Search results for "Smart card"
showing 3 items of 3 documents
Embedded access points for trusted data and resources access in HPC systems
2010
Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…
Cultivating the Installed Base: The Introduction of e-Prescription in Greece
2017
In this chapter we explore the surprisingly swift deployment of a national e-prescription service in Greece. We position e-prescribing within the overall Greek health system and we describe how the new electronic service evolved to inscribe specific prescribing policies, to provide clinical decision support and to facilitate the processes and roles of policy and financing stakeholders. We identify how a series of pragmatic decisions allowed building upon a “good-enough” installed base by exploiting its latent potential without perpetuating all of its weaknesses, and by being responsive to exogenous shifts. These tactical decisions, were supported by a favourable and enabling combination of …
Fingerprint Traits and RSA Algorithm Fusion Technique
2012
The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…