35 resultados para Entity Authentication

em CentAUR: Central Archive University of Reading - UK


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a novel method of authentication of users in secure buildings. The main objective is to investigate whether user actions in the built environment can produce consistent behavioural signatures upon which a building intrusion detection system could be based. In the process three behavioural expressions were discovered: time-invariant, co-dependent and idiosyncratic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many projects, e.g. VIKEF [13] and KIM [7], present grounded approaches for the use of entities as a means of indexing and retrieval of multimedia resources from heterogeneous sources. In this paper, we discuss the state-of-the-art of entity-centric approaches for multimedia indexing and retrieval. A summary of projects employing entity-centric repositories are portrayed. This paper also looks at the current state-of-the-art authoring environment, Macromedia Authorware, and the possibility of potential extension of this environment for entity-based multimedia authoring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Password Authentication Protocol (PAP) is widely used in the Wireless Fidelity Point-to-Point Protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved The whole process is implemented in a mechanical reasoning platform, Isabelle. It only takes a few seconds to find flaws in the original and the fixed protocol and to verify that the enhanced version of the PAP protocol is secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the implementation of a semantic web search engine on conversation styled transcripts. Our choice of data is Hansard, a publicly available conversation style transcript of parliamentary debates. The current search engine implementation on Hansard is limited to running search queries based on keywords or phrases hence lacks the ability to make semantic inferences from user queries. By making use of knowledge such as the relationship between members of parliament, constituencies, terms of office, as well as topics of debates the search results can be improved in terms of both relevance and coverage. Our contribution is not algorithmic instead we describe how we exploit a collection of external data sources, ontologies, semantic web vocabularies and named entity extraction in the analysis of underlying semantics of user queries as well as the semantic enrichment of the search index thereby improving the quality of results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces a novel approach for free-text keystroke dynamics authentication which incorporates the use of the keyboard’s key-layout. The method extracts timing features from specific key-pairs. The Euclidean distance is then utilized to find the level of similarity between a user’s profile data and his/her test data. The results obtained from this method are reasonable for free-text authentication while maintaining the maximum level of user relaxation. Moreover, it has been proven in this study that flight time yields better authentication results when compared with dwell time. In particular, the results were obtained with only one training sample for the purpose of practicality and ease of real life application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Turing Test, originally configured for a human to distinguish between an unseen man and unseen woman through a text-based conversational measure of gender, is the ultimate test for thinking. So conceived Alan Turing when he replaced the woman with a machine. His assertion, that once a machine deceived a human judge into believing that they were the human, then that machine should be attributed with intelligence. But is the Turing Test nothing more than a mindless game? We present results from recent Loebner Prizes, a platform for the Turing Test, and find that machines in the contest appear conversationally worse rather than better, from 2004 to 2006, showing a downward trend in highest scores awarded to them by human judges. Thus the machines are not thinking in the same way as a human intelligent entity would.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern methods of spawning new technological motifs are not appropriate when it is desired to realize artificial life as an actual real world entity unto itself (Pattee 1995; Brooks 2006; Chalmers 1995). Many fundamental aspects of such a machine are absent in common methods, which generally lack methodologies of construction. In this paper we mix classical and modern studies in order to attempt to realize an artificial life form from first principles. A model of an algorithm is introduced, its methodology of construction is presented, and the fundamental source from which it sprang is discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Where does biology end and culture begin? While the human body is now widely accepted as being both biological and cultural, the brain is still considered by archaeologists as being a biological entity that provides the capacity for culture and is subject to no further change after the evolution of Homo sapiens. This article reviews recent research that suggests that the brain has continued to evolve at an increasing rate in recent times under the influence Of culturally created environments and that both the anatomy and function of individual brains can be manipulated by cultural behaviour. It describes an experiment in which one of us successfully changed his own brain in response to his cultural activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present an architecture for network and applications management, which is based on the Active Networks paradigm and shows the advantages of network programmability. The stimulus to develop this architecture arises from an actual need to manage a cluster of active nodes, where it is often required to redeploy network assets and modify nodes connectivity. In our architecture, a remote front-end of the managing entity allows the operator to design new network topologies, to check the status of the nodes and to configure them. Moreover, the proposed framework allows to explore an active network, to monitor the active applications, to query each node and to install programmable traps. In order to take advantage of the Active Networks technology, we introduce active SNMP-like MIBs and agents, which are dynamic and programmable. The programmable management agents make tracing distributed applications a feasible task. We propose a general framework that can inter-operate with any active execution environment. In this framework, both the manager and the monitor front-ends communicate with an active node (the Active Network Access Point) through the XML language. A gateway service performs the translation of the queries from XML to an active packet language and injects the code in the network. We demonstrate the implementation of an active network gateway for PLAN (Packet Language for Active Networks) in a forty active nodes testbed. Finally, we discuss an application of the active management architecture to detect the causes of network failures by tracing network events in time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper focuses on improving computer network management by the adoption of artificial intelligence techniques. A logical inference system has being devised to enable automated isolation, diagnosis, and even repair of network problems, thus enhancing the reliability, performance, and security of networks. We propose a distributed multi-agent architecture for network management, where a logical reasoner acts as an external managing entity capable of directing, coordinating, and stimulating actions in an active management architecture. The active networks technology represents the lower level layer which makes possible the deployment of code which implement teleo-reactive agents, distributed across the whole network. We adopt the Situation Calculus to define a network model and the Reactive Golog language to implement the logical reasoner. An active network management architecture is used by the reasoner to inject and execute operational tasks in the network. The integrated system collects the advantages coming from logical reasoning and network programmability, and provides a powerful system capable of performing high-level management tasks in order to deal with network fault.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Plasmodiophora brassicae Wor. is viewed in this article from the standpoint of a highly evolved and successful organism, well fitted for the ecological niche that it occupies. Physical, chemical, and biological components of the soil environment are discussed in relation to their effects on the survival, growth, and reproduction of this microbe. It is evident that P. brassicae is well equipped by virtue of its robust resting spores for survival through many seasonal cycles. Germination is probably triggered as a result of signals initiated by root exudates. The resultant motile zoospore moves rapidly to the root hair surface and penetration and colonization follow. The short period between germination and penetration is one of greatest vulnerability for P. brassicae. In this phase survival is affected at the very least by soil texture and structure; its moisture; pH; calcium, boron, and nitrogen content; and the presence of active microbial antagonists. These factors influence the inoculum potential (sensu Garrett, 1956) and its viability and invasive capacity. There is evidence that these effects may also influence differentially the survival of some physiologic races of P. brassicae. Considering the interaction of P. brassicae with the soil environment from the perspective of its biological fitness is an unusual approach; most authors consider only the opportunities to destroy this organism. The approach adopted here is borne of several decades spent studying P. brassicae and the respect that has been engendered for it as a biological entity. This review stops at the point of penetration, although some of the implications of the environment for successful colonization are included because they form a continuum. Interactions with the molecular and biochemical cellular environment are considered in other sections in this special edition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A tetraazamacrocycle containing ferrocene moieties has been synthesized and characterized. The tetraprotonated form of this compound was evaluated as a receptor (R) for anion recognition of several substrates (S), Cl-, PF6-, HSO4-, H2PO4- and carboxylates, such as p-nitrobenzoate (p-nbz(-)), phthalate (ph(2-)), isophthalate (iph(2-)) and dipicolinate (dipic(2-)). H-1 NMR titrations in CD3OD indicated that this receptor is not suitable for recognizing HSO4- and H2PO4-, but weakly binds p-nbz(-), and strongly interacts with ph(2-), dipic(2-), and iph(2-) anions forming 1 : 2 assembled species. The largest beta(2) binding constant was determined for ph(2-), followed by dipic(2-) and finally iph(2-). The effect of the anionic substrates on the electron-transfer process of the ferrocene units of R was evaluated using cyclic voltammetry (CV) and square wave voltammetry (SWV) in methanol solution and 0.1 mol dm(-3) (CH3)(4)NCl as the supporting electrolyte. Titrations of the receptor were undertaken by addition of anion solutions in their tetrabutylammonium or tetramethylammonium forms. The protonated ligand exhibits a reversible voltammogram, which shifts cathodically in the presence of the substrates. The data revealed kinetic constraints in the formation of the receptor/substrate entity for dipic(2-), ph(2-) and iph(2-) anions, but not for p-nbz(-). In spite of the slow kinetics of assembled species formation with the ph(2-) substrate, this anion provides the largest redox-response when the supramolecular entity is formed, followed by dipic(2-), iph(2-) and finally p-nbz(-) anions. This trend is in agreement with the H-1 NMR results and the values of the binding constants. Single crystal X-ray structures of the receptor with PF6-, ph(2-), iph(2-) and p-nbz(-) were carried out and showed that supermolecules with a RS2 stoichiometry are formed with the first three anions, but RS4 with p-nbz(-). In all cases the binding occurs outside the macrocyclic cavity via N-H center dot center dot center dot O=C hydrogen bonds for carboxylate anions and N - H center dot center dot center dot F hydrogen bonds for the PF6- anion, which is in agreement with the solution results. The macrocyclic framework adopts different conformations in order to interact with each substrate having Fe center dot center dot center dot Fe intramolecular distances ranging from 10.125(14) to 12.783(15) angstrom.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Oxidized low-density lipoprotein (oxLDL) exhibits many atherogenic effects, including the promotion of monocyte recruitment to the arterial endothelium and the induction of scavenger receptor expression. However, while atherosclerosis involves chronic inflammation within the arterial intima, it is unclear whether oxLDL alone provides a direct inflammatory stimulus for monocyte-macrophages. Furthermore, oxLDL is not a single, well-defined entity, but has structural and physical properties which vary according to the degree of oxidation. We tested the hypothesis that the biological effects of oxLDL will vary according to its degree of oxidation and that some species of oxLDL will have atherogenic properties, while other species may be responsible for its inflammatory activity. The atherogenic and inflammatory properties of LDL oxidized to predetermined degrees (mild, moderate and extensive oxidation) were investigated in a single system using human monocyte-derived macrophages. Expression of CD36 mRNA was up-regulated by mildly- and moderately-oxLDL, but not highly-oxLDL. The expression of the transcription factor, proliferator-activated receptor-gamma (PPARgamma), which has been proposed to positively regulate the expression of CD36, was increased to the greatest degree by highly-oxLDL. However, the DNA binding activity of PPARgamma was increased only by mildly- and moderately-oxLDL. None of the oxLDL species appeared to be pro-inflammatory towards monocytes, either directly or indirectly through mediators derived from lymphocytes, regardless of the degree of oxidation. (C) 2003 Published by Elsevier Science Ireland Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims/hypothesis: Variants of the TCF7L2 gene predict the development of type 2 diabetes mellitus (T2DM). We investigated the associations between gene variants of TCF7L2 and clinical features of the metabolic syndrome (MetS) (an entity often preceeding T2DM), and their interaction with non-genetic factors, including plasma saturated fatty acids (SFA) concentration and insulin resistance (IR). Methods: Fasting lipid profiles, insulin sensitivity, insulin secretion, anthropometrics, blood pressure and 10 gene variations of the TCF7L2 gene were determined in 450 subjects with MetS. Results: Several single nucleotide polymorphisms (SNP) showed phenotypic associations independent of SFA or IR. Carriers of the rare T allele of rs7903146, and of three other SNPs in linkage disequilibrium with rs7903146, had lower blood pressure and insulin secretion. High IR and the presence of the T-allele of rs7903146 acted synergistically to define those with reduced insulin secretion. Carriers of the minor allele of rs290481 exhibited an altered lipid profile, with increased plasma levels of apolipoprotein B, non-esterified fatty acids, cholesterol and apolipoprotein B in triglyceride rich lipoproteins, and LDL cholesterol. Carriers of the minor allele of rs11196224 that had higher plasma SFA levels showed elevated procoagulant/proinflammatory biomarkers, impaired insulin secretion and increased IR, whereas carriers of the minor allele of rs17685538 with high plasma SFA levels exhibited higher blood pressure. Conclusions/interpretation: SNP in the TCF7L2 gene are associated with differences in insulin secretion, blood pressure, blood lipids and coagulation in MetS patients, and may be modulated by SFA in plasma or IR.