• Corpus ID: 8543301

Bio-metrics Verification for User Authentication in Web Services

@inproceedings{Karthickkumar2015BiometricsVF,
  title={Bio-metrics Verification for User Authentication in Web Services},
  author={Mr. B. Karthickkumar and B. Arunkumar},
  year={2015}
}
Session management in disseminated Internet services is customarily in light of username and password, explicit logouts and components of user session termination utilizing fantastic timeouts. Developing biometric solution permit substituting username and password with biometric information during session establishment, however in such a methodology still a single verification is considered sufficient, and the identity of a user is viewed as unchanging during the whole session. Also, the length… 

Figures from this paper

References

SHOWING 1-6 OF 6 REFERENCES
Soft Biometric Traits for Continuous User Authentication
TLDR
A new framework for continuous user authentication that primarily uses soft biometric traits (e.g., color of user's clothing and facial skin) is proposed and automatically registers (enrolls) softBiometric traits every time the user logs in and fusessoft biometric matching with the conventional authentication schemes, namely password and face biometric.
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display
TLDR
A unified structure, consisting of transparent TFT based fingerprint sensors, touchscreen, and display, is proposed to propose a novel identity management mechanism that authenticates users of touch based mobile devices for accessing the local devices and remote services.
Internet Banking: Risk Analysis and Applicability o f Biometric Technology for Authentication
TLDR
The points towards the use of biometric technology in internet banking sys tem for risk management of banks regular activities through authentication are highlighted.
An Overview and Evaluation of Web Services Security Performance Optimizations
TLDR
This paper analyzes the overhead of the WS- security protocol processing stages and evaluates existing and new techniques for WS-Security signature performance optimizations to speed up end-to-end message integrity assurance and authentication.
Access Control for Cross-Organisational Web Service Composition
TLDR
To overcome the revealed limitations of existing frameworks, a two layered security architecture is introduced that satisfies the identified security requirements and abstracts from local access control models to enable secure federated cross-organisational services compositions.
A Prototype for Secure Web Access Model using Multimodal Biometric System based on Fingerprint and Face Recognition ”
  • International Journal of Computer Science and Information Technologies
  • 2012