7 resultados para SSO,Shibboleth,2FA,ADFS,Strong Authentication
Resumo:
In the context of products from certain regions or countries being banned because of an identified or non-identified hazard, proof of geographical origin is essential with regard to feed and food safety issues. Usually, the product labeling of an affected feed lot shows origin, and the paper documentation shows traceability. Incorrect product labeling is common in embargo situations, however, and alternative analytical strategies for controlling feed authenticity are therefore needed. In this study, distillers' dried grains and solubles (DDGS) were chosen as the product on which to base a comparison of analytical strategies aimed at identifying the most appropriate one. Various analytical techniques were investigated for their ability to authenticate DDGS, including spectroscopic and spectrometric techniques combined with multivariate data analysis, as well as proven techniques for authenticating food, such as DNA analysis and stable isotope ratio analysis. An external validation procedure (called the system challenge) was used to analyze sample sets blind and to compare analytical techniques. All the techniques were adapted so as to be applicable to the DDGS matrix. They produced positive results in determining the botanical origin of DDGS (corn vs. wheat), and several of them were able to determine the geographical origin of the DDGS in the sample set. The maintenance and extension of the databanks generated in this study through the analysis of new authentic samples from a single location are essential in order to monitor developments and processing that could affect authentication.
Resumo:
We present optical photometry and spectroscopy of the optical transient SN 2011A. Our data span 140 days after discovery including BVRI u′g′r′i′z′ photometry and 11 epochs of optical spectroscopy. Originally classified as a type IIn supernova (SN IIn) due to the presence of narrow Hα emission, this object shows exceptional characteristics. First, the light curve shows a double plateau, a property only observed before in the impostor SN 1997bs. Second, SN 2011A has a very low luminosity (MV=-15.72), placing it between normal luminous SNe IIn and SN impostors. Third, SN 2011A shows low velocity and high equivalent width absorption close to the sodium doublet, which increases with time and is most likely of circumstellar origin. This evolution is also accompanied by a change in line profile; when the absorption becomes stronger, a P Cygni profile appears. We discuss SN 2011A in the context of interacting SNe IIn and SN impostors, which appears to confirm the uniqueness of this transient. While we favor an impostor origin for SN 2011A, we highlight the difficulty in differentiating between terminal and non-terminal interacting transients.
Resumo:
Animal rights positions face the ‘predator problem’: the suggestion that if the rights of nonhuman animals are to be protected, then we are obliged to interfere in natural ecosystems to protect prey from predators. Generally, rather than embracing this conclusion, animal ethicists have rejected it, basing this objection on a number of different arguments. This paper considers but challenges three such arguments, before defending a fourth possibility. Rejected are Peter Singer’s suggestion that interference will lead to more harm than good, Sue Donaldson and Will Kymlicka’s suggestion that respect for nonhuman sovereignty necessitates non-interference in normal circumstances, and Alasdair Cochrane’s solution based on the claim that predators cannot survive without killing prey. The possibility defended builds upon Tom Regan’s suggestion that predators, as moral patients but not moral agents, cannot violate the rights of their prey, and so the rights of the prey, while they do exist, do not call for intervention. This idea is developed by a consideration of how moral agents can be more or less responsible for a given event, and defended against criticisms offered by thinkers including Alasdair Cochrane and Dale Jamieson.
Resumo:
In recent years, the adaptation of Wireless Sensor Networks (WSNs) to application areas requiring mobility increased the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Since, key management plays an important role in securing both information and connectivity, a proper authentication and key management scheme is required in mobility enabled applications where the authentication of a node with the network is a critical issue. In this paper, we present an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several low capabilities sensor nodes and few high capabilities sensor nodes. We analyze our proposed solution by using MATLAB (analytically) and by simulation (OMNET++ simulator) to show that it has less memory requirement and has good network connectivity and resilience against attacks compared to some existing schemes. We also propose two levels of secure authentication methods for the mobile sensor nodes for secure authentication and key establishment.
Resumo:
In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.