Now showing items 1-7 of 7
On community-based authentication factor
Contributor:Alkhattabi, Khalid Hammad
In this thesis, we explore the use of community Information as a factor for authentication and authorization, called it Community-based Factor (CBF), and resent the design and implementation of a Community-based Authentication ...
Toward secure sensitive data in the cloud
Contributor:Alsolami, Fahad Jazi
Cloud storage and computation have many exciting features such as low cost, scalability, and unbounded resources. These features attract many individuals and organizations to migrate their sensitive data, including biometric ...
Increasing security for regulatory constrained systems, through new systems and architecture methodologies
In the Department of Defense (DoD) vulnerabilities can result in casualties, destruction of assets, or potentially allow the enemy to either escape or infiltrate a system. This is true for other systems such as those in ...
Remote authentication using vaulted fingerprint verification
Contributor:Alzahrani, Hamdan Ahmed
Fingerprint biometrics are increasingly used for identity verification. However, these require a careful balance of accuracy and privacy that is missing in many implementations. This dissertation describes a new biometric ...
Toward secure, trusted, and privacy-enhanced biometrics in the cloud
Biometric technology has been used for decades as a strong method to identify and authenticate individuals. As for its effectiveness and accuracy, biometric technology has gained popularity in a wide range of fields and ...
Critical Infrastructure Asset Identification: A Multi-Criteria Decision System and Aviation Case Study
In a world where terrorism, natural disasters, and unknown unknowns threaten the security posture of various nations, comprehensive risk management remains the recommended action for protection of critical infrastructure. ...
Advancing Fingerprint-Enhanced Authentication: Consistent, Discerning, and Durable Representation and Matching
Throughout human history, the achievement of security through authentication has been filled with challenges. Technological evolution has created an unprecedented conjunction of scale and artifice that have turned our ...