A., Maltoni D., and Maio D. (Eds), Springer-Verlag London Limited
    • Wayman J., Jain A., Maltoni D., and Maio D. An introduction to biometric authentication systems. In: Wayman J., Jain A., Maltoni D., and Maio D. (Eds). Biometric Systems: technology, design and performance (2005), Springer-Verlag London Limited
    • (2005) Biometric Systems: technology, design and performance
    • Wayman, J.1    Jain, A.2    Maltoni, D.3    Maio, D.4
  • 91
    • 68549122947 scopus 로고    scopus 로고
    • Weingart SH, White SR, Arnold WC, Double GP. An evaluation system for the physical security of computing systems. In: Sixth Annual Computer Security Applications Conference. 1990, p. 232-43.
    • Weingart SH, White SR, Arnold WC, Double GP. An evaluation system for the physical security of computing systems. In: Sixth Annual Computer Security Applications Conference. 1990, p. 232-43.
  • 92
    • 0038335740 scopus 로고    scopus 로고
    • Weirich D, Sasse MA. Persuasive password security. In: Conference on human factors in computing systems, CHI '01 extended abstracts on human factors in computing systems; 2001. p. 139-40.
    • Weirich D, Sasse MA. Persuasive password security. In: Conference on human factors in computing systems, CHI '01 extended abstracts on human factors in computing systems; 2001. p. 139-40.
  • 94
    • 85084161247 scopus 로고    scopus 로고
    • Whitten A, Tygar JD. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; 1999.
    • Whitten A, Tygar JD. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; 1999.
  • 96
    • 34547294916 scopus 로고    scopus 로고
    • The memorability and security of passwords
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly Media Inc
    • Yan J., Blackwell A., Anderson R., and Grant A. The memorability and security of passwords. In: Cranor L.F., and Garfinkel S. (Eds). Security and usability (2005), O'Reilly Media Inc
    • (2005) Security and usability
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 99
    • 55649124609 scopus 로고    scopus 로고
    • Secure interaction design and the principle of least authority
    • [accessed April 2008]
    • Yee K.P. Secure interaction design and the principle of least authority. CHI 2003 workshop on human-computer interaction and security systems (2003). http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-yee.pdf [accessed April 2008]
    • (2003) CHI 2003 workshop on human-computer interaction and security systems
    • Yee, K.P.1
  • 101
    • 33846277633 scopus 로고    scopus 로고
    • Zurko ME. User-centred security: stepping up to the grand challenge. In: Proceedings of the 21st annual computer security applications conference; 2005, p. 187-202.
    • Zurko ME. User-centred security: stepping up to the grand challenge. In: Proceedings of the 21st annual computer security applications conference; 2005, p. 187-202.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.