메뉴 건너뛰기




Volumn , Issue , 2011, Pages 43-50

Biometric Authentication as a service for enterprise identity management deployment: A data protection perspective

Author keywords

Authentication; Biometrics; Cloud computing; Data protection; Identity management; Keystroke dynamics; Privacy; Security; Software as a service

Indexed keywords

DATA PROTECTION; IDENTITY MANAGEMENT; KEYSTROKE DYNAMICS; SECURITY; SOFTWARE-AS-A-SERVICE;

EID: 80455173609     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.14     Document Type: Conference Paper
Times cited : (41)

References (39)
  • 2
    • 85001819535 scopus 로고    scopus 로고
    • On the design of an authentication system based on keystroke dynamics using a predefined input text
    • D. Bartmann, I. Bakdi and M. Achatz, "On the design of an authentication system based on keystroke dynamics using a predefined input text," International Journal of Information Security and Privacy, vol. 2, pp. 1-12, 2007.
    • (2007) International Journal of Information Security and Privacy , vol.2 , pp. 1-12
    • Bartmann, D.1    Bakdi, I.2    Achatz, M.3
  • 3
    • 78650165017 scopus 로고    scopus 로고
    • User authentication through keystroke dynamics
    • F. Bergando, D. Gunetti and C. Picardi, "User authentication through keystroke dynamics," ACM TISSEC, vol. 4, pp. 367-397, 2002.
    • (2002) ACM TISSEC , vol.4 , pp. 367-397
    • Bergando, F.1    Gunetti, D.2    Picardi, C.3
  • 5
    • 15944384177 scopus 로고    scopus 로고
    • Accessed 24 July 2010
    • Biometric Evaluation Methodology Working Group, "Biometric evaluation methodology," 2002. http://www.cesg.gov.uk/policy-technologies/ biometrics/media/bem-10.pdf. Accessed 24 July 2010.
    • (2002) Biometric Evaluation Methodology
  • 10
    • 33744960056 scopus 로고    scopus 로고
    • Keystroke biometric system using wavelets
    • D. Zhang and A. K. Jain, eds. Springer
    • W. Chang, "Keystroke biometric system using wavelets," in ICB 2006, D. Zhang and A. K. Jain, eds. Springer, pp. 647-654, 2006.
    • (2006) ICB 2006 , pp. 647-654
    • Chang, W.1
  • 11
    • 33845255668 scopus 로고    scopus 로고
    • Sicherheit in der Informationstechnik. Der Begriff ITSicherheit
    • R. Dierstein, "Sicherheit in der Informationstechnik. Der Begriff ITSicherheit," Informatik Spektrum, vol. 4, pp. 343-353, 2004.
    • (2004) Informatik Spektrum , vol.4 , pp. 343-353
    • Dierstein, R.1
  • 14
    • 80455168953 scopus 로고    scopus 로고
    • Software as a Service (SaaS): Rechtliche Rahmenbedingungen
    • C. Köhler-Schulte, ed. Springer
    • J. Eckhardt, "Software as a Service (SaaS): Rechtliche Rahmenbedingungen," in Software as a Service, C. Köhler-Schulte, ed. Springer, pp. 114-139, 2009.
    • (2009) Software As A Service , pp. 114-139
    • Eckhardt, J.1
  • 15
    • 45949112145 scopus 로고    scopus 로고
    • Accessed 30 May 2011
    • J. Fenn, "Hype Cycle for Emerging Technologies" 2010. http://community.mis.temple.edu/mis2501sec001s11/files/2011/01/ Hype-Cycle-for-Emerging-Technologies-2010.pdf. Accessed 30 May 2011.
    • (2010) Hype Cycle for Emerging Technologies
    • Fenn, J.1
  • 19
    • 33745198933 scopus 로고    scopus 로고
    • Keystroke analysis of different languages: A case study
    • Springer
    • D. Gunetti, C. Picardi, C. and G. Ruffo, "Keystroke analysis of different languages: a case study," In Proc. of IDA (IDA 2005), Springer, pp. 133-144, 2005.
    • (2005) Proc. of IDA (IDA 2005) , pp. 133-144
    • Gunetti, D.1    Picardi, C.C.2    Ruffo, G.3
  • 20
    • 73149108190 scopus 로고    scopus 로고
    • SeAAS - A reference architecture for security services in SOA
    • M. Hafner, M. Mukhtiar and R. Breu, "SeAAS - A reference architecture for security services in SOA," J. UCS, vol. 15, pp. 2916-2936, 2009.
    • (2009) J. UCS , vol.15 , pp. 2916-2936
    • Hafner, M.1    Mukhtiar, M.2    Breu, R.3
  • 21
    • 37849023553 scopus 로고    scopus 로고
    • User classification for keystroke dynamics authentication
    • S. W. Lee and S. Z. Li, eds. Springer
    • S. Hocquet, J. Ramel and H. Cardot, "User Classification for Keystroke Dynamics Authentication," in: ICB 2007, S. W. Lee and S. Z. Li, eds. Springer, pp. 531-539, 2007.
    • (2007) ICB 2007 , pp. 531-539
    • Hocquet, S.1    Ramel, J.2    Cardot, H.3
  • 24
    • 80455133092 scopus 로고    scopus 로고
    • International Biometric Group (IBG), IBG
    • International Biometric Group (IBG), "State of Biometric Standards," IBG, 2009.
    • (2009) State of Biometric Standards
  • 25
    • 78149472443 scopus 로고    scopus 로고
    • Introduction to biometric recognition
    • A. Jain, P. Flynn and A. Ross, eds. Springer
    • A. Jain and A. Ross, "Introduction to Biometric Recognition," in Handbook of Biometrics, A. Jain, P. Flynn and A. Ross, eds. Springer, pp. 1-22, 2007.
    • (2007) Handbook of Biometrics , pp. 1-22
    • Jain, A.1    Ross, A.2
  • 26
    • 37849044963 scopus 로고    scopus 로고
    • Keystroke dynamics in a general setting
    • S. W. Lee and S. Z. Li, eds. Springer
    • R. Janakiraman and T. Sim, "Keystroke Dynamics in a General Setting," in ICB 2007, S. W. Lee and S. Z. Li, eds. Springer, pp. 584-593, 2007.
    • (2007) ICB 2007 , pp. 584-593
    • Janakiraman, R.1    Sim, T.2
  • 27
    • 71749097049 scopus 로고    scopus 로고
    • A systematic process for developing high quality SaaS cloud services
    • M. G. Jaatun and C Rong, eds. Springer
    • H. La and S. Kim, "A systematic process for developing high quality SaaS cloud services," in CloudCom 2009, M. G. Jaatun and C Rong, eds. Springer, pp. 278-289, 2009.
    • (2009) CloudCom 2009 , pp. 278-289
    • La, H.1    Kim, S.2
  • 35
    • 70349237750 scopus 로고    scopus 로고
    • Using quantified trust levels to describe authentication requirements in federated identity management
    • Virginia, E. Damiani and S. Proctor, Eds. ACM Press
    • I. Thomas, M. Menzel, and C. Meinel, "Using quantified trust levels to describe authentication requirements in federated identity management," Proceedings of the 2008 ACM Workshop on Secure Web Services. October 31, 2008, Alexandria, Virginia, E. Damiani and S. Proctor, Eds. ACM Press, pp. 71-80, 2008.
    • (2008) Proceedings of the 2008 ACM Workshop on Secure Web Services. October 31, 2008, Alexandria , pp. 71-80
    • Thomas, I.1    Menzel, M.2    Meinel, C.3
  • 38
    • 84902241182 scopus 로고    scopus 로고
    • Cloud computing und datenschutz
    • T. Weichert, "Cloud Computing und Datenschutz," DuD, vol. 10, 2010.
    • (2010) DuD , vol.10
    • Weichert, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.