Encyclopedia of Biometrics

2009 Edition
| Editors: Stan Z. Li, Anil Jain

Tamper-proof Operating System

Reference work entry
DOI: https://doi.org/10.1007/978-0-387-73003-5_291
  • 70 Downloads

Synonyms

Definition

Operating System with a robust design, as not to allow the execution of malicious code. Access to internal data and procedures are never allowed without the proper authorization. In its more strict implementations, this Operating System will have attack detection mechanisms. If the attack is of a certain level, the Operating System may even delete all its code and/or data.

Introduction

The handling of sensible data in Information Systems is currently very usual. Which data is to be considered sensible is up to the application, but at least we can consider those such as personal data, financial data as well as access control data. Actors dealing with such Information System (clients/citizens, service providers, integrators, etc.) have to be aware of the security level achieved within the system.

Although this is a very important issue in any system, when biometric information is handled it...

This is a preview of subscription content, log in to check access.

References

  1. 1.
    Rejman-Greene: Security considerations in the use of biometric devices. Information Security Technical Report 3, 77–80 (1998)Google Scholar
  2. 2.
    Ratha, N.K., Connell, J.H.B.R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)CrossRefGoogle Scholar
  3. 3.
    Roberts, C.: Biometric attack vectors and defences. Computers & Security 26(1), 14–25 (2007)CrossRefGoogle Scholar
  4. 4.
    Criteria, C.: Biometric evaluation methodology supplement (bem). Common Methodology for Information Technology Security Evaluation - http://www.cesg.gov.uk/site/ast/biometrics/media/BEM_10.pdf (2002)
  5. 5.
    Matthews, A.: Side-channel attacks on smartcards. Network Security 2006(12), 18–20 (2006)CrossRefGoogle Scholar
  6. 6.
    Sanchez-Reillo, R.: Achieving Security in Integrated Circuit Card Applications: Reality or Desire? IEEE Aerospace and Electronic Systems Magazine 17, 4–8 (2002)CrossRefGoogle Scholar
  7. 7.
    Sanchez-Reillo, R., Gonzalez-Marcos, A.: Access control system with hand geometry verification and smart cards. Aerospace and Electronic Systems Magazine, IEEE 15(2), 45–48. DOI 10.1109/62.825671(2000)CrossRefGoogle Scholar
  8. 8.
    Sanchez-Reillo, R.: Smart card information and operations using biometrics. Aerospace and Electronic Systems Magazine, IEEE 16(4), 3–6 DOI 10.1109/62.918014(2001)CrossRefGoogle Scholar
  9. 9.
    ISO ∕ IEC_JTC1 ∕ SC17: ISO/IEC 7816 Parts 3, 4, 8, 9 & 11 (1987–2005)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.University Carlos III of MadridLeganes (Madrid)Spain