Cognitive Identity Management: Risks, Trust and Decisions using Heterogeneous Sources

This work advocates for cognitive biometric-enabled systems that integrate identity management, risk assessment and trust assessment. The cognitive identity management process is viewed as a multi-state dynamical system, and probabilistic reasoning is used for modeling of this process. This paper describes an approach to design a platform for risk and trust modeling and evaluation in the cognitive identity management built upon processing heterogeneous data including biometrics, other sensory data and digital ID. The core of an approach is the perception-action cycle of each system state. Inference engine is a causal network that uses various uncertainty metrics and reasoning mechanisms including Dempster-Shafer and Dezert-Smarandache beliefs.

[1]  Kamal Kant Bharadwaj,et al.  Pruning trust–distrust network via reliability and risk estimates for quality recommendations , 2012, Social Network Analysis and Mining.

[2]  Peter Spirtes,et al.  Causal discovery and inference: concepts and recent methodological advances , 2016, Applied Informatics.

[3]  Emal Pasarly Time , 2011, Encyclopedia of Evolutionary Psychological Science.

[4]  Brian A. Jackson,et al.  Assessing the Effectiveness of Layered Security for Protecting the Aviation System Against Adaptive Adversaries , 2015 .

[5]  Philippe Smets,et al.  Target identification based on the transferable belief model interpretation of dempster-shafer model , 2004, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[6]  D. Winterfeldt,et al.  Cognitive and Motivational Biases in Decision and Risk Analysis , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[7]  Dong Liang,et al.  A Risk Elimination Coordination Method for Large Group Decision-Making in Natural Disaster Emergencies , 2015 .

[8]  Judea Pearl,et al.  The seven tools of causal inference, with reflections on machine learning , 2019, Commun. ACM.

[9]  Shawn Eastwood,et al.  Technology Gap Navigator: Emerging Design of Biometric-Enabled Risk Assessment Machines , 2018, 2018 International Conference of the Biometrics Special Interest Group (BIOSIG).

[10]  Vincenzo Piuri,et al.  Biometric Recognition in Automated Border Control , 2016, ACM Comput. Surv..

[11]  Minqiang Li,et al.  A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis , 2014, Inf. Sci..

[12]  Siyuan Liu,et al.  Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Frederick Eberhardt,et al.  Introduction to the foundations of causal discovery , 2017, International Journal of Data Science and Analytics.

[14]  Shawn Eastwood,et al.  Bridging the Gap Between Forensics and Biometric-Enabled Watchlists for e-Borders , 2017, IEEE Computational Intelligence Magazine.

[15]  Wouter Joosen,et al.  Managing distributed trust relationships for multi-modal authentication , 2018, J. Inf. Secur. Appl..

[16]  Heather Rosoff,et al.  Portfolio Analysis of Layered Security Measures , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[17]  Khaled Mellouli,et al.  Propagating belief functions in qualitative Markov trees , 1987, Int. J. Approx. Reason..

[18]  Gian Luca Marcialis,et al.  Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Kevin O'Connor,et al.  A Framework for Biometric and Interaction Performance Assessment of Automated Border Control Processes , 2017, IEEE Transactions on Human-Machine Systems.

[20]  Mohamed Abouelenien,et al.  Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities , 2017, IEEE Transactions on Information Forensics and Security.

[21]  Shawn Eastwood,et al.  Risk Assessment in Authentication Machines , 2016, Recent Advances in Computational Intelligence in Defense and Security.

[22]  Dmitry O. Gorodnichy,et al.  Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications , 2016, IEEE Transactions on Human-Machine Systems.

[23]  Svetlana N. Yanushkevich,et al.  Generative Adversarial Network for Radar Signal Generation , 2020, ArXiv.

[24]  Enrique Herrera-Viedma,et al.  A visual interaction consensus model for social network group decision making with trust propagation , 2017, Knowl. Based Syst..

[25]  Seth D. Guikema,et al.  Risk assessment under deep uncertainty: A methodological comparison , 2017, Reliab. Eng. Syst. Saf..

[26]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[27]  Philippe Weber,et al.  Bayesian networks inference algorithm to implement Dempster Shafer theory in reliability analysis , 2008, Reliab. Eng. Syst. Saf..

[28]  Luis M. de Campos,et al.  Probability Intervals: a Tool for uncertain Reasoning , 1994, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[29]  Gemma Galdon Clavell Protect rights at automated borders , 2017, Nature.

[30]  Didier Dubois,et al.  Joint Propagation and Exploitation of Probabilistic and Possibilistic Information in Risk Assessment , 2006, IEEE Transactions on Fuzzy Systems.

[31]  M. Francisca Hinarejos,et al.  RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security , 2018, IEEE Transactions on Information Forensics and Security.

[32]  Sibel Adali,et al.  A Survey on Trust Modeling , 2015, ACM Comput. Surv..

[33]  James O'Shea,et al.  Do Europe's borders need multi-faceted biometric protection , 2017 .

[34]  W. A. Shier,et al.  Mass Evidence Accumulation and Traveler Risk Scoring Engine in e-Border Infrastructure , 2018, IEEE Transactions on Intelligent Transportation Systems.

[35]  Svetlana Yanushkevich,et al.  Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening , 2019, Comput. Secur..

[37]  Gi Mun Kim,et al.  The causal relationship between risk and trust in the online marketplace: A bidirectional perspective , 2016, Comput. Hum. Behav..

[38]  Ian Jenkinson,et al.  An Offshore Risk Analysis Method Using Fuzzy Bayesian Network , 2009 .

[39]  Sheldon H. Jacobson,et al.  Optimal Aviation Security Screening Strategies With Dynamic Passenger Risk Updates , 2012, IEEE Transactions on Intelligent Transportation Systems.

[40]  Keeley A. Crockett,et al.  GDPR Impact on Computational Intelligence Research , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[41]  Jay F. Nunamaker,et al.  Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals , 2014, J. Manag. Inf. Syst..

[42]  Jorge Dias,et al.  BUM: Bayesian User Model for Distributed Learning of User Characteristics From Heterogeneous Information , 2019, IEEE Transactions on Cognitive and Developmental Systems.

[43]  Milan Stehlík,et al.  On the favorable estimation for fitting heavy tailed data , 2010, Comput. Stat..

[44]  Munindar P. Singh,et al.  Evidence-based trust: A mathematical model geared for multiagent systems , 2010, TAAS.

[45]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[46]  Keeley A. Crockett,et al.  Intelligent Deception Detection through Machine Based Interviewing , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[47]  Tim Bedford,et al.  Approximate Uncertainty Modeling in Risk Analysis with Vine Copulas , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[48]  Simon Haykin,et al.  Cognitive Dynamic Systems: The perception–action cycle , 2012 .

[49]  Jean Dezert,et al.  UNM Digital Repository UNM Digital Repository Fusion of Sources of Evidence with Different Importances and Fusion of Sources of Evidence with Different Importances and Reliabilities Reliabilities , 2022 .

[50]  Shawn Eastwood,et al.  Taxonomy and Modeling of Impersonation in e-Border Authentication , 2015, 2015 Sixth International Conference on Emerging Security Technologies (EST).

[51]  James F. Baldwin,et al.  Inference and learning in fuzzy bayesian networks , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[52]  Anthony C. Davison,et al.  Statistics of Extremes , 2015, International Encyclopedia of Statistical Science.

[53]  M. Stewart,et al.  Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks , 2018, Journal of Transportation Security.

[54]  Reyer Zwiggelaar,et al.  Thermal Facial Analysis for Deception Detection , 2014, IEEE Transactions on Information Forensics and Security.

[55]  Manoj Kumar Tiwari,et al.  Bayesian network modelling for supply chain risk propagation , 2018, Int. J. Prod. Res..