Continuous User Identity Verification for Trusted Operators in Control Rooms

Research Area: Uncategorized Year: 2015
Type of Publication: In Proceedings Keywords: Biometrics, Verification, Trust, Security, Control Rooms
Authors: Enrico Schiavone; Andrea Ceccarelli; Andrea Bondavalli
Volume: 9532
Book title: Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings
Series: Lecture Notes in Computer Science Pages: 187-200
Month: November 18-20
BibTex:
Abstract:
Human operators in control rooms are often responsible of issuing critical commands, and in charge of managing sensitive data. Insiders must be prevented to operate on the system: they may benefit of their position in the con-trol room to fool colleagues, and gain access to machines or accounts. This paper proposes an authentication system for deterring and detecting malicious access to the workstations of control rooms. Specifically tailored for the operators in the control room of the crisis management system Secure!, the solution aims to guar-antee authentication and non-repudiation of operators, reducing the risk that un-authorized personnel (including intruders) misuses a workstation. A continuous multi-biometric authentication mechanism is developed and applied in which bi-ometric data is acquired transparently from the operator and verified continu-ously through time. This paper presents the authentication system design and pro-totype, its execution and experimental results.

Resilient Computing Lab, 2011

Joomla - Realizzazione siti web