Search results for "Smart card"

showing 3 items of 3 documents

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

Cultivating the Installed Base: The Introduction of e-Prescription in Greece

2017

In this chapter we explore the surprisingly swift deployment of a national e-prescription service in Greece. We position e-prescribing within the overall Greek health system and we describe how the new electronic service evolved to inscribe specific prescribing policies, to provide clinical decision support and to facilitate the processes and roles of policy and financing stakeholders. We identify how a series of pragmatic decisions allowed building upon a “good-enough” installed base by exploiting its latent potential without perpetuating all of its weaknesses, and by being responsive to exogenous shifts. These tactical decisions, were supported by a favourable and enabling combination of …

Service (systems architecture)EngineeringProcess managementbusiness.industrycomputer.file_formatClinical Document ArchitectureCivil engineeringClinical decision support systemSoftware deploymentPosition (finance)Smart cardInstalled baseMedical prescriptionbusinesscomputer
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct