<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hussein H. Fakhry</style></author><author><style face="normal" font="default" size="100%">Benedict Bernard Cardozo</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Research and Development of an Iris-based Recognition System for Identification and Secure Authentication</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Biometric</style></keyword><keyword><style  face="normal" font="default" size="100%">Introduction</style></keyword><keyword><style  face="normal" font="default" size="100%">Iris Authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Iris Recognition</style></keyword><keyword><style  face="normal" font="default" size="100%">Security Access</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">39-57</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">New developments in Iris recognition technology provide increased potential for security. The research study described in this article has been conducted to further explore its potential through the development and evaluation of a working prototype system for Iris Administration and Organization Resource Access Control. The developed prototype possesses Iris administration functionality with such functions as enrollment, identification, verification, update and deletion. Also, the prototype organization module allows management of organizational resources access control. Testing of the prototype has been performed at the Dubai Naturalization and Residency Department (DNRD) site. The test has demonstrated the usefulness of Iris authentication for automating passport control. Special Application Programming Interface (API) licensed from Iridian Technologies has been used in this development.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eugene Nickolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Contemporary Trends in the Development of Information Security and Computer Virology</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal </style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Biometric</style></keyword><keyword><style  face="normal" font="default" size="100%">Computer Virology</style></keyword><keyword><style  face="normal" font="default" size="100%">Dynamic Programming</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">Mobile Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">modeling</style></keyword><keyword><style  face="normal" font="default" size="100%">Satellite Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">Steganometric.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">60-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents an analysis of the latest trends in information security and computer virology. The basic components of the information security are introduced, including data security, computer security, communication security, network security, mobile security, manipulations security, biometric security, and steganometric security. The main factors exerting influence on these components, as well as their relationships are shown. A formal record for the information security as a function of specific arguments is developed. The fundamental procedures of the information security are represented, including Monitoring, Blocking, Removing, Protection and Verification. 
The analysis continues with the computer virology topic. In the beginning, the fundamental work principles of the computer viruses are examined: Reproduction, Transportation, Malicious Thinking and Good-natured Thinking. Then the main steps in the computer viruses investigation are analyzed: Isolation, Decomposition, Formal Description, Modeling, Decision-making and Program Realization. Next, methods for computer viruses detection are examined, such as Signature analysis, Integrity Check, Monitoring and Restriction. After that the basic steps during the computer viruses removal as Localization, Identification, Removing, Deactivation and Verification are shown. 
In the conclusion, the role and the importance of the information security and the computer virology for the development of the contemporary society in conditions of growing communication mobility and globality are pointed out.</style></abstract></record></records></xml>