iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-0-387-73003-5_291
Tamper-proof Operating System | SpringerLink
Skip to main content

Tamper-proof Operating System

  • Reference work entry
Encyclopedia of Biometrics
  • 92 Accesses

Synonyms

Malicious-code-free Operating System; Secure Biometric Token Operating System

Definition

Operating System with a robust design, as not to allow the execution of malicious code. Access to internal data and procedures are never allowed without the proper authorization. In its more strict implementations, this Operating System will have attack detection mechanisms. If the attack is of a certain level, the Operating System may even delete all its code and/or data.

Introduction

The handling of sensible data in Information Systems is currently very usual. Which data is to be considered sensible is up to the application, but at least we can consider those such as personal data, financial data as well as access control data. Actors dealing with such Information System (clients/citizens, service providers, integrators, etc.) have to be aware of the security level achieved within the system.

Although this is a very important issue in any system, when biometric information is handled it...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rejman-Greene: Security considerations in the use of biometric devices. Information Security Technical Report 3, 77–80 (1998)

    Google Scholar 

  2. Ratha, N.K., Connell, J.H.B.R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  3. Roberts, C.: Biometric attack vectors and defences. Computers & Security 26(1), 14–25 (2007)

    Article  Google Scholar 

  4. Criteria, C.: Biometric evaluation methodology supplement (bem). Common Methodology for Information Technology Security Evaluation - http://www.cesg.gov.uk/site/ast/biometrics/media/BEM_10.pdf (2002)

  5. Matthews, A.: Side-channel attacks on smartcards. Network Security 2006(12), 18–20 (2006)

    Article  Google Scholar 

  6. Sanchez-Reillo, R.: Achieving Security in Integrated Circuit Card Applications: Reality or Desire? IEEE Aerospace and Electronic Systems Magazine 17, 4–8 (2002)

    Article  Google Scholar 

  7. Sanchez-Reillo, R., Gonzalez-Marcos, A.: Access control system with hand geometry verification and smart cards. Aerospace and Electronic Systems Magazine, IEEE 15(2), 45–48. DOI 10.1109/62.825671(2000)

    Article  Google Scholar 

  8. Sanchez-Reillo, R.: Smart card information and operations using biometrics. Aerospace and Electronic Systems Magazine, IEEE 16(4), 3–6 DOI 10.1109/62.918014(2001)

    Article  Google Scholar 

  9. ISO ∕ IEC_JTC1 ∕ SC17: ISO/IEC 7816 Parts 3, 4, 8, 9 & 11 (1987–2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this entry

Cite this entry

Sanchez-Reillo, R. (2009). Tamper-proof Operating System. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_291

Download citation

Publish with us

Policies and ethics