Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1999)
PKI options for next-generation security
(1998)
Appendix: biometric information sources
(1998)
Self-contained fingerprint IDs forgo PCs, networks
(1999)
Security becomes a priority. Compaq, Dell, others adding security hardware to PCs
(1997)
Lesson 104: public key cryptography
J. Ware, Amir Hartman, Nulu Roldan, J. Gebauer, M. Roldan (1998)
The Search for Digital Excellence
(1997)
Certifying your Internet identity
Biometric Consortium www.biometrics.org is the US government's biometrics site
(1999)
Digital certificates grow up
(1998)
Not everybody's HA-API
H. Meyer (1999)
Abstract of recent article and literature: Passwords could be past tense by 2002Computers & Security, 18
(1998)
Biometrics: all the way or not at all; implementing new security technologies
com contains biometric news and consulting and offers information free or by subscription. International Computer Security Association www.ncsa.com/ contains information on security and cryptography
(1998)
New options in biometric identification
(1998)
A program that never forgets a face
(1999)
Arming the network with digital IDS
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM's Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations.
Library Hi Tech – Emerald Publishing
Published: Mar 1, 2000
Keywords: Electronic data interchange; Biometrics
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.