5 resultados para Password authentication
em Universidade Federal do Rio Grande do Norte(UFRN)
Resumo:
The contemporary conjuncture based on the capitalistic knowledge converges to the corporal consciousness that makes us see, feel, taste and hear, be in/to pieces. Disembodied reason legitimate and legislate ways of being and living socially and its development is the dehumanization of human relations causing pain and suffering. The objective of this work is to discuss the body as pedagogical matrix through imagistic/artistic elements: music, painting and literature. Metaphors lead to self knowledge of human subjectivity and approach us to the kaleidoscope of sensitive knowledge and enables learning to learn with the infinite combinations of images, knowledge, feelings and worldviews. The song Memória da Pele comes in the voice of Maria Betânia speak of the memories that are not mine, but are tattooed in me in the memory of skin, singing the memories of a love lived by who tries to forget rationally, but the body insists on remembering. It is password to think about what we are. The short story by Clarice Lispector, entitled Miss Algarve, narrates the life story of an unmarried and virgin woman, and her encounter with an alien called Ixtlan. Until then, she who lived as if every day were a Monday, found herself seduced by the pleasure of having a body in contact with another body, which also allowed her to give visibility to the bodies of others. She had repudiation by the immorality that her body and the other s perspired. The discovery of the body brings important lessons for nursing, involving our body and the others'. The painting the flying bed or Henry Ford Hospital, by Frida Kahlo, is our final metaphor. The traumatic experience of abortion is shown in this painting trough the picture of the artist naked in a hospital bed. This painting invites us to reflect on our work process. We need to think in multiple dimensions of the being and accept the invitation of art, so that the lightness confronts us with the weight imposed by the hegemonic ideology. I believe it is not a single view, but the many views that should justify the knowledge and practices of nursing; what matters is that they are woven into the dialogue, democracy, provided that protagonism of those individuals involved in this process, in the wandering and uncertainty, in the rewiring, solidarity, plurality. To this end, the body must be the great pedagogue that is able to be viewed not as a tapestry seen by the right view, as the logical knowledge sees, but seen by the opposite side in its singular, irregular, discontinuous weavings
Resumo:
Nowadays due to the security vulnerability of distributed systems, it is needed mechanisms to guarantee the security requirements of distributed objects communications. Middleware Platforms component integration platforms provide security functions that typically offer services for auditing, for guarantee messages protection, authentication, and access control. In order to support these functions, middleware platforms use digital certificates that are provided and managed by external entities. However, most middleware platforms do not define requirements to get, to maintain, to validate and to delegate digital certificates. In addition, most digital certification systems use X.509 certificates that are complex and have a lot of attributes. In order to address these problems, this work proposes a digital certification generic service for middleware platforms. This service provides flexibility via the joint use of public key certificates, to implement the authentication function, and attributes certificates to the authorization function. It also supports delegation. Certificate based access control is transparent for objects. The proposed service defines the digital certificate format, the store and retrieval system, certificate validation and support for delegation. In order to validate the proposed architecture, this work presents the implementation of the digital certification service for the CORBA middleware platform and a case study that illustrates the service functionalities
Resumo:
There are authentication models which use passwords, keys, personal identifiers (cards, tags etc) to authenticate a particular user in the authentication/identification process. However, there are other systems that can use biometric data, such as signature, fingerprint, voice, etc., to authenticate an individual in a system. In another hand, the storage of biometric can bring some risks such as consistency and protection problems for these data. According to this problem, it is necessary to protect these biometric databases to ensure the integrity and reliability of the system. In this case, there are models for security/authentication biometric identification, for example, models and Fuzzy Vault and Fuzzy Commitment systems. Currently, these models are mostly used in the cases for protection of biometric data, but they have fragile elements in the protection process. Therefore, increasing the level of security of these methods through changes in the structure, or even by inserting new layers of protection is one of the goals of this thesis. In other words, this work proposes the simultaneous use of encryption (Encryption Algorithm Papilio) with protection models templates (Fuzzy Vault and Fuzzy Commitment) in identification systems based on biometric. The objective of this work is to improve two aspects in Biometric systems: safety and accuracy. Furthermore, it is necessary to maintain a reasonable level of efficiency of this data through the use of more elaborate classification structures, known as committees. Therefore, we intend to propose a model of a safer biometric identification systems for identification.
Resumo:
Until recently the use of biometrics was restricted to high-security environments and criminal identification applications, for economic and technological reasons. However, in recent years, biometric authentication has become part of daily lives of people. The large scale use of biometrics has shown that users within the system may have different degrees of accuracy. Some people may have trouble authenticating, while others may be particularly vulnerable to imitation. Recent studies have investigated and identified these types of users, giving them the names of animals: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms and Phantoms. The aim of this study is to evaluate the existence of these users types in a database of fingerprints and propose a new way of investigating them, based on the performance of verification between subjects samples. Once introduced some basic concepts in biometrics and fingerprint, we present the biometric menagerie and how to evaluate them.
Resumo:
Until recently the use of biometrics was restricted to high-security environments and criminal identification applications, for economic and technological reasons. However, in recent years, biometric authentication has become part of daily lives of people. The large scale use of biometrics has shown that users within the system may have different degrees of accuracy. Some people may have trouble authenticating, while others may be particularly vulnerable to imitation. Recent studies have investigated and identified these types of users, giving them the names of animals: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms and Phantoms. The aim of this study is to evaluate the existence of these users types in a database of fingerprints and propose a new way of investigating them, based on the performance of verification between subjects samples. Once introduced some basic concepts in biometrics and fingerprint, we present the biometric menagerie and how to evaluate them.