73 resultados para SSO,Shibboleth,2FA,ADFS,Strong Authentication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two glaring omissions in the research on sports fans are on women fans and on how people become fans. In this paper we begin to address both of these issues by examining how women become fans of Australian rules football (AFL). From data generated in single-person and focus group interviews with women AFL supporters conducted in Victoria and NSW, we use their accounts to map-out four ways in which they became fans. We show that at the heart of each of these paths to fandom are the close ties that the women formed in their social networks – either as children through their kin, or later in life through others that entered their networks. Women become fans, we argue, because of the strong social ties that they have with people who are existing fans.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Seclusion is of limited therapeutic value and can be a harmful and traumatic experience for consumers of mental health services. Many psychiatric facilities have made substantial efforts to eliminate seclusion or reduce this practice to negligible levels.

The aim is to review the research on seclusion-reduction initiatives in psychiatric facilities. We reviewed the peer-reviewed, English-language literature on seclusion reduction initiatives. We sourced 16 papers that focused on seclusion reduction initiatives and in which pre- and postseclusion data were reported. Opinion-based papers and research that focused solely on pharmaceutical methods to reduce seclusion were excluded from our review. Successful seclusion reduction initiatives typically involved senior management implementing multiple changes within the facilities. Although commonalities exist with regard to the interventions used in these facilities to reduce seclusion (e.g., treatment plan improvement, monitoring seclusion episodes, changing the therapeutic environment), the ways in which these initiatives were combined tended to be unique to each organisation. State-level organisations sometimes provided the impetus for such changes to be made. There is strong evidence that changes made to psychiatric facilities were effective in reducing or eliminating seclusion. Seclusion reduction in psychiatric facilities requires strong leadership from senior management. Sometimes leadership from state-level organisations accelerates a seclusion reduction agenda.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Seclusion is of limited therapeutic value and can be a harmful and traumatic experience for psychiatric consumers. Many psychiatric facilities have made substantial efforts to eliminate seclusion or reduce this practice to negligible levels.
Aims: To review the research on seclusion-reduction initiatives in psychiatric facilities.
Methods: We reviewed the peer-reviewed, English-language literature on seclusion reduction initiatives. We sourced 16 papers that focused on seclusion reduction initiatives and in which pre- and post-seclusion data were reported. Opinion-based papers and research that focused solely on pharmaceutical methods to reduce seclusion were excluded from our review.
Results: Successful seclusion reduction initiatives typically involved senior management implementing multiple changes within the facilities. Although commonalities exist with regard to the interventions used in these facilities to reduce seclusion (e.g., treatment plan improvement, monitoring seclusion episodes, changing the therapeutic environment), the ways in which these initiatives were combined tended to be unique to each organisation. State-level organisations sometimes provided the impetus for such changes to be made. There is strong evidence that changes made to psychiatric facilities were effective in reducing or eliminating seclusion.
Conclusion: Seclusion reduction in psychiatric facilities requires strong leadership from senior management. Sometimes leadership from state-level organisations accelerates a seclusion reduction agenda.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Seclusion is of limited therapeutic value and can be a harmful and traumatic experience for psychiatric consumers. Many psychiatric facilities have made substantial efforts to eliminate seclusion or reduce this practice to negligible levels.

Aims: To review the research on seclusion-reduction initiatives in psychiatric facilities.

Methods: We reviewed the peer-reviewed, English-language literature on seclusion reduction initiatives. We sourced 16 papers that focused on seclusion reduction initiatives and in which pre- and post-seclusion data were reported. Opinion-based papers and research that focused solely on pharmaceutical methods to reduce seclusion were excluded from our review.

Results: Successful seclusion reduction initiatives typically involved senior management implementing multiple changes within the facilities. Although commonalities exist with regard to the interventions used in these facilities to reduce seclusion (e.g., treatment plan improvement, monitoring seclusion episodes, changing the therapeutic environment), the ways in which these initiatives were combined tended to be unique to each organisation. State-level organisations sometimes provided the impetus for such changes to be made. There is strong evidence that changes made to psychiatric facilities were effective in reducing or eliminating seclusion.

Conclusion: Seclusion reduction in psychiatric facilities requires strong leadership from senior management. Sometimes leadership from state-level organisations accelerates a seclusion reduction agenda.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research tested the effectiveness of a graphical approach to passwords. A field-experiment, in which graphical passwords were used by 185 subjects, helped to evaluate the approach. It was found that although graphical passwords were successfully used to authenticate useres, more work is required to ensure they are more usable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis analyses authentication in public key encryption and makes contributions in two areas. Firstly, Compressed Nested PKI is proposed which improves the certificate validation process. Then an implicitly certified encryption scheme, Authenticated Public Key Encryption, which makes keys easier to manage, is introduced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) suffer from a wide range of security attacks due to their limited processing and energy capabilities. Their use in numerous mission critical applications, however, requires that fast recovery from such attacks be achieved. Much research has been completed on detection of security attacks, while very little attention has been paid to recovery from an attack. In this paper, we propose a novel, lightweight authentication protocol that can secure network and node recovery operations such as re-clustering and reprogramming. Our protocol is based on hash functions and we compare the performance of two well-known lightweight hash functions, SHA-1 and Rabin. We demonstrate that our authentication protocol can be implemented efficiently on a sensor network test-bed with TelosB motes. Further, our experimental results show that our protocol is efficient both in terms of computational overhead and execution times which makes it suitable for low resourced sensor devices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article the author focuses on training analysis as the catchword in psychoanalytic education. He states that psychologist Sigmund Freud suggested that dream interpretation was an important part in psychoanalysis. He focuses on the concept of Oedipus complex by Freud, which was considered the psychoanalytic catchword that distinguished supporters of psychoanalysis from their opponents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems employing low cost RFID tags remains an open problem. In this paper we develop and present a RFID security protocol which not only allows mutual authentication and secure transmission of data between the reader and tag but is also secure against a number of common attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is a revolutionary remote technology which has many useful implications. Large scale implementation of RFID is seeking 100% information privacy and untraceability, for users and organizations, which is suitable for low cost RFID tag (Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of handling forward and backward security, rouge reader better than existing protocols. In our new scheme we involved RFID reader’s hardware ID in addition to other shared secret information which uses hash to protect users and industries privacy. Moreover, we used LAMED as our PRNG (Pseudorandom Number Generator) which is faster and take less computational power.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) system is a remote identification technology which is taking the place of barcodes to become electronic tags of an object. However, its radio transmission nature is making it vulnerable in terms of security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other exploits to middleware and back-end systems. This paper is proposing a framework which will provide protection from malware and ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader level. This will ensure that any malicious code in the tag is identified. If the tag is infected by malicious code it will stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be capable of protecting an RFID system from denial of service (DOS) attack, forward security and rogue reader better than existing protocols. The framework is introducing a layer concept on a smart reader to reduce coupling between different tasks. Using this framework, the RFID system will be protected from malware and also the privacy of the tag will be ensured.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

α-Al2O3 nanotubes were synthesized in bulk quantity by using simple physical evaporation of pure aluminum powders at 1000 °C. Field emission scanning electron microscopy and transmission electron microscopy observations show that the nanotubes have diameters smaller than 100 nm and lengths up to several microns. Cathodoluminescence measurements revealed a strong luminescence band in the wavelength range of 280–380 nm centered at 330 nm, which could be attributed to the oxygen vacancies in the α-Al2O3 nanotubes. Sacrificial template model is regarded as the possible formation mechanism of the nanotubes.