Abomhara et al., 2022 - Google Patents
A comparison of primary stakeholders' views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land …Abomhara et al., 2022
View PDF- Document ID
- 13506380663092280048
- Author
- Abomhara M
- Yayilgan S
- Nweke L
- Székely Z
- Publication year
- Publication venue
- arXiv preprint arXiv:2201.03388
External Links
Snippet
Advances in technology have a substantial impact on every aspect of our lives, ranging from the way we communicate to the way we travel. The Smart mobility at the European land borders (SMILE) project is geared towards the deployment of biometric technologies to …
- 238000005516 engineering process 0 title abstract description 113
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abomhara et al. | A comparison of primary stakeholders' views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders | |
Hu | Algorithmic jim crow | |
Zarsky | Transparent predictions | |
Sobel | The Demeaning of Identity and Personhood in National Indentification Systems | |
Blasi Casagran | Fundamental rights implications of interconnecting migration and policing databases in the EU | |
Tanwar et al. | Ethical, legal, and social implications of biometric technologies | |
Martens | Data science ethics: Concepts, techniques, and cautionary tales | |
Smith et al. | Biometric identification, law and ethics | |
Koslowski | International travel security and the Global Compacts on refugees and migration | |
Satish et al. | A systematic review of passenger profiling in airport security system: Taking a potential case study of CAPPS II | |
Chebotareva et al. | Electronic Passports of Citizens as a Personal Essential Attribute During the Pandemic | |
Díaz | Legal challenges of biometric immigration control systems | |
Mitsilegas et al. | The Normalization of surveillance of movement in an era of reinforcing privacy standards | |
Thomson | Critical issues in identity management-challenges for Homeland Security | |
Thorburn | Identification, surveillance, and profiling: on the use and abuse of citizen data | |
Hendow et al. | Using technology to draw borders: fundamental rights for the Smart Borders initiative | |
Pospíšil et al. | Czech Republic | |
KR102181009B1 (en) | Method for providing blockchain basesd financial activity management service for supervising negotiorum gestio in contractual guardianship | |
Ringel | The Regulation of Facial Recognition Technology and Potential First Amendment Concerns | |
Katzan Jr | Ontology of trusted identity in cyberspace | |
Liu | Scenario study of biometric systems at borders | |
Sumaita | Losing dignity: Eroding privacy rights of immigrants in technology-based immigration enforcement | |
Sarantopoulou | Biometrics at the gate: An assessment of EU’s biometrical borders | |
Šnipa et al. | PROBLEMS OF VERIFYING THE AUTHENTICITY OF ASYLUM SEEKERS'DOCUMENTS AND IMPROVING THE IDENTIFICATION OF THESE PERSONS | |
Sumaita | Losing Dignity: Eroding Privacy Rights of Immigrants in Technology-based Immigration Enforcement |