Biometry: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 1: | Line 1: | ||
== |
==Overview== |
||
Short Introduction |
|||
Broad Overview on Biometric Criteria |
|||
Facial recognition |
|||
Controlled are issues like |
|||
Use, Scenario, Features |
|||
General course |
|||
*access to files |
|||
Approaches |
|||
*access to memory |
|||
Summary |
|||
*execution of programs |
|||
Insights on Fingerprints |
|||
*sharing data with other principals |
|||
Features |
|||
Acquisition |
|||
Access is controlled at different levels: |
|||
Recognition |
|||
Demonstration |
|||
*application |
|||
Problems |
|||
*middleware |
|||
*operating system |
|||
*hardware |
|||
The complexity of administering Access Control is growing complexity. |
Revision as of 12:49, 15 February 2005
Overview
Short Introduction Broad Overview on Biometric Criteria Facial recognition Use, Scenario, Features General course Approaches Summary Insights on Fingerprints Features Acquisition Recognition Demonstration Problems