Please use this identifier to cite or link to this item: https://doi.org/10.1109/ACVMOT.2005.120
DC FieldValue
dc.titleUsing continuous face verification to improve desktop security
dc.contributor.authorJanakiraman, R.
dc.contributor.authorKumar, S.
dc.contributor.authorZhang, S.
dc.contributor.authorSim, T.
dc.date.accessioned2013-07-04T08:13:00Z
dc.date.available2013-07-04T08:13:00Z
dc.date.issued2007
dc.identifier.citationJanakiraman, R.,Kumar, S.,Zhang, S.,Sim, T. (2007). Using continuous face verification to improve desktop security. Proceedings - Seventh IEEE Workshop on Applications of Computer Vision, WACV 2005 : 501-507. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/ACVMOT.2005.120" target="_blank">https://doi.org/10.1109/ACVMOT.2005.120</a>
dc.identifier.isbn0769522718
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/40816
dc.description.abstractIn this paper we describe the architecture, implementation, and performance of a face verification system that continually verifies the presence of a logged-in user at a computer console. It maintains a sliding window of about ten seconds of verification data points and uses them as input to a Bayesian framework to compute a probability that the logged-in user is still present at the console. If the probability falls below a threshold, the system can delay or freeze operating system processes belonging to the logged-in user. This helps prevent misuse of computer resources when an unauthorized user maliciously takes the place of an authorized user. Processes may be unconditionally frozen (they never return from a system call) or delayed (it takes longer to complete a system call), or appropriate action may be taken for certain classes of system calls, such as those that are considered security critical. We believe that the integrated system presented here is the first of its kind. Furthermore, we believe that the analysis of the tradeoffs between verification accuracy, processor overhead, and system security that we do in this paper has not been done elsewhere.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/ACVMOT.2005.120
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1109/ACVMOT.2005.120
dc.description.sourcetitleProceedings - Seventh IEEE Workshop on Applications of Computer Vision, WACV 2005
dc.description.page501-507
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.