Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ACVMOT.2005.120
DC Field | Value | |
---|---|---|
dc.title | Using continuous face verification to improve desktop security | |
dc.contributor.author | Janakiraman, R. | |
dc.contributor.author | Kumar, S. | |
dc.contributor.author | Zhang, S. | |
dc.contributor.author | Sim, T. | |
dc.date.accessioned | 2013-07-04T08:13:00Z | |
dc.date.available | 2013-07-04T08:13:00Z | |
dc.date.issued | 2007 | |
dc.identifier.citation | Janakiraman, R.,Kumar, S.,Zhang, S.,Sim, T. (2007). Using continuous face verification to improve desktop security. Proceedings - Seventh IEEE Workshop on Applications of Computer Vision, WACV 2005 : 501-507. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/ACVMOT.2005.120" target="_blank">https://doi.org/10.1109/ACVMOT.2005.120</a> | |
dc.identifier.isbn | 0769522718 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40816 | |
dc.description.abstract | In this paper we describe the architecture, implementation, and performance of a face verification system that continually verifies the presence of a logged-in user at a computer console. It maintains a sliding window of about ten seconds of verification data points and uses them as input to a Bayesian framework to compute a probability that the logged-in user is still present at the console. If the probability falls below a threshold, the system can delay or freeze operating system processes belonging to the logged-in user. This helps prevent misuse of computer resources when an unauthorized user maliciously takes the place of an authorized user. Processes may be unconditionally frozen (they never return from a system call) or delayed (it takes longer to complete a system call), or appropriate action may be taken for certain classes of system calls, such as those that are considered security critical. We believe that the integrated system presented here is the first of its kind. Furthermore, we believe that the analysis of the tradeoffs between verification accuracy, processor overhead, and system security that we do in this paper has not been done elsewhere. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/ACVMOT.2005.120 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1109/ACVMOT.2005.120 | |
dc.description.sourcetitle | Proceedings - Seventh IEEE Workshop on Applications of Computer Vision, WACV 2005 | |
dc.description.page | 501-507 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.