SlideShare a Scribd company logo
1 of 19
FP7 Integrated Project TURBINE (TrUsted Revocable Biometric IdeNtitiEs)
CryptoBiometrics for Enhanced Trusted Identity
Management: Dreams & Reality
Increase security trust on secure areas
Odysseas Spyroglou,
3D SA General Aviation Applications, GR
TURBINE Final Workshop, 17-18 January 2011
Security & Perception of Security
What really is security ?
Physical Security vs. Cyber Security?
Perception of security
TURBINE Final Workshop, 17-18 January 2011
IdM & Security Trust
Identification Management : a means to security
Biometrics : a tool (?) for better IdM
IdM + Biometrics = Increased Security (and perception)
Increased Security Trust
TURBINE Final Workshop, 17-18 January 2011
Secure Areas & Airports
• Importance of security greatly increased after 9/11
• What is a secure area ?
• Critical Infrastructures: assets that are essential for the functioning
of a society and economy (hospitals, gov buildings, airports)
– European Programme for Critical Infrastructure Protection
(EPCIP) EU COM(2006) 786 final
• Airport / aviation security
– Regulation (EC) No 300/2008 on common rules in the field of
civil aviation security
– Commission Regulation (EU) No 185/2010 laying down detailed
measures for the implementation of the common basic
standards on aviation security
TURBINE Final Workshop, 17-18 January 2011
Zones and Levels of Trust
Security zone Level of trust
Maneuvering area very high
Air traffic control very high
Airport ramp high
Departures Terminal high
Arrivals Terminal medium
Customs medium
Access Level Level(s) of trust
Full Access very high + high + medium
Full Access except for maneuvering area &
air traffic control
high + medium
Airport ramp high
Departures and Arrivals Terminals high + medium
Arrivals Terminal medium
Customs medium
TURBINE Final Workshop, 17-18 January 2011
The case of the Thessaloniki Airport
0
200.000
400.000
600.000
800.000
1.000.000
1.200.000
1.400.000
1.600.000
1.800.000
PASSENGER DOMESTIC MOVEMENT
PAX ARRIVALS PAX DEPARTURES
0
500,000
1,000,000
1,500,000
2,000,000
2,500,000
3,000,000
PASSENGER INTERNATIONAL MOVEMENT
PAX ARRIVALS
TURBINE Final Workshop, 17-18 January 2011
Olympic Airways Cargo
The Thessaloniki Airport Demonstrator
TURBINE Final Workshop, 17-18 January 2011
Demonstrator applications
Pseudo Identity (User holds a card)
Staff Member Access to Security Zones
– multiple access rights
Secure Access Control (no smartcard for user)
Staff Member Access to Cargo Facility
– secure access control
TURBINE Final Workshop, 17-18 January 2011
Some data from the Trial at Thessaloniki
Airport
Airport Demonstrator
• Participants: 30 Volunteers from 3DSA, Olympic
Airways and HCAA
• One Enrolment Office – 4 trained screeners
• 3 Access Control Points for PI
• 1 Access Control Point for SAC
• 1,5 month of field trials
• Very Positive results
TURBINE Final Workshop, 17-18 January 2011
Demonstrator Functionalities
The functionalities examined by the demonstrator
included the following:
1. Enrolment and verification
2. Duplicate enrolment checks, e.g.: a user can not enroll multiple
times to the same service.
4. Revocation and re-enrolment, e.g.: a user revokes a pseudo-
identity and requests a new enrolment to the same service.
5. Watch lists
TURBINE Final Workshop, 17-18 January 2011
Inform Concent & Data Privacy
• Extensive work and support of the project to the DPA
• Letter: Accompanying Letter to HDPA
• Information Note: to explain the project and the demonstrator
• Description of the organizational and technical security
measures to ensure privacy and protection of sensitive data
• Controller – Processor Agreement between 3DSA and the rest of
the project Partners that would be able to access the data
• Description of Confidentiality Obligation
• Employee Consent Form
• HPDA Form 1 & Appendix 1 & 2 regarding Notification of
keeping sensitive data
• Continuous support and training to participants
TURBINE Final Workshop, 17-18 January 2011
Secure Access Control
• The “Secure Access Control” protocol is an identification protocol
• Application:
Physical access control to security zones, e.g. an airport runway
• A group of users is enrolled for runway access
• During enrollment, each member of the group presents his or her
fingerprint
• For access request:
– a user presents his fingerprint
– the fresh fingerprint is cross-compared with those
stored in a local database in the terminal
– in case of success, the claimant is granted access
– in case of failure to identify, access is denied
TURBINE Final Workshop, 17-18 January 2011
Operational Scenarios
1. How easy is the installation of the system?
2. How easy was the administration of the system (enrollments,
revocations)?
3. The rate of False Acceptances and False Rejections.
4. Some operational scenarios that are important:
• Lost Card. Intrusion attempt using a lost card
• Security leak. Attempt of a registered owner to override his rights.
User tries to access an area where he has no access rights.
• Change of Access Rights to a Group: The rights of some users are
revoked and new users are added.
The system operated smoothly to all the above scenarios.
TURBINE Final Workshop, 17-18 January 2011
Questions to the participants
• Did you find the system easy to use (1 difficult – 5 very easy)?
• Did you find the system quick and responsive ?
• Did you find that the system was usually mistaken ?
• Were you feeling comfortable using it or not ?
• Were you feeling that your privacy was at risk ?
• Do you consider privacy aspects of the processing of your biometric data
important ?
• Do you consider it important that biometric data are used in an application
in a protected way (1 not important – 5 very important)?
• Would you agree on the operational use of the system in security
applications (e.g. Access Control) (1 do not agree – 5 Agree)?
• Which one you consider the two most important aspects of the TURBINE
system? A. Privacy B. Technology C. Ease of Use D.Security
• What other applications you believe the system would be useful in?
TURBINE Final Workshop, 17-18 January 2011
Most important aspect of TURBINE
TURBINE Final Workshop, 17-18 January 2011
Refuses to use the system
TURBINE Final Workshop, 17-18 January 2011
Refuses to use the system
TURBINE Final Workshop, 17-18 January 2011
Conclusion
• A successful demonstrator with positive
comments
• Real interest especially from security operators
and screeners
• Importance of Privacy and Data protection
TURBINE Final Workshop, 17-18 January 2011
Thank you
• For more info :
Odysseas Spyroglou
R & D Advisor
3D General Aviation Applications S.A.
2 Skiathou st., 546 46 Thessaloniki Greece
Tel.: +30 2310 413585
email: ospyroglou@3dsa.gr, ospyroglou@gmail.com

More Related Content

Similar to Increase Security trust on secure areas (TURBINE Workshop, Jan 2011)

SECAP Security Management System
SECAP Security Management SystemSECAP Security Management System
SECAP Security Management SystemIT-factory
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015Marco Moreschini
 
EuroPriSe and ISDP10003 2015 -
EuroPriSe and ISDP10003  2015 - EuroPriSe and ISDP10003  2015 -
EuroPriSe and ISDP10003 2015 - Marco Moreschini
 
Protection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsProtection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsSeungjoo Kim
 
From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosMichel de Goede
 
Video analytics for public safety solutions - Hitachi
Video analytics for public safety solutions - HitachiVideo analytics for public safety solutions - Hitachi
Video analytics for public safety solutions - HitachiIbrahim Al-Hudhaif
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptPawachMetharattanara
 
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali Mirchandani
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali MirchandaniSECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali Mirchandani
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali MirchandaniALIAS Network
 
USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015Andreas Drakos
 
passportautomationsystem-190121120138 - Copy.pdf
passportautomationsystem-190121120138 - Copy.pdfpassportautomationsystem-190121120138 - Copy.pdf
passportautomationsystem-190121120138 - Copy.pdfpsundarau
 
Passport automation system
Passport automation systemPassport automation system
Passport automation systemKoppula Sheryl
 
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto Splunk
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveDawn Nash Pfeiffer
 
The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...
The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...
The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...Amon Olimov
 
Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODMichel de Goede
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Security Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering PackSecurity Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering PackAmy Slater
 

Similar to Increase Security trust on secure areas (TURBINE Workshop, Jan 2011) (20)

SECAP Security Management System
SECAP Security Management SystemSECAP Security Management System
SECAP Security Management System
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015
 
EuroPriSe and ISDP10003 2015 -
EuroPriSe and ISDP10003  2015 - EuroPriSe and ISDP10003  2015 -
EuroPriSe and ISDP10003 2015 -
 
Protection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsProtection Profile for E-Voting Systems
Protection Profile for E-Voting Systems
 
Operando @ Cyber camp 2015
Operando @ Cyber camp 2015Operando @ Cyber camp 2015
Operando @ Cyber camp 2015
 
From reactive to proactive mobile scenarios
From reactive to proactive mobile scenariosFrom reactive to proactive mobile scenarios
From reactive to proactive mobile scenarios
 
Video analytics for public safety solutions - Hitachi
Video analytics for public safety solutions - HitachiVideo analytics for public safety solutions - Hitachi
Video analytics for public safety solutions - Hitachi
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali Mirchandani
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali MirchandaniSECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali Mirchandani
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali Mirchandani
 
USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015USEMP Project Presentation ICT 2015
USEMP Project Presentation ICT 2015
 
passportautomationsystem-190121120138 - Copy.pdf
passportautomationsystem-190121120138 - Copy.pdfpassportautomationsystem-190121120138 - Copy.pdf
passportautomationsystem-190121120138 - Copy.pdf
 
Passport automation system
Passport automation systemPassport automation system
Passport automation system
 
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...
The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...
The Smart Utility Monitoring System for Industrial Safety and Enhancement on ...
 
Summary of the Workshop: e-tools and their implementation in the field of Occ...
Summary of the Workshop: e-tools and their implementation in the field of Occ...Summary of the Workshop: e-tools and their implementation in the field of Occ...
Summary of the Workshop: e-tools and their implementation in the field of Occ...
 
Enabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYODEnabling the energy transition in times of cloud, apps and BYOD
Enabling the energy transition in times of cloud, apps and BYOD
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Security Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering PackSecurity Access Control Requirements Gathering Pack
Security Access Control Requirements Gathering Pack
 

More from Odysseas Spyroglou

3D General Aviation Applications SA (Company Profile)
3D General Aviation Applications SA (Company Profile)3D General Aviation Applications SA (Company Profile)
3D General Aviation Applications SA (Company Profile)Odysseas Spyroglou
 
Build your Horizon 2020 profile
Build your Horizon 2020 profileBuild your Horizon 2020 profile
Build your Horizon 2020 profileOdysseas Spyroglou
 
Building a consortium & budget in Horizon 2020
Building a consortium & budget in Horizon 2020Building a consortium & budget in Horizon 2020
Building a consortium & budget in Horizon 2020Odysseas Spyroglou
 
An introduction to IPR for Horizon 2020
An introduction to IPR for Horizon 2020An introduction to IPR for Horizon 2020
An introduction to IPR for Horizon 2020Odysseas Spyroglou
 
Agroalert: Early Warning for extreme weather Phenomena
Agroalert: Early Warning for extreme weather PhenomenaAgroalert: Early Warning for extreme weather Phenomena
Agroalert: Early Warning for extreme weather PhenomenaOdysseas Spyroglou
 
DOTSOFT Archiving, Analytics & more
DOTSOFT Archiving, Analytics & moreDOTSOFT Archiving, Analytics & more
DOTSOFT Archiving, Analytics & moreOdysseas Spyroglou
 
Web Summit 2014, People's Stage
Web Summit 2014, People's StageWeb Summit 2014, People's Stage
Web Summit 2014, People's StageOdysseas Spyroglou
 
A Marketing Engagement Tool through Gamification (Questment.com)
A Marketing Engagement Tool through Gamification (Questment.com)A Marketing Engagement Tool through Gamification (Questment.com)
A Marketing Engagement Tool through Gamification (Questment.com)Odysseas Spyroglou
 
Social media in crisis management
Social media in crisis managementSocial media in crisis management
Social media in crisis managementOdysseas Spyroglou
 
Pursuing R&D projects and business opportunities in EU
Pursuing R&D projects and business opportunities in EUPursuing R&D projects and business opportunities in EU
Pursuing R&D projects and business opportunities in EUOdysseas Spyroglou
 

More from Odysseas Spyroglou (18)

3D General Aviation Applications SA (Company Profile)
3D General Aviation Applications SA (Company Profile)3D General Aviation Applications SA (Company Profile)
3D General Aviation Applications SA (Company Profile)
 
Build your Horizon 2020 profile
Build your Horizon 2020 profileBuild your Horizon 2020 profile
Build your Horizon 2020 profile
 
Building a consortium & budget in Horizon 2020
Building a consortium & budget in Horizon 2020Building a consortium & budget in Horizon 2020
Building a consortium & budget in Horizon 2020
 
An introduction to IPR for Horizon 2020
An introduction to IPR for Horizon 2020An introduction to IPR for Horizon 2020
An introduction to IPR for Horizon 2020
 
Online tools for horizon 2020
Online tools for horizon 2020Online tools for horizon 2020
Online tools for horizon 2020
 
Agroalert: Early Warning for extreme weather Phenomena
Agroalert: Early Warning for extreme weather PhenomenaAgroalert: Early Warning for extreme weather Phenomena
Agroalert: Early Warning for extreme weather Phenomena
 
MyCultureTrip
MyCultureTripMyCultureTrip
MyCultureTrip
 
DOTSOFT Archiving, Analytics & more
DOTSOFT Archiving, Analytics & moreDOTSOFT Archiving, Analytics & more
DOTSOFT Archiving, Analytics & more
 
PERICLES Project DE21014
PERICLES Project DE21014PERICLES Project DE21014
PERICLES Project DE21014
 
Blogforever (DE2014)
Blogforever (DE2014)Blogforever (DE2014)
Blogforever (DE2014)
 
Startups & Entrepreneurship
Startups & EntrepreneurshipStartups & Entrepreneurship
Startups & Entrepreneurship
 
Web Summit 2014, People's Stage
Web Summit 2014, People's StageWeb Summit 2014, People's Stage
Web Summit 2014, People's Stage
 
Dotsoft's tech stack
Dotsoft's tech stackDotsoft's tech stack
Dotsoft's tech stack
 
Dotsoft in a Nutshell
Dotsoft in a NutshellDotsoft in a Nutshell
Dotsoft in a Nutshell
 
Questment
QuestmentQuestment
Questment
 
A Marketing Engagement Tool through Gamification (Questment.com)
A Marketing Engagement Tool through Gamification (Questment.com)A Marketing Engagement Tool through Gamification (Questment.com)
A Marketing Engagement Tool through Gamification (Questment.com)
 
Social media in crisis management
Social media in crisis managementSocial media in crisis management
Social media in crisis management
 
Pursuing R&D projects and business opportunities in EU
Pursuing R&D projects and business opportunities in EUPursuing R&D projects and business opportunities in EU
Pursuing R&D projects and business opportunities in EU
 

Recently uploaded

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfWadeK3
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 

Recently uploaded (20)

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 

Increase Security trust on secure areas (TURBINE Workshop, Jan 2011)

  • 1. FP7 Integrated Project TURBINE (TrUsted Revocable Biometric IdeNtitiEs) CryptoBiometrics for Enhanced Trusted Identity Management: Dreams & Reality Increase security trust on secure areas Odysseas Spyroglou, 3D SA General Aviation Applications, GR
  • 2. TURBINE Final Workshop, 17-18 January 2011 Security & Perception of Security What really is security ? Physical Security vs. Cyber Security? Perception of security
  • 3. TURBINE Final Workshop, 17-18 January 2011 IdM & Security Trust Identification Management : a means to security Biometrics : a tool (?) for better IdM IdM + Biometrics = Increased Security (and perception) Increased Security Trust
  • 4. TURBINE Final Workshop, 17-18 January 2011 Secure Areas & Airports • Importance of security greatly increased after 9/11 • What is a secure area ? • Critical Infrastructures: assets that are essential for the functioning of a society and economy (hospitals, gov buildings, airports) – European Programme for Critical Infrastructure Protection (EPCIP) EU COM(2006) 786 final • Airport / aviation security – Regulation (EC) No 300/2008 on common rules in the field of civil aviation security – Commission Regulation (EU) No 185/2010 laying down detailed measures for the implementation of the common basic standards on aviation security
  • 5. TURBINE Final Workshop, 17-18 January 2011 Zones and Levels of Trust Security zone Level of trust Maneuvering area very high Air traffic control very high Airport ramp high Departures Terminal high Arrivals Terminal medium Customs medium Access Level Level(s) of trust Full Access very high + high + medium Full Access except for maneuvering area & air traffic control high + medium Airport ramp high Departures and Arrivals Terminals high + medium Arrivals Terminal medium Customs medium
  • 6. TURBINE Final Workshop, 17-18 January 2011 The case of the Thessaloniki Airport 0 200.000 400.000 600.000 800.000 1.000.000 1.200.000 1.400.000 1.600.000 1.800.000 PASSENGER DOMESTIC MOVEMENT PAX ARRIVALS PAX DEPARTURES 0 500,000 1,000,000 1,500,000 2,000,000 2,500,000 3,000,000 PASSENGER INTERNATIONAL MOVEMENT PAX ARRIVALS
  • 7. TURBINE Final Workshop, 17-18 January 2011 Olympic Airways Cargo The Thessaloniki Airport Demonstrator
  • 8. TURBINE Final Workshop, 17-18 January 2011 Demonstrator applications Pseudo Identity (User holds a card) Staff Member Access to Security Zones – multiple access rights Secure Access Control (no smartcard for user) Staff Member Access to Cargo Facility – secure access control
  • 9. TURBINE Final Workshop, 17-18 January 2011 Some data from the Trial at Thessaloniki Airport Airport Demonstrator • Participants: 30 Volunteers from 3DSA, Olympic Airways and HCAA • One Enrolment Office – 4 trained screeners • 3 Access Control Points for PI • 1 Access Control Point for SAC • 1,5 month of field trials • Very Positive results
  • 10. TURBINE Final Workshop, 17-18 January 2011 Demonstrator Functionalities The functionalities examined by the demonstrator included the following: 1. Enrolment and verification 2. Duplicate enrolment checks, e.g.: a user can not enroll multiple times to the same service. 4. Revocation and re-enrolment, e.g.: a user revokes a pseudo- identity and requests a new enrolment to the same service. 5. Watch lists
  • 11. TURBINE Final Workshop, 17-18 January 2011 Inform Concent & Data Privacy • Extensive work and support of the project to the DPA • Letter: Accompanying Letter to HDPA • Information Note: to explain the project and the demonstrator • Description of the organizational and technical security measures to ensure privacy and protection of sensitive data • Controller – Processor Agreement between 3DSA and the rest of the project Partners that would be able to access the data • Description of Confidentiality Obligation • Employee Consent Form • HPDA Form 1 & Appendix 1 & 2 regarding Notification of keeping sensitive data • Continuous support and training to participants
  • 12. TURBINE Final Workshop, 17-18 January 2011 Secure Access Control • The “Secure Access Control” protocol is an identification protocol • Application: Physical access control to security zones, e.g. an airport runway • A group of users is enrolled for runway access • During enrollment, each member of the group presents his or her fingerprint • For access request: – a user presents his fingerprint – the fresh fingerprint is cross-compared with those stored in a local database in the terminal – in case of success, the claimant is granted access – in case of failure to identify, access is denied
  • 13. TURBINE Final Workshop, 17-18 January 2011 Operational Scenarios 1. How easy is the installation of the system? 2. How easy was the administration of the system (enrollments, revocations)? 3. The rate of False Acceptances and False Rejections. 4. Some operational scenarios that are important: • Lost Card. Intrusion attempt using a lost card • Security leak. Attempt of a registered owner to override his rights. User tries to access an area where he has no access rights. • Change of Access Rights to a Group: The rights of some users are revoked and new users are added. The system operated smoothly to all the above scenarios.
  • 14. TURBINE Final Workshop, 17-18 January 2011 Questions to the participants • Did you find the system easy to use (1 difficult – 5 very easy)? • Did you find the system quick and responsive ? • Did you find that the system was usually mistaken ? • Were you feeling comfortable using it or not ? • Were you feeling that your privacy was at risk ? • Do you consider privacy aspects of the processing of your biometric data important ? • Do you consider it important that biometric data are used in an application in a protected way (1 not important – 5 very important)? • Would you agree on the operational use of the system in security applications (e.g. Access Control) (1 do not agree – 5 Agree)? • Which one you consider the two most important aspects of the TURBINE system? A. Privacy B. Technology C. Ease of Use D.Security • What other applications you believe the system would be useful in?
  • 15. TURBINE Final Workshop, 17-18 January 2011 Most important aspect of TURBINE
  • 16. TURBINE Final Workshop, 17-18 January 2011 Refuses to use the system
  • 17. TURBINE Final Workshop, 17-18 January 2011 Refuses to use the system
  • 18. TURBINE Final Workshop, 17-18 January 2011 Conclusion • A successful demonstrator with positive comments • Real interest especially from security operators and screeners • Importance of Privacy and Data protection
  • 19. TURBINE Final Workshop, 17-18 January 2011 Thank you • For more info : Odysseas Spyroglou R & D Advisor 3D General Aviation Applications S.A. 2 Skiathou st., 546 46 Thessaloniki Greece Tel.: +30 2310 413585 email: ospyroglou@3dsa.gr, ospyroglou@gmail.com