The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2008 vol.6)
pp: 30-37
James L. Wayman , San Jose State University
Biometric technology—the automated recognition of individuals using biological and behavioral traits—can connect bodily persons to identity records to create a one-to-one correspondence between people and records, restricting people to one record or records to one person. They are a natural tool for identity management, but many suggest that biometric technologies invade privacy. The author addresses the controversies surrounding biometrics by looking more deeply into the basic assumptions made in biometric recognition. He discusses how biometric attributes can be used as verifiers and identifiers, and make suggestions about how people can regain control over how their identities are managed.
biometrics, fingerprints, hand geometry, iris recognition, personal identity, digital identity, privacy, identity management, ISO/IEC JTC1 SC37
James L. Wayman, "Biometrics in Identity Management Systems", IEEE Security & Privacy, vol.6, no. 2, pp. 30-37, March/April 2008, doi:10.1109/MSP.2008.28
1. S. Prabhakar, S. Pankanti, and A.K. Jain, "Biometric Recognition: Security and Privacy Concerns," IEEE Security &Privacy, vol. 1, no. 2, 2003, pp. 33–42.
2. A. Watson, "Biometrics: Easy to Steal, Hard to Regain Identity," Nature, vol. 449, 2007, p. 535.
3. "Harmonized Biometric Vocabulary," ISO/IEC JTC1 SC37, standing document 2, version 8, 2007.
4. R. Martin and J. Barresi, eds., Personal Identity, Blackwell, 2003.
5. H.W. Noonan, Personal Identity, 2nd ed., Routledge, 2003.
6. J. Pearsall, ed., Concise Oxford English Dictionary, Thumb Index Edition, 10th ed., Oxford Univ. Press, 2002.
7. G. Delsohn, "Audit Doubts Value of Welfare Fingerprinting," Sacramento Bee,3 Jan. 2003; 5781179p-6750807c.html.
8. D. Raphael and J. Young, Automated Personal Identification, SRI, 1974.
9. L. Wittgenstein, Tractatus Logico-Philosophicus, 2nd ed., Routledge, 2001.
10. H. Harreld, "Biometrics Points to Greater Security," Federal Computer Week,22 July 1999; /.
11. P.J. Windley, Digital Identity, O'Reilly Media, 2005.
12. Congressional Response Report: Accuracy of the Social Security Administration's Numident File, A-08-06-26100, Social Security Administration Office of the Inspector General, 2006; .
13. Under Secretary of Defense for Acquisition, Technology and Logistics, "Report of the Defense Science Board Task Force on Defense Biometrics," Mar. 2007; .
14. The Consideration of Data Security in a Computer Environment, tech. report G520-2169, IBM, 1970.
15. US Dept. of Health Education and Welfare, "Records, Computers and the Rights of Citizens: Report of the Secretary's Advisory Committee on Automated Personal Data Systems," July 1973;
16. S.D. Warren and L.D. Brandeis, "The Right to Privacy," Harvard Law Review, vol. 4, 1890, pp. 193–220; .
17. A. Westin, Privacy and Freedom, Atheneum Press, 1967.
18. C. Blomeke et al, "Bacterial Survivability &Transferability on Biometric Devices," Proc. 41st Ann. IEEE Int'l Carnahan Conf. Security Technology, 2007, pp. 80–84; .
19. Social Security Numbers: Government Benefits from SSN Use but Could Provide Better Safeguards, GAO-02-352, US General Accounting Office, 31 May 2002;
20. Identity Theft And Your Social Security Number, Social Security Administration publication no. 05-10064, Jan. 2006;
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool