{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:13:57Z","timestamp":1740158037914,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T00:00:00Z","timestamp":1536105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12652-018-1023-9","type":"journal-article","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T05:53:58Z","timestamp":1536126838000},"page":"2883-2894","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Off-line enterprise rights management leveraging biometric key binding and secure hardware"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6315-4221","authenticated-orcid":false,"given":"Luigi","family":"Catuogno","sequence":"first","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Riccio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,5]]},"reference":[{"issue":"2","key":"1023_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s12652-010-0030-2","volume":"2","author":"AF Abate","year":"2011","unstructured":"Abate AF, De Marsico M, Riccio D, Tortora G (2011) MUBAI: multiagent biometrics for ambient intelligence. J Ambient Intell Hum Comput 2(2):81\u201389. \n                    https:\/\/doi.org\/10.1007\/s12652-010-0030-2","journal-title":"J Ambient Intell Hum Comput"},{"key":"1023_CR2","doi-asserted-by":"publisher","unstructured":"Abbadi IM, Alawneh M (2008) Preventing insider information leakage for enterprises. In: Second international conference on emerging security information, systems and technologies, Cap Esterel, pp 99\u2013106. \n                    https:\/\/doi.org\/10.1109\/SECURWARE.2008.14","DOI":"10.1109\/SECURWARE.2008.14"},{"key":"1023_CR3","unstructured":"Adobe Systems (2013) Adobe livecycle es4. \n                    http:\/\/www.adobe.com\/products\/livecycle.html\n                    \n                  . Accessed 20 Aug 2018"},{"key":"1023_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.jss.2014.11.050","volume":"101","author":"J Blasco","year":"2015","unstructured":"Blasco J, Tapiador JE, Peris-Lopez P, Suarez-Tangil G (2015) Hindering data theft with encrypted data trees. J Syst Softw 101:147\u2013158","journal-title":"J Syst Softw"},{"key":"1023_CR5","unstructured":"Blonder GE (1996) Graphical passwords. Lucent Technologies Inc, Murray Hill, US Patent no. 5559961"},{"issue":"1\u20132","key":"1023_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0164-1212(03)00004-9","volume":"71","author":"C Blundo","year":"2004","unstructured":"Blundo C, D\u2019Arco P, Santis AD, Galdi C (2004) H\n                    \n                      \n                    \n                    $${\\text{ yppocrates }}$$\n                    \n                      \n                        \n                          \n                          yppocrates\n                          \n                        \n                      \n                    \n                  : a new proactive password checker. J Syst Softw 71(1\u20132):163\u2013175","journal-title":"J Syst Softw"},{"issue":"6","key":"1023_CR7","doi-asserted-by":"publisher","first-page":"709","DOI":"10.3233\/JCS-150539","volume":"23","author":"PA Bonatti","year":"2015","unstructured":"Bonatti PA, Galdi C, Torres D (2015) Event-driven RBAC. J Comput Secur 23(6):709\u2013757. \n                    https:\/\/doi.org\/10.3233\/JCS-150539","journal-title":"J Comput Secur"},{"issue":"11","key":"1023_CR8","doi-asserted-by":"publisher","first-page":"3608","DOI":"10.1109\/TIP.2006.881945","volume":"15","author":"D Cai","year":"2006","unstructured":"Cai D, He X, Han J, Zhang HJ (2006) Orthogonal laplacianfaces for face recognition. IEEE Trans Image Process 15(11):3608\u20133614","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"1023_CR9","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s11227-013-0975-y","volume":"67","author":"A Castiglione","year":"2014","unstructured":"Castiglione A, Catuogno L, Del Sorbo A, Fiore U, Palmieri F (2014) A secure file sharing service for distributed computing environments. J Supercomput 67(3):691\u2013710. \n                    https:\/\/doi.org\/10.1007\/s11227-013-0975-y","journal-title":"J Supercomput"},{"key":"1023_CR10","doi-asserted-by":"publisher","unstructured":"Catuogno L, Galdi C (2010) On the security of a two-factor authentication scheme. In: Information security theory and practices. Security and privacy of pervasive systems and smart devices, 4th IFIP WG 11.2 international workshop, WISTP 2010, Passau, Germany, 12\u201314 April 2010, pp 245\u2013252. \n                    https:\/\/doi.org\/10.1007\/978-3-642-12368-9_19","DOI":"10.1007\/978-3-642-12368-9_19"},{"issue":"5","key":"1023_CR11","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s10207-014-0228-y","volume":"13","author":"L Catuogno","year":"2014","unstructured":"Catuogno L, Galdi C (2014a) Analysis of a two-factor graphical password scheme. Int J Inform Secur 13(5):421\u2013437","journal-title":"Int J Inform Secur"},{"issue":"6","key":"1023_CR12","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1007\/s12652-014-0248-5","volume":"5","author":"L Catuogno","year":"2014","unstructured":"Catuogno L, Galdi C (2014b) On user authentication by means of video events recognition. J Ambient Intell Hum Comput 5(6):909\u2013918","journal-title":"J Ambient Intell Hum Comput"},{"key":"1023_CR13","doi-asserted-by":"publisher","unstructured":"Catuogno L, Dmitrienko A, Eriksson K, Kuhlmann D, Ramunno G, Sadeghi AR, Schulz S, Schunter M, Winandy M, Zhan J (2009) Trusted virtual domains\u2014design, implementation and lessons learned. In: Trusted systems, first international conference, INTRUST 2009, Beijing, China, 17\u201319 Dec 2009, pp 156\u2013179. \n                    https:\/\/doi.org\/10.1007\/978-3-642-14597-1_10","DOI":"10.1007\/978-3-642-14597-1_10"},{"key":"1023_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jnca.2013.05.006","volume":"38","author":"L Catuogno","year":"2014","unstructured":"Catuogno L, L\u00f6hr H, Winandy M, Sadeghi AR (2014) A trusted versioning file system for passive mobile storage devices. J Netw Comput Appl 38:65\u201375","journal-title":"J Netw Comput Appl"},{"key":"1023_CR15","doi-asserted-by":"publisher","unstructured":"Catuogno L, Galdi C, Riccio D (2016) Flexible and robust enterprise right management. In: IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27\u201330, 2016, pp 1257\u20131262. \n                    https:\/\/doi.org\/10.1109\/ISCC.2016.7543909","DOI":"10.1109\/ISCC.2016.7543909"},{"issue":"4","key":"1023_CR16","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TDSC.2006.53","volume":"3","author":"A Ciaramella","year":"2006","unstructured":"Ciaramella A, D\u2019Arco P, De Santis A, Galdi C, Tagliaferri R (2006) Neural network techniques for proactive password checking. IEEE Trans Dependable Secure Comput 3(4):327\u2013339","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1023_CR17","unstructured":"EMC Corporation (2003) Emc documentum. \n                    http:\/\/www.emc.com\/enterprise-content-management\/documentum\/index.htm\n                    \n                  . Accessed 20 Aug 2018"},{"key":"1023_CR18","doi-asserted-by":"publisher","unstructured":"Gasmi Y, Sadeghi AR, Stewin P, Unger M, Winandy M, Husseiki R, St\u00fcble C (2008) Flexible and secure enterprise rights management based on trusted virtual domains. In: Proceedings of the 3rd ACM workshop on scalable trusted computing (STC '08). ACM, New York, NY, USA, pp 71\u201380. \n                    https:\/\/doi.org\/10.1145\/1456455.1456467","DOI":"10.1145\/1456455.1456467"},{"key":"1023_CR19","unstructured":"GlobalPlatform (2011) Tee system architecture v1.0. \n                    http:\/\/www.globalplatform.org\n                    \n                  , Accessed 9 Jan 2018"},{"issue":"4","key":"1023_CR20","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/0262-8856(88)90016-9","volume":"6","author":"A Goshtasby","year":"1988","unstructured":"Goshtasby A (1988) Image registration by local approximation methods. Image Vis Comput 6(4):255\u2013261","journal-title":"Image Vis Comput"},{"key":"1023_CR21","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.procs.2013.01.060","volume":"16","author":"M Grimm","year":"2013","unstructured":"Grimm M, Anderl R (2013) Intellectual property protection and secure knowledge management in collaborative systems engineering. Procedia Comput Sci 16:571\u2013580","journal-title":"Procedia Comput Sci"},{"key":"1023_CR22","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.cose.2013.08.012","volume":"41","author":"A Gupta","year":"2014","unstructured":"Gupta A, Kirkpatrick M, Bertino E (2014) A formal proximity model for rbac systems. Comput Secur 41:52\u201367. \n                    https:\/\/doi.org\/10.1016\/j.cose.2013.08.012","journal-title":"Comput Secur"},{"key":"1023_CR23","unstructured":"Haller N (1994) The S\/KEY one-time password system. Internet Engineering Task Force (IETF) RFC 1760, 1995. \n                    https:\/\/www.rfc-editor.org\/info\/rfc1760\n                    \n                  . Accessed 4 Sept 2018"},{"key":"1023_CR24","series-title":"Springer","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in cryptology\u2014ASIACRYPT 2001","author":"NJ Hopper","year":"2001","unstructured":"Hopper NJ, Blum M (2001) Secure human identification protocols. In: Boyd C (ed) Advances in cryptology\u2014ASIACRYPT 2001, vol 2248. Springer, Berlin, Heidelberg, pp 52\u201366. \n                    https:\/\/doi.org\/10.1007\/3-540-45682-1_4"},{"issue":"12","key":"1023_CR25","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A Jain","year":"2005","unstructured":"Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recogn 38(12):2270\u20132285","journal-title":"Pattern Recogn"},{"key":"1023_CR26","doi-asserted-by":"publisher","unstructured":"Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2017) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Hum Comput. \n                    https:\/\/doi.org\/10.1007\/s12652-017-0516-2","DOI":"10.1007\/s12652-017-0516-2"},{"issue":"2","key":"1023_CR27","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Crypt 38(2):237\u2013257. \n                    https:\/\/doi.org\/10.1007\/s10623-005-6343-z","journal-title":"Des Codes Crypt"},{"key":"1023_CR28","doi-asserted-by":"publisher","unstructured":"Kirkpatrick MS, Bertino E (2010) Enforcing spatial constraints for mobile RBAC systems. In: Proc. of the 15th ACM Symp. on access control models and technologies (SACMAT), pp 99\u2013108. \n                    https:\/\/doi.org\/10.1145\/1809842.1809860","DOI":"10.1145\/1809842.1809860"},{"key":"1023_CR29","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.comcom.2015.07.005","volume":"68","author":"F Li","year":"2015","unstructured":"Li F, Rahulamathavan Y, Conti M, Rajarajan M (2015) Robust access control framework for mobile cloud computing network. Comput Commun 68:61\u201372","journal-title":"Comput Commun"},{"key":"1023_CR30","first-page":"193","volume":"7","author":"P Maniatis","year":"2011","unstructured":"Maniatis P, Akhawe D, Fall KR, Shi E, Song D (2011) Do you know where your data are? secure data capsules for deployable data protection. HotOS 7:193\u2013205","journal-title":"HotOS"},{"key":"1023_CR31","unstructured":"Martinez AM (1998) The AR face database. CVC Technical Report24"},{"key":"1023_CR32","doi-asserted-by":"publisher","unstructured":"Matsumoto T (1996) Human-computer cryptography: an attempt. In: Proceedings of the 3rd ACM conference on computer and communications security (CCS '96). ACM, New York, NY, USA, pp 68\u201375. \n                    https:\/\/doi.org\/10.1145\/238168.238190","DOI":"10.1145\/238168.238190"},{"key":"1023_CR33","unstructured":"McDonald D, Atkinson RJ, Metz C (1995) One-time passwords in everything (OPIE): experiences with building and using strong authentication. USENIX UNIX Security Symposium, pp 177\u2013186"},{"key":"1023_CR34","unstructured":"Microsoft Corporation (2016) Azure information protection. \n                    https:\/\/azure.microsoft.com\/en-gb\/services\/information-protection\/\n                    \n                  . Accessed 20 Aug 2018"},{"key":"1023_CR35","series-title":"Springer","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-540-88693-8_37","volume-title":"Computer vision\u2013ECCV 2008","author":"S Milborrow","year":"2008","unstructured":"Milborrow S, Nicolls F (2008) Locating facial features with an extended active shape model. In: Forsyth D, Torr P, Zisserman A (eds) Computer vision\u2013ECCV 2008, vol 5305. Springer, Berlin, Heidelberg, pp 504\u2013513"},{"key":"1023_CR36","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/929380","author":"SW Park","year":"2015","unstructured":"Park SW, Lim J, Kim JN (2015) A secure storage system for sensitive data protection based on mobile virtualization. Int J Distrib Sens Netw. \n                    https:\/\/doi.org\/10.1155\/2015\/929380","journal-title":"Int J Distrib Sensor Netw"},{"key":"1023_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2011-3","volume":"1","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb C (2011) Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inform Secur 1:1\u201325. \n                    https:\/\/doi.org\/10.1186\/1687-417X-2011-3","journal-title":"EURASIP J Inform Secur"},{"key":"1023_CR38","doi-asserted-by":"publisher","unstructured":"Riccio D, Galdi C, Manzo R (2016) Biometric\/cryptographic keys binding based on function minimization. In: 12th International conference on signal-image technology & internet-based systems (SITIS), Naples, pp 144\u2013150. \n                    https:\/\/doi.org\/10.1109\/SITIS.2016.31","DOI":"10.1109\/SITIS.2016.31"},{"issue":"2","key":"1023_CR39","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38\u201347","journal-title":"Computer"},{"issue":"3","key":"1023_CR40","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1364\/JOSAA.4.000519","volume":"4","author":"L Sirovich","year":"1987","unstructured":"Sirovich L, Kirby M (1987) Low-dimensional procedure for the characterization of human faces. Josa a 4(3):519\u2013524","journal-title":"Josa a"},{"key":"1023_CR41","doi-asserted-by":"publisher","unstructured":"Suo X, Zhu Y, Owen GS (2005) Graphical passwords: a survey. In: 21st Annual Computer Security Applications Conference (ACSAC'05), Tucson, AZ, pp 463\u2013472. \n                    https:\/\/doi.org\/10.1109\/CSAC.2005.27","DOI":"10.1109\/CSAC.2005.27"},{"key":"1023_CR42","doi-asserted-by":"publisher","unstructured":"Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Proceedings of the Computer Society Conference on Computer Vision and Pattern Recognition. IEEE, Maui, HI, USA, pp 586\u2013591.\n                    https:\/\/doi.org\/10.1109\/CVPR.1991.139758","DOI":"10.1109\/CVPR.1991.139758"},{"key":"1023_CR43","doi-asserted-by":"publisher","unstructured":"Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: Proceedings of the 2010 Second International Symposium on Data, Privacy, and E-Commerce, IEEE Computer Society, Washington, DC, USA, ISDPE \u201910, pp 45\u201349. \n                    https:\/\/doi.org\/10.1109\/ISDPE.2010.13\n                    \n                  ,","DOI":"10.1109\/ISDPE.2010.13"},{"key":"1023_CR44","doi-asserted-by":"publisher","unstructured":"Xu D, Chen J, Liu Q (2018) Provably secure anonymous three-factor authentication scheme for multi-server environments. J Ambient Intell Hum Comput. \n                    https:\/\/doi.org\/10.1007\/s12652-018-0710-x","DOI":"10.1007\/s12652-018-0710-x"},{"issue":"4","key":"1023_CR45","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1145\/954339.954342","volume":"35","author":"W Zhao","year":"2003","unstructured":"Zhao W, Chellappa R, Phillips PJ, Rosenfeld A (2003) Face recognition: A literature survey. ACM Computi Surv (CSUR) 35(4):399\u2013458","journal-title":"ACM Computi Surv (CSUR)"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-1023-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-1023-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-1023-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T19:17:52Z","timestamp":1567624672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-1023-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,5]]},"references-count":45,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1023"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-1023-9","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2018,9,5]]},"assertion":[{"value":"30 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}