System Maintenance:
There may be intermittent impact on performance while updates are in progress. We apologize for the inconvenience.
By Topic

Aspects of Computer Security, IEE Colloquium on

Date 9 Apr 1990

Filter Results

Displaying Results 1 - 6 of 6
  • Automatic identification of people: improving the performance of dynamic signature verification

    Publication Year: 1990 , Page(s): 4/1 - 4/5
    Cited by:  Patents (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (248 KB)  

    The problem of verifying the identity of people presenting to EDI or other electronic transactions terminals is becoming more important as the value manipulated by such systems and their use becomes more widespread. All techniques have their appropriate and overlapping application areas. However, the author concentrates on the use of writing-in particular the dynamics of the written signature. Dynamic signature verification (DSV) has many potential applications involving authorisation of transactions both in the professional back-office and public points of transaction. The written personal signature is already widely used as a legally recognised authority and its adoption for automatic verification requires no new behaviour by the user or for enforcement View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing and compliance of secure products and systems

    Publication Year: 1990 , Page(s): 5/1 - 5/3
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (160 KB)  

    Outlines the need for testing secure products and systems. Two schemes for evaluation are described, one in the US and the other in the UK. The need for more work in conformance testing of standards implementation is identified View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems integration in EFTPOS systems

    Publication Year: 1990 , Page(s): 6/1 - 6/4
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (180 KB)  

    The application of electronics to the mass payment industry-EFTPOS (electronic funds transfer at point of sale)-is a revolution that is well under way. A fragmented approach to security in EFTPOS systems is being undertaken, both within the UK and internationally. Examples of up front strategic planning are very few and have been swamped by the competitive pressures facing individual banks. Although adequate, there must be concern that current systems, particularly as terminal populations increase, may need to be improved to prevent either direct fraud or major exception management costs. The author discusses the current systems and then outlines future possibilities: cardholder verification, card security techniques, transaction authorisation, cryptography, data transfer options, electronic audit and terminal life cycle View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EDI security

    Publication Year: 1990 , Page(s): 1/1 - 1/3
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (156 KB)  

    The use of EDI (electronic data interchange) and the single European market will each have a tremendous impact on the ways in which companies conduct their business. There is a need to look at the security requirements for EDI systems to be used within the EC. A Community programme TEDIS (trade EDI systems), was established to address this issue, among others. The author identifies some of the security issues facing the use of the EDI in the EC and the activities underway to meet the challenge View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic purse

    Publication Year: 1990 , Page(s): 3/1 - 3/3
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    The concept of the electronic purse on an integrated circuit (IC) card has been talked about for some years. In this time little progress has been made in actually implementing such an instrument even though everybody agrees that it is a wonderful idea and creates float. The author establishes what is meant by an electronic purse and quotes three descriptions produced by the International Association for Microcircuit Cards in 1982. They are for three instruments-a wallet, a purse and a token, which have now become synonymous and can be described as a pre-paid service (a purse) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEE Colloquium on `Aspects of Computer Security' (Digest No.060)

    Publication Year: 1990
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (12 KB)  

    The following topics were dealt with: EDI security; personal identity verification using automatic face identification; electronic purses; dynamic signature verification; testing and compliance of secure systems; systems integration in EFTPOS systems; satellite data protection and subscription TV View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.