{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:24:58Z","timestamp":1725567898637},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221463"},{"type":"electronic","value":"9783540259480"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25948-0_98","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T17:03:58Z","timestamp":1287939838000},"page":"724-730","source":"Crossref","is-referenced-by-count":7,"title":["Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems"],"prefix":"10.1007","author":[{"given":"Christos K.","family":"Dimitriadis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Despina","family":"Polemi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"unstructured":"Wayman, J.L., Mansfield, A.J.: Best practices of testing and reporting performance of biometric devices (2002), http:\/\/www.cesg.gov.uk\/site\/ast\/biometrics\/media\/BestPractice.pdf","key":"98_CR1"},{"unstructured":"Certified Information Systems Auditor Manual. Information Systems Audit and Control Association (2003)","key":"98_CR2"},{"key":"98_CR3","doi-asserted-by":"crossref","DOI":"10.1201\/b12444","volume-title":"Information Security Risk Analysis","author":"T.R. Peltier","year":"2001","unstructured":"Peltier, T.R.: Information Security Risk Analysis. CRC Press, LLC (2001)"},{"key":"98_CR4","volume-title":"Security Architecture","author":"M. King","year":"2001","unstructured":"King, M., Dalton, C., Osmanoglu, T.: Security Architecture. RSA press, USA (2001)"},{"unstructured":"Operationally Critical Threat, Asset, and Vulnerability Evaluation method (OCTAVE) http:\/\/www.cert.org\/octave","key":"98_CR5"},{"unstructured":"CCTA Risk Analysis and Management Method (CRAMM), http:\/\/www.cramm.com","key":"98_CR6"},{"unstructured":"Consultative, Objective and Bi-functional Risk Analysis (COBRA), http:\/\/www.security-risk-analysis.com\/introcob.htm","key":"98_CR7"},{"unstructured":"Multi-Criteria Analysis manual, http:\/\/www.odpm.gov.uk","key":"98_CR8"},{"doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial fingers on fingerprint systems. In: Proceedings of SPIE, Vol. 4677, Yokohama (2002)","key":"98_CR9","DOI":"10.1117\/12.462719"},{"key":"98_CR10","first-page":"289","volume-title":"IFIP TC8\/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications","author":"T. Putte Van der","year":"2000","unstructured":"Van der Putte, T., Keuning, J.: Biometrical fingerprint recognition \u2013 don\u2019t get your fingers burned. In: IFIP TC8\/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, pp. 289\u2013303. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"98_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"ICEIS\u2013WOSIS","author":"C. Dimitriadis","year":"2004","unstructured":"Dimitriadis, C., Polemi, D.: Risk analysis of biometric systems. In: ICEIS\u2013WOSIS. LNCS, Springer, Heidelberg (2004) (to appear)"},{"key":"98_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"unstructured":"Kocher, P., Jaffe, J., Jun, B.: Introduction to Differential Power Analysis and Related Attacks (1998), http:\/\/www.cryptography.com\/technology\/dpa\/DPATechnicalInfo.PDF","key":"98_CR13"},{"unstructured":"IST-1999-20078 Business environment of biometrics involved in e-commerce - BEE (2002), http:\/\/expertnet.net.gr\/bee","key":"98_CR14"},{"unstructured":"IST-2002-001766 Biometrics and Security \u2013 BIOSEC, http:\/\/biosec.tid.es","key":"98_CR15"},{"issue":"12","key":"98_CR16","doi-asserted-by":"publisher","first-page":"2727","DOI":"10.1016\/S0031-3203(01)00247-3","volume":"35","author":"R.M. Bolle","year":"2002","unstructured":"Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition\u00a035(12), 2727\u20132738 (2002)","journal-title":"Pattern Recognition"},{"unstructured":"Smith, R.: The biometric Dilemma. Secure Computing (2002)","key":"98_CR17"},{"unstructured":"GSRT \u2013 Access Control System for Stadiums base on Biometrics - BIOATHLETIC","key":"98_CR18"},{"unstructured":"ISO\/IEC 17799 IT \u2013 Code of practice for information security management","key":"98_CR19"},{"unstructured":"Information Systems Audit and Control Association: COBIT: Control Objectives for Information and related Technology","key":"98_CR20"},{"unstructured":"Know your enemy series. The Honeynet project, http:\/\/www.honeynet.org","key":"98_CR21"},{"unstructured":"ANSI X9.84: Biometric Information Management and Security","key":"98_CR22"}],"container-title":["Lecture Notes in Computer Science","Biometric Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25948-0_98.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:37Z","timestamp":1605761977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25948-0_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221463","9783540259480"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25948-0_98","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}