User Management

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 285261 Experts worldwide ranked by ideXlab platform

Yang Yang - One of the best experts on this subject based on the ideXlab platform.

  • a new identity authentication scheme of single sign on for multi database
    International Conference on Software Engineering, 2016
    Co-Authors: Lan Zhang, Hongyun Ning, Yunyun Du, Yang Yang
    Abstract:

    At present, multi-database identity authentication is mostly based on centralized global User Management mechanism. In this paper, we analyze the defects of the current identity authentication in multi-database and propose a new single sign on for multi-database identity authentication based on the idea of database union domain. Compared with the traditional methods of authentication, the scheme adopts decentralized authentication mode which without centralized Management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.

  • multi protocol instant message based processing method and system in unified communication system
    2011
    Co-Authors: Wenjiang Pei, L V Wan, Binhan Niu, Jingjing Ye, Xiaoshu Wang, Haiyan Zhang, Kai Wang, Yang Yang, Feng Luo, Siyuan Zhou
    Abstract:

    The invention provides a multi-protocol instant message (IM) processing system in a unified communication system. The processing system comprises a unified communication system server, a client and a service provider server; the unified communication system server is connected with the client and the service provider server through an Ethernet respectively; the service provider server comprises an IM provider server; and the unified communication system server comprises a Web server, a multi-protocol IM server and a database. The invention also provides a multi-protocol IM processing method in the unified communication system. A User does not need to install client software at a local place, and Management of multiple communication modes comprising the IM can be realized only by the support of a browser. The processing system reasonably optimizes User Management and data storage format at the server, and is simple, easy and convenient.

Nakanishi Isao - One of the best experts on this subject based on the ideXlab platform.

  • Driver authentication using brain waves while route tracing as a mental task
    IEEE, 2020
    Co-Authors: Nakanishi Isao, Aba Sadanao, Inoue Masahiro
    Abstract:

    From the viewpoint of User Management, continuous or on-demand biometric authentication is effective for achieving higher security. In such a case, the biometrics which is able to present biometric data unconsciously is needed and we have proposed to use the brain wave as the unconscious biometrics. In this paper, assuming driver authentication, we measure brain waves of drivers when they are tracing routes as a mental task. And we evaluate verification performance using the difference between the mean power spectrum at α-β band in relaxed condition and that in mental-tasked condition as an individual feature. As a result, the EER of 31 % is obtained among 12 subjects

  • Unconscious Biometrics for Continuous User Verification
    Association for Computing Machinery (ACM), 2020
    Co-Authors: Nakanishi Isao
    Abstract:

    In User Management system, continuous or successive (ondemand) authentication is required to prevent identity theft. In particular, biometrics of which data are unconsciously presented to authentication systems is necessary. In this paper, brain waves and intra-palm propagation signals are introduced as biometrics and their verification performances using actually measured data are presented

  • Person Verification Using Intra-Palm Propagation Signals with A New Phase Spectrum
    'Institute of Electrical and Electronics Engineers (IEEE)', 2020
    Co-Authors: Fujita Kohei, Ishimoto Yuya, Nakanishi Isao
    Abstract:

    In recent years, biometrics such as fingerprints and iris scans has been used in authentication. However, conventional biometrics is vulnerable to identity theft, especially in User Management systems. As a new biometric without this vulnerability, we focused on intra-palm propagation signals, which are not exposed on a body surface. An intra-palm propagation signal is a signal that propagates between two pairs of electrodes, which are on the transmitter and receiver sides on a palm. When current passes between the electrodes on the transmitter side, the leakage electric field is generated. On the receiver side, this electric field is detected as a voltage change and regarded as an intra-palm propagation signal. In this paper, a new feature based on a phase spectrum of an intra-palm propagation signal is proposed, and its performance for verifying individuals is examined by the evaluation

  • Biometric authentication using evoked potentials stimulated by personal ultrasound
    'Institute of Electrical and Electronics Engineers (IEEE)', 2020
    Co-Authors: Nakanishi Isao, Maruoka Takehiro
    Abstract:

    In recent years, biometrics such as fingerprints and iris scans has been used in authentication. However, conventional biometrics is vulnerable to identity theft, especially in User Management systems. As a new biometric without this vulnerability, we focused on brain waves. In this paper, we show that individuals can be authenticated using evoked potentials when they are subjected to ultrasound. We measured the electroencephalograms (EEGs) of 10 experimental ubjects. Individual features were extracted from the power spectra of the EEGs using the principle component analysis and verification was achieved using the support vector machine. We found that for the proposed authentication method, the equal error rate for a single electrode was about 22-32 %. For a multi-electrode, the equal error rate was 4.4 % using the majority decision rule

L I Lixin - One of the best experts on this subject based on the ideXlab platform.

  • design and implementation of uniform identity authentication system based on enterprise service bus
    Journal of Computer Applications, 2012
    Co-Authors: L I Lixin
    Abstract:

    The self-governed identity authentication and User Management lead to different identity,redundant information,self-governed system and bad security in heterogeneous information systems.A new method of integration based on uniform data exchange standard and interface standard,especially the system model,data flow and authentication protocol were put forward.Furthermore,a uniform identity authentication system based on Enterprise Service Bus(ESB) was realized.The experimental results show that the system can avoid redundant authentication logic and data,and it also enhances authentication efficiency and makes the best use of the available resources.

W. B. Lee - One of the best experts on this subject based on the ideXlab platform.

  • a security model for distributed product data Management system
    Computers in Industry, 2003
    Co-Authors: K K Leong, W. B. Lee
    Abstract:

    Product data Management (PDM) and distributed product data Management (DPDM) systems have made product data a valuable and available commodity for many different kinds of computing applications in production. However, there are worries that this product data will lead to new security risks, and to the invasion of the DPDM system. It is because all people in a manufacturing enterprise will somehow get in touch with the DPDM system. Dealing with these tremendous amounts of interaction between the system and the various Users, the utmost importance is to ensure that all data are secured and all Users are under controlled and managed. Therefore, the security of DPDM system has been of great concern to individuals and corporations. The paper discusses the security requirements faced by a DPDM system in different organizational contexts. It is argued that access control requires a workspace stratified User Management security model to specify. The prominent supporting features of the system including User organization, workspace and security are outlined. A new mixed approach access model for the system is proposed. In this model, User Management and two main classical access control methods, the Lampson's access matrix and Bell and LaPadula (BLP) security labels, are analyzed and adapted to the application with multiple system User and product data in order to support a workspace-oriented DPDM system.

  • A security model for distributed product data Management system
    Elsevier, 2003
    Co-Authors: K K Leong, W. B. Lee
    Abstract:

    Product data Management (PDM) and distributed product data Management (DPDM) systems have made product data a valuable and available commodity for many different kinds of computing applications in production. However, there are worries that this product data will lead to new security risks, and to the invasion of the DPDM system. It is because all people in a manufacturing enterprise will somehow get in touch with the DPDM system. Dealing with these tremendous amounts of interaction between the system and the various Users, the utmost importance is to ensure that all data are secured and all Users are under controlled and managed. Therefore, the security of DPDM system has been of great concern to individuals and corporations. The paper discusses the security requirements faced by a DPDM system in different organizational contexts. It is argued that access control requires a workspace stratified User Management security model to specify. The prominent supporting features of the system including User organization, workspace and security are outlined. A new mixed approach access model for the system is proposed. In this model, User Management and two main classical access control methods, the Lampson's access matrix and Bell and LaPadula (BLP) security labels, are analyzed and adapted to the application with multiple system User and product data in order to support a workspace-oriented DPDM system.Department of Industrial and Systems Engineerin

Isao Nakanishi - One of the best experts on this subject based on the ideXlab platform.

  • A study on evoked potential by inaudible auditory stimulation toward continuous biometric authentication
    TENCON 2017 - 2017 IEEE Region 10 Conference, 2017
    Co-Authors: Takehiro Maruoka, Kenta Kambe, Hideki Harada, Isao Nakanishi
    Abstract:

    Biometrics have been used in person authentication. However, conventional biometrics have a vulnerability to the identity theft, especially in User Management systems. In order to prevent the identity theft, the effective way is to authenticate continuously. However, the continuous authentication requires unconscious biometrics. The authors have been studied to use brain waves as the unconscious biometrics. In conventional studies, the authors had used spontaneous brain waves; however, their verification performance was not so high. Thus, the authors propose to use evoked potentials by supersonic sounds, which cannot be perceived by human beings. In this paper, the authors examine the characteristics of evoked potentials by supersonic sounds and confirm that the spectrum in the α band is increased at the electrodes on the back of the head. This phenomenon could be used as an individual feature in person verification.

  • Brain waves as unconscious biometrics towards continuous authentication - the effects of introducing PCA into feature extraction
    2015 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), 2015
    Co-Authors: Isao Nakanishi, Takuya Yoshikawa
    Abstract:

    For User Management in high-security systems, continuous authentication is required, where unconscious biometrics is suitable. We have proposed to use brain waves as such unconscious biometrics. Assuming continuous authentication of drivers, we have measured brain waves in virtual driving environments and evaluated the verification performance. In this paper, we introduce Principle Component Analysis (PCA) into the feature extraction. It is confirmed that the introduction of PCA is effective for improving the verification performance.

  • Evaluation of the brain wave as biometrics in a simulated driving environment
    2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), 2012
    Co-Authors: Isao Nakanishi, Koutaro Ozaki, Shigang Li
    Abstract:

    In the case of User Management, continuous or on-demand biometric authentication is effective for achieving higher security with a light system load. However, it requires us to present biometric data unconsciously. In this paper, we focus attention on the brain wave as unconscious biometrics. In particular, assuming driver authentication, we measure the brain waves of drivers when they are using a simplified driving simulator. We evaluate verification performance using 23 subjects and obtain the EER of about 20 %.

  • on demand biometric authentication of computer Users using brain waves
    Networked Digital Technologies, 2010
    Co-Authors: Isao Nakanishi, Chisei Miyamoto
    Abstract:

    From the viewpoint of User Management, on-demand biometric authentication is effective for achieving high-security. In such a case, unconscious biometrics is needed and we have studied to use a brain wave (Electroencephalogram: EEG). In this paper, we examine the performance of verification based on the EEG during a mental task. In particular, assuming the verification of computer Users, we adopt the mental task where Users are thinking of the contents of documents. From experimental results using 20 subjects, it is confirmed that the verification using the EEG is applicable even when the Users are doing the mental task.

  • EEG based biometric authentication using new spectral features
    2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), 2009
    Co-Authors: Isao Nakanishi, Sadanao Baba, Chisei Miyamoto
    Abstract:

    From the viewpoint of User Management, continuous authentication is effective. However, general biometrics such as fingerprint, iris, vein, and so on are not suitable for the continuous verification since they require conscious presentation of biometric data. As unconscious biometrics, to use a brain wave (electroencephalogram: EEG) has been proposed but conventional approaches require heavy computational load for feature extraction and verification and it becomes a problem for practical applications. In this paper, we propose new features: the concavity and convexity of spectral distribution in the alpha band and propose to fuse them with a spectral variance in verification. The proposed methods are achieved with low computational load. In our experiments using 23 subjects, EER of 11% is obtained and it is comparable with the performance of conventional approaches.