Integration biometrics in web application: Security for web apps
To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by the biometric measurements' key genera...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Northern Negros State College of Science and Technology (NONESCOST)
2023-06-01
|
| Series: | International Research Journal of Science, Technology, Education, and Management |
| Subjects: | |
| Online Access: | https://irjstem.com/wp-content/uploads/2023/07/IRJSTEM_V3N2_2023_P09.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849405423206006784 |
|---|---|
| author | Wulandari Kusuma Herdanu Rabab Alayham Abbas Helmi Mariana Syamsudin |
| author_facet | Wulandari Kusuma Herdanu Rabab Alayham Abbas Helmi Mariana Syamsudin |
| author_sort | Wulandari Kusuma Herdanu |
| collection | DOAJ |
| description | To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by the biometric measurements' key generation rate are specified. Then, it is decided that there is a fundamental tradeoff between these two measurements. First, we investigate the case where a potential attacker has no side knowledge. For this situation, the privacy-security region which defines the tradeoff mentioned above is derived. In perfect privacy biometric security systems, common knowledge among random variables plays a significant role. The case where the adversary possesses side knowledge is then considered. In this scenario, the privacy-security tradeoff has inner and outside bounds. Client-server and locally installable apps, which are getting older, have lost a considerable amount of market share to web applications. It is now possible because of some special benefits that web applications provide. They can function just as well as locally installed software and are accessible through web browsers without the need for installation or upkeep. Due to the lack of resources required by enterprises to administer them locally, web applications have gained popularity more swiftly. Now that new technologies, standards, and APIs have been developed, it is possible to employ more information security safeguards. The following sections of this article go into greater detail about web apps, web-based biometrics, and the integration of biometric authentication in web applications. |
| format | Article |
| id | doaj-art-82b4fd736f974a3d843d8f8ddbacab91 |
| institution | Kabale University |
| issn | 2799-063X 2799-0648 |
| language | English |
| publishDate | 2023-06-01 |
| publisher | Northern Negros State College of Science and Technology (NONESCOST) |
| record_format | Article |
| series | International Research Journal of Science, Technology, Education, and Management |
| spelling | doaj-art-82b4fd736f974a3d843d8f8ddbacab912025-08-20T03:36:41ZengNorthern Negros State College of Science and Technology (NONESCOST)International Research Journal of Science, Technology, Education, and Management2799-063X2799-06482023-06-0132103116https://doi.org/10.5281/zenodo.8139747Integration biometrics in web application: Security for web appsWulandari Kusuma Herdanu0Rabab Alayham Abbas Helmi1Mariana Syamsudin2Management & Science University, MalaysiaManagement & Science University, MalaysiaPontianak State Polytechnic, IndonesiaTo evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by the biometric measurements' key generation rate are specified. Then, it is decided that there is a fundamental tradeoff between these two measurements. First, we investigate the case where a potential attacker has no side knowledge. For this situation, the privacy-security region which defines the tradeoff mentioned above is derived. In perfect privacy biometric security systems, common knowledge among random variables plays a significant role. The case where the adversary possesses side knowledge is then considered. In this scenario, the privacy-security tradeoff has inner and outside bounds. Client-server and locally installable apps, which are getting older, have lost a considerable amount of market share to web applications. It is now possible because of some special benefits that web applications provide. They can function just as well as locally installed software and are accessible through web browsers without the need for installation or upkeep. Due to the lack of resources required by enterprises to administer them locally, web applications have gained popularity more swiftly. Now that new technologies, standards, and APIs have been developed, it is possible to employ more information security safeguards. The following sections of this article go into greater detail about web apps, web-based biometrics, and the integration of biometric authentication in web applications.https://irjstem.com/wp-content/uploads/2023/07/IRJSTEM_V3N2_2023_P09.pdfbiometricssecurityweb apps |
| spellingShingle | Wulandari Kusuma Herdanu Rabab Alayham Abbas Helmi Mariana Syamsudin Integration biometrics in web application: Security for web apps International Research Journal of Science, Technology, Education, and Management biometrics security web apps |
| title | Integration biometrics in web application: Security for web apps |
| title_full | Integration biometrics in web application: Security for web apps |
| title_fullStr | Integration biometrics in web application: Security for web apps |
| title_full_unstemmed | Integration biometrics in web application: Security for web apps |
| title_short | Integration biometrics in web application: Security for web apps |
| title_sort | integration biometrics in web application security for web apps |
| topic | biometrics security web apps |
| url | https://irjstem.com/wp-content/uploads/2023/07/IRJSTEM_V3N2_2023_P09.pdf |
| work_keys_str_mv | AT wulandarikusumaherdanu integrationbiometricsinwebapplicationsecurityforwebapps AT rababalayhamabbashelmi integrationbiometricsinwebapplicationsecurityforwebapps AT marianasyamsudin integrationbiometricsinwebapplicationsecurityforwebapps |