Atjaunināt sīkdatņu piekrišanu

Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity Softcover reprint of the original 1st ed. 2014 [Mīkstie vāki]

  • Formāts: Paperback / softback, 236 pages, height x width: 235x155 mm, weight: 3985 g, 11 Illustrations, color; 1 Illustrations, black and white; XXI, 236 p. 12 illus., 11 illus. in color., 1 Paperback / softback
  • Izdošanas datums: 23-Aug-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319346873
  • ISBN-13: 9783319346878
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 236 pages, height x width: 235x155 mm, weight: 3985 g, 11 Illustrations, color; 1 Illustrations, black and white; XXI, 236 p. 12 illus., 11 illus. in color., 1 Paperback / softback
  • Izdošanas datums: 23-Aug-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319346873
  • ISBN-13: 9783319346878

This exploration of the issues surrounding the use of biometrics in an increasingly interconnected world moves the debate on into the new and burgeoning world of cloud computing, federated ID, and the use of personal devices for business and civic purposes.



This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features: presents a brief history of the development of biometrics, and describes some of the popularly held misconceptions surrounding the technology; investigates the challenges and possibilities of biometrics across third party infrastructures and on mobile computing devices; provides guidance on biometric systems design; explores the mechanisms necessary to enable identity intelligence, including logging mechanisms, data communications and data formats; discusses such usage issues as collaboration frameworks, and messaging and data translation; examines the impact of biometric technologies on society, covering issues of privacy and user factors; reviews the current situation in identity management, and predicts where these trends may take us in the future.

Recenzijas

From the book reviews:

This book is a refreshing, timely review of the fundamentals of biometric technologies, which are often overlooked in the literature. A valuable resource for a wide audience, especially graduate students, researchers, faculty, and professionals in biometrics. Summing Up: Highly recommended. Upper-division undergraduates and above; informed general audiences. (C. Tappert, Choice, Vol. 52 (5), January, 2015)

Part I An Introduction to Biometrics
1 A Technology Overview
3(12)
The Electronic Age
4(1)
Fingerprints
4(1)
Iris Recognition
5(1)
Facial Recognition
5(1)
Voice Verification
6(1)
Hand Geometry
6(1)
Vein Pattern Recognition
6(1)
Signature Verification
7(1)
Keystroke Dynamics
7(1)
Gesture Biometrics
7(1)
Others
7(1)
Law Enforcement
8(2)
Identity and Entitlement
10(1)
Physical or Logical Access Control
11(2)
Chapter Summary
13(2)
2 The Story So Far
15(10)
A Change of Direction
20(2)
Evolution
22(1)
Chapter Summary
23(2)
3 Assumptions and Misconceptions
25(12)
Who are You?
25(1)
Biometrics and Privacy
26(1)
Biological Constancy
27(1)
Uniqueness
28(1)
Metrics
28(2)
Throughput
30(1)
Security
31(1)
Placing Things in Context
32(1)
Taking a New Approach
32(1)
Chapter Summary
33(4)
Part II Application Issues
4 Biometrics In the Cloud
37(10)
Fundamentals
37(2)
Managing Credentials
39(1)
Biometric Integration
40(2)
Practicalities
42(2)
Data Dissemination
44(1)
Chapter Summary
45(2)
5 Mobile Biometrics
47(10)
Relevant Biometric Techniques
49(4)
Practical Usage
53(2)
Adoption
55(1)
Chapter Summary
56(1)
6 Biometric Application Design
57(14)
End to End Systems' Design
58(1)
The Biometric Perspective
59(1)
The Registration Process
60(2)
The Biometric Matching Threshold
62(2)
Equivalence of Realised Performance
64(1)
Multimodal Biometrics
65(1)
The User Interface
66(1)
Hardware
67(1)
Software
68(1)
Chapter Summary
69(2)
7 Biometric Technology Issues
71(14)
The Biometric Template
71(2)
The Biometric Capture Device
73(1)
The Matching Algorithm
74(1)
The Matching Threshold
75(1)
Exposed Functions and Routines
76(1)
Data Management
77(2)
Technology Standards
79(1)
Equivalence
80(1)
Chapter Summary
81(4)
Part III Usage Issues
8 Identity Intelligence
85(10)
Enabling Intelligence
86(1)
Data Communication
86(2)
Data Interrogation
88(1)
Efficient Processing
89(1)
Repudiation
90(1)
Data Retention
91(1)
Clarity of Purpose
92(1)
Chapter Summary
93(2)
9 Collaboration
95(10)
Automated Collaboration
96(1)
Exception Handling
97(1)
System Requirements
98(1)
Data Protection
99(1)
Currency of Information
100(1)
Quality of Information
101(1)
Data Management
102(1)
Sustainability
102(1)
Chapter Summary
103(2)
10 Messaging
105(10)
Formats
106(1)
Transpositions
107(1)
Security
108(1)
Exceptions
109(1)
Minimalism
110(1)
Content
111(2)
Biometric Messaging
113(1)
Chapter Summary
113(2)
11 Managing a PKI
115(12)
Administration
116(1)
Certificate Authorities
117(1)
Renewal
118(1)
Revocation
118(1)
Storage and Retrieval
119(1)
Scalability
119(1)
Certificate Discovery
120(1)
Cross Certification
121(1)
Other Uses
121(1)
Chapter Summary
122(5)
Part IV Societal Issues
12 Biometrics in Society
127(14)
Clarity of Purpose
129(1)
Public Sector Implementations
130(2)
Border Control
132(2)
Responsibilities
134(1)
Assumptions
135(1)
Control
136(2)
Chapter Summary
138(3)
13 Privacy and Biometrics
141(8)
The Introduction of Biometrics
142(2)
Identity Matters
144(1)
Template Storage
145(1)
Assumptions
146(1)
Chapter Summary
147(2)
14 Ethics and Technology Usage
149(18)
In the Classroom
150(2)
Customer Service
152(2)
Globalisation
154(1)
Genetic Engineering
155(2)
Pharmaceuticals and Health Care
157(1)
Agriculture
157(2)
Government Sector
159(1)
Policing and Law Enforcement
160(1)
Academic Research
161(1)
Online and Communications
162(1)
Biometrics and Identity Management
163(2)
Chapter Summary
165(2)
15 Human Factors
167(12)
Genetic Profile
167(1)
Age
168(1)
Ethnicity
169(1)
Health
169(1)
Disabilities
170(1)
Attitude
171(1)
Environmental Situation
172(1)
External Pressure
173(1)
Distractions
174(1)
Familiarity
174(1)
Competence
175(1)
Chapter Summary
175(4)
Part V Today and Tomorrow
16 Implementation Issues
179(14)
Clarity of Purpose
179(1)
Systems Design
180(2)
Resilience
182(1)
Registration
183(1)
Deployment
184(2)
Configuration
186(1)
Performance
186(1)
Reporting
187(1)
Remediation
188(1)
Ongoing Maintenance
189(1)
Human Resources
190(1)
Chapter Summary
190(3)
17 Futures
193(12)
Where We Are Now
193(1)
Incorrect Assumptions and Predictions
194(1)
The Mobile World
195(1)
Cloud Computing
196(1)
Changing IT Paradigms
197(1)
Big Data
198(2)
The Effects upon Criminality
200(1)
Societal Impacts
201(1)
Data Protection and Privacy
201(1)
The Case for Identity Management in the Brave New world
202(1)
Chapter Summary
203(2)
18 Conclusions
205(14)
Understanding Biometric Technology
206(2)
Associated Technology Trends
208(1)
Application Design
209(1)
User Psychology
210(2)
Biometrics in the Workplace
212(1)
Biometrics in Society
213(1)
Biometrics and Criminology
214(1)
Biometrics and Big Data
215(2)
Where Do We Go from Here?
217(1)
Chapter Summary
218(1)
19 Illustrations
219(10)
Index 229
Julian Ashbourn is an experienced and successful author on topics ranging from computer science and identity management through to geoscience and the natural sciences in general. His publications include the Springer titles Guide to Biometrics for Large-Scale Systems, Practical Biometrics, and BANTAM User Guide.