881 resultados para High security identity tags
Resumo:
The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.
Resumo:
La estrategia i2010 de la UE tiene como objetivo garantizar el liderazgo europeo en materia de TIC y poner los beneficios de la Sociedad de la Información al servicio de la economía, la sociedad y la calidad de vida personal, teniendo presente que los éxitos de Europa hasta la fecha se han basado en favorecer la competencia leal en los mercados de las telecomunicaciones y crear un mercado sin fronteras para contenidos y medios de comunicación digitales. En esta línea, la Comisión Europea ha establecido que los distintos estados miembros deben contribuir activamente al desarrollo y uso seguro de los servicios telemáticos entre sus ciudadanos. Más concretamente, atribuye a las Administraciones Públicas, tanto a nivel nacional, regional como local, un papel dinamizador de la Sociedad de la Información que les obliga a ofrecer paulatinamente todos los actos administrativos a los ciudadanos a través de Internet. Como primer paso para el uso seguro de los servicios telemáticos que ofrecen las instituciones públicas se hace preciso dotar a los ciudadanos de una identidad digital que les permita identificarse ante un Proveedor de Servicio o ante otros ciudadanos de manera inequívoca. Por esta razón, la mayoría de países europeos – y otros en el resto del mundo – están promoviendo, sistemas fiables de gestión de identidad electrónica (eIDM), de tal manera que los ciudadanos, las empresas y departamentos gubernamentales (incluso en Estados miembros diferentes) pueden identificar y certificar sus operaciones con precisión, rapidez y sencillez. Sin embargo, la gestión de esta identidad por las Administraciones Públicas supone un importante desafío, acentuado cuando se hace necesaria la interoperabilidad entre Administraciones de diferentes países, puesto que personas y entidades tienen credenciales de identificación diferentes en función de su propio marco jurídico nacional. Consciente del problema, en la Unión Europea se han puesto en marcha una serie de proyectos con el objetivo de conseguir la interoperabilidad de los eIDMs entre las instituciones públicas de diferentes Estados miembros. A pesar de ello, las soluciones adoptadas hasta la fecha son insuficientes porque no prevén todos los posibles casos de interacción del usuario con las instituciones. En concreto, no tienen en cuenta un aspecto muy importante que se ofrece en los distintos sistemas jurídicos nacionales, a saber, la delegación de la identidad, mediante la cual un ciudadano puede autorizar a otro para que actúe en su nombre para acceder a determinados servicios prestados por las instituciones públicas. En esta tesis se realizan un conjunto de aportaciones que dan solución a distintos aspectos de los problemas planteados y que, de forma conjunta, permiten la interoperabilidad y la delegación de identidad en determinados Sistemas de Gestión de Identidad aplicados al entorno de las Administraciones Públicas. En el caso de la delegación, se ha definido un sistema de delegación dinámica de identidad entre dos entidades genéricas que permite solucionar el problema del acceso delegado a los servicios telemáticos ofrecidos por las Administraciones Públicas. La solución propuesta se basa en la generación de un token de delegación, constituido a partir de un Certificado Proxy, que permite a la entidad que delega establecer la delegación de identidad en otra entidad en base a un subconjunto de sus atributos como delegador, estableciendo además, en el propio token de delegación, restricciones en el conjunto de servicios accesibles a la entidad delegada y el tiempo de validez de la delegación. Adicionalmente, se presentan los mecanismos necesarios tanto para poder revocar un token de delegación como para comprobar sin un token de delegación ha sido o no revocado. Para ello se propone una solución para la identificación unívoca de tokens de delegación y la creación de una nueva entidad denominada Autoridad de Revocación de Tokens de Delegación. Entre las características del sistema de delegación propuesto destaca el que es lo suficientemente seguro como para ser utilizado en el entorno de la Administración Pública, que no requiere el uso de mecanismos off‐line para la generación de la delegación y que se puede realizar la delegación de forma instantánea y sin la necesidad de trámites complejos o la participación de un elevado número de entidades. Adicionalmente, el token de delegación propuesto es perfectamente integrable en las infraestructura de clave pública actual lo que hace que, dado que gran parte de las Administraciones Públicas europeas basan sus sistemas de identidad digital en el uso de la PKI y certificados de identidad X.509, la solución pueda ser puesta en marcha en un entorno real sin necesidad de grandes cambios o modificaciones de comportamiento. En lo referente a la interoperabilidad, se realiza un análisis exhaustivo y la correspondiente evaluación de las principales propuestas de Sistemas de Gestión de Identidad orientados a conseguir la interoperabilidad realizadas hasta la fecha en el marco de la Unión Europea y se propone, a alto nivel, una arquitectura de interoperabilidad para la gestión de identidad en las Administraciones Públicas. Dicha arquitectura es lo suficientemente genérica como para poder ser aplicada tanto en el entorno pan‐Europeo como en los entornos nacionales, autonómicos y locales, de tal forma que la interoperabilidad en la gestión de la identidad esté garantizada en todos los niveles de la Administración Pública. Por último, mediante la integración de la solución de delegación dinámica de identidad y la arquitectura de interoperabilidad propuestas se presenta una solución al problema de la delegación en un escenario pan‐Europeo de gestión de identidad, dando lugar a una arquitectura global de interoperabilidad pan‐Europea con soporte a la delegación de identidad. SUMMARY The i2010 European Union Plan aims to ensure European leadership in ICT and to promote the positive contribution that information and communication technologies can make to the economic, social and personal quality of life, bearing in mind that, to date, success in Europe has been based on promoting fair competition in telecommunications markets and on creating a borderless market for contents and digital media. In this line, the European Commission has established that the different member states should contribute actively to the development and secure use of telematic services among their citizens. More specifically, it is attributed to national, regional and local Public Administrations to have a supportive role of the Information Society, requiring them to gradually provide the citizens with Internet‐based access to all administrative procedures acts. As a first step for the secure use of telematic services offered by public institutions, it is necessary to provide the citizens with a digital identity to enable them to identify themselves unequivocally to a Service Provider or to other citizens. For this reason, most European countries ‐ and others in the rest of the world ‐ are promoting reliable systems for managing electronic identity (eIDM), so that citizens, businesses and government departments (even in different Member States) can identify and certify their operations with precision, speed and simplicity. However, the identity management by Public Administrations is a major challenge that becomes more difficult when interoperability between administrations of different countries is needed, due to the fact that individuals and entities have different identification credentials according to their own national legal framework. Aware of the problem, the European Union has launched a series of projects with the aim of achieving interoperability of eIDMs between public institutions of different Member States. However, the solutions adopted to date are insufficient because they do not foresee all possible cases of user interaction with the institutions. In particular, solutions do not take into account a very important aspect that is offered in different national legal systems, namely, the delegation of identity, by which a citizen can authorize another to act on his/her behalf to access certain services provided by public institutions. In this thesis a collection of contributions that provide solution to different aspects of the aforementioned problems are carried out. The solutions, in global, enable interoperability and identity delegation in some of the Identity Management Systems applied to Public Administration environment. In the case of delegation, a dynamic identity delegation system between generic entities is defined. This system makes it possible to solve the problem of delegated access to telematic services offered by Public Administrations. The proposed solution is based on the generation of a piece of information called delegation token. This delegation token, derived from a Proxy Certificate, allows the establishment of identity delegation by an entity that delegates (delegator) in other entity (delegatee) making use of a subset of delegator attributes. It also establishes restrictions on services that can be used by the delegated entity and the expiry date of delegation. In addition to this, the mechanisms necessary to revoke and check the revocation status of a delegation token are presented. To do this, a solution to univocally identify delegation tokens and the creation of a completely new entity, called Token Delegation Revocation Authority, are proposed. The most remarkable characteristics of the proposed delegation system are its security, enough for it to be used in the Public Administration environment, the fact that it does not require off‐line processes in order to generate the delegation, and the possibility of performing the delegation instantaneously and without neither complex processes nor the intervention of a large number of entities. The proposed delegation token can be completely incorporated into current Public Key Infrastructure (PKI). Thus, since most of the European Public Administrations base their digital identity systems on PKI and X.509 identity certificates, the solution can be adopted in a real environment without great changes or performance modifications. Regarding interoperability, an exhaustive analysis and evaluation of most significant proposals on Identity Management Systems that aim to achieve interoperability carried out in the European Union framework until now are performed. A high level identity management interoperability architecture for Public Administrations is also proposed. This architecture is sufficiently generic to be applied to both pan‐European environment and national, regional or local environments, thus interoperability in identity management at all Public Administration levels is guaranteed. Finally, through the integration of the proposed dynamic identity delegation solution and the high level interoperability architecture, a solution to the problem of identity delegation in a pan‐European identity management environment is suggested, leading to a pan‐European global interoperability architecture with identity delegation support.
Resumo:
High salinity is a severe constraint on tomato growth and productivity in many regions and situations. To obtain an ideal gene donor for improving the salt tolerance of tomato cultivars, the potential of tolerance response to salinity were evaluated for 14 tomato accessions including wild and cultivated species. By investigation of seed germination and seedling survival, a common cultivar, Solanum lycopersicum 'moneymaker', is evidenced significantly salt-tolerant among them and correspondingly, a wild accession, Solanum cheesmanniae 'LA0317', is most vulnerable to salinity. The performance of Moneymaker and LA0317 upon salinity was then compared in detail for their growth inhibition and some physiological changes. Complete dominance of Moneymaker and its high gene identity in tomato species lead us to use it in microarray experiment and apply it as gene donor for salt tolerance. The results indicated some mechanism differences between Moneymaker and LA0317 in salt response, proposed the potentially high salt tolerance of cultivated tomato and implied that Moneymaker is a valuable gene donor in this field, potentially minimizing the growth inhibition and yield reduction in transgenic plants.
Resumo:
Twenty-seven patients undergoing treatment in a high-secure forensic facility participated in focus group interviews to elicit their perceptions of (1) the factors leading to aggressive behaviour; and (2) strategies to reduce the risk of such behaviour. The focus group interviews were audiotaped, transcribed and analysed using content analysis. The participants identified that a combination of patient, staff and environmental factors contributed to violence in the study wards. The cause of aggressive behaviour centred around five major themes: the environment; empty days; staff interactions; medication issues; and patient-centred factors. Potential strategies identified by patients to reduce aggressive behaviour included: early intervention; the provision of meaningful activities to reduce boredom; separation of acutely disturbed patients; improved staff attitudes; implementation of effective justice procedures; and a patient advocate to mediate during times of conflict. Findings suggested that social and organizational factors need to be addressed to change the punitive subculture inherent in forensic psychiatric facilities, and to ensure a balance between security and effective therapy.
Resumo:
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings. Upon their introduction just over ten years ago the computation of pairings was far too slow for them to be considered a practical option. This resulted in a vast amount of research from many mathematicians and computer scientists around the globe aiming to improve this computation speed. From the use of modern results in algebraic and arithmetic geometry to the application of foundational number theory that dates back to the days of Gauss and Euler, cryptographic pairings have since experienced a great deal of improvement. As a result, what was an extremely expensive computation that took several minutes is now a high-speed operation that takes less than a millisecond. This thesis presents a range of optimisations to the state-of-the-art in cryptographic pairing computation. Both through extending prior techniques, and introducing several novel ideas of our own, our work has contributed to recordbreaking pairing implementations.
Resumo:
Background The control of plant anthocyanin accumulation is via transcriptional regulation of the genes encoding the biosynthetic enzymes. A key activator appears to be an R2R3 MYB transcription factor. In apple fruit, skin anthocyanin levels are controlled by a gene called MYBA or MYB1, while the gene determining fruit flesh and foliage anthocyanin has been termed MYB10. In order to further understand tissue-specific anthocyanin regulation we have isolated orthologous MYB genes from all the commercially important rosaceous species. Results We use gene specific primers to show that the three MYB activators of apple anthocyanin (MYB10/MYB1/MYBA) are likely alleles of each other. MYB transcription factors, with high sequence identity to the apple gene were isolated from across the rosaceous family (e.g. apples, pears, plums, cherries, peaches, raspberries, rose, strawberry). Key identifying amino acid residues were found in both the DNA-binding and C-terminal domains of these MYBs. The expression of these MYB10 genes correlates with fruit and flower anthocyanin levels. Their function was tested in tobacco and strawberry. In tobacco, these MYBs were shown to induce the anthocyanin pathway when co-expressed with bHLHs, while over-expression of strawberry and apple genes in the crop of origin elevates anthocyanins. Conclusions This family-wide study of rosaceous R2R3 MYBs provides insight into the evolution of this plant trait. It has implications for the development of new coloured fruit and flowers, as well as aiding the understanding of temporal-spatial colour change.
Resumo:
Partial virus genome sequence with high nucleotide identity to Cotton leafroll dwarf virus (CLRDV) was identified from two cotton (Gossypium hirsutum) samples from Thailand displaying typical cotton leaf roll disease symptoms. We developed and validated a PCR assay for the detection of CLRDV isolates from Thailand and Brazil.
Resumo:
[ES]El proyecto incluido en este trabajo de fin de grado trata sobre el diseño de una instalación blindada para realización de gammagrafía industrial. Para poder realizar este ensayo es necesario un escudo que haga frente a la radiación de manera efectiva, con el fin de reducir la posibilidad de daños en la salud de aquellos individuos que se encuentren en las inmediaciones. Para calcular el espesor necesario se usará el software MCNPX, herramienta para el estudio de interacción de radiación con la materia. Debido a la naturaleza invisible e indetectable por medios naturales son necesarios unos protocolos de uso muy estrictos y grandes medidas de seguridad con la finalidad de evitar problemas de salud o accidentes
Resumo:
A novel kinin-releasing and fibrin (ogen)olytic enzyme termed jerdonase was purified to homogeneity from the venom of Trimeresurus jerdonii by DEAE Sephadex A-50 anion exchange, Sephadex G-100 (superfine) gel filtration and reverse-phase high performance liquid chromatography (RP-HPLC). Jerdonase migrated as a single band with an approximate molecular weight of 55 kD under the reduced conditions and 53 kD under the non-reduced conditions. The enzyme was a glycoprotein containing 35.8% neutral carbohydrate. The N-terminal amino acid sequence of jerdonase was determined to be IIGGDECNINEHPFLVALYDA, which showed high sequence identity to other snake venom serine proteases. Jerdonase catalyzed the hydrolysis of BAEE, S-2238 and S-2302, which was inhibited by phenymethylsulfonyl fluoride (PMSF), but not affected by ethylenediaminetetraacetic acid (EDTA). Jerdonase preferentially cleaved the Aalpha-chain of human fibrinogen with lower activity towards Bbeta-chain. Moreover, the enzyme hydrolyzed bovine low-molecular-mass kininogen and releasing bradykinin. In conclusion, all results indicated that jerdonase was a multifunctional venom serine protease.
Resumo:
A fibrinogen-clotting enzyme designed as jerdonobin-II was isolated from the venom of Trimeresurus jerdonii. It differed in molecular weight and N-terminal sequence with the previously isolated jerdonobin, a thrombin-like enzyme from the same venom. The enzyme consists of a single polypeptide chain with molecular weights of 30,000 and 32,000 under non-reducing and reducing conditions, respectively. Jerdonobin-II showed weak fibrinogen clotting activity and its activity unit on fibrinogen was calculated to be less than one unit using human thrombin as standard. The precursor protein sequence of jerodonobin-II was deduced from cloned cDNA sequence. The sequence shows high similarity (identity = 89%) to TSV-PA, a specific plasminogen activator from venom of T stejnegeri. Despite of the sequence similarity, jerdonobin-II was found devoid of plasminogen activating effect. Sequence alignment analysis suggested that the replacement of Lys(239) in TSV-PA to Gln(239) in jerdonobin-II might play an important role on their plasminogen activating activity difference. (C) 2005 Elsevier Ltd. All rights reserved.
Resumo:
Recent studies have shown that the ferric uptake regulator (Fur) of Edwardsiella tarda (Fur(Et)) shares high sequence identity with the Escherichia coli Fur (Fur(Ec)) at the N-terminal DNA-binding region. In the present study, the functional importance of the C-terminal region of Fur(Et) was investigated. It was found that Fur(Et) bearing deletion of the C-terminal 12 residues still possesses most of the repressor activity, whereas Fur(Et) bearing deletions of the C-terminal 16 and more than 16 residues are severely affected in activity. Domain swapping analyses indicated that the chimeric Fur proteins (Et75Ec73 and Et75Vh74) consisting of the N-terminal 1-75 region of Fur(Et) fused to the C-terminal 76-148 region of Fur(Ec) and the C-terminal 76-149 region of the Vibrio harveyi Fur (Fur(Vh)), respectively, are fully active. C92 of Fur(Ec) and C137 of Fur(Vh), which are functionally essential in Fur(Ec) and Fur(Vh), respectively, are also essential in Et75Ec73 and Et75074, respectively. Further study identified an artificial Fur protein, EtMF54, which is composed of the N-terminal 49 residues of Fur(Et) and five artificial residues. Compared to Fur(Et), EtMF54 possesses partial Fur activity that is iron-dependent. These results (I) indicate that there exist certain functional/structural compatibilities among Fur(Et), Fur(Ec), and Fur(Vh) at the C-terminal region; (ii) provide insights to the potential location of the regulatory ion-binding site of Fur(Et).
Resumo:
A full-length Cks1 homologue gene, AmphiCks1, was identified in amphioxus, Branchiostoma belcheri tsingtauense. Sequence characteristics, phylogeny and patterns of expression during embryonic and larval development were established. The protein predicted from AmphiCks1 showed high sequence identity with vertebrate and invertebrate homologues. Protein structural studies and phylogenetic analysis suggested that Cks homologues are evolutionarily conserved. The AmphiCks1 transcript was detected in most early developmental stages by northern blotting and whole-mount in situ hybridization, suggesting a role for the gene in cell division. (c) 2005 International Federation for Cell Biology. Published by Elsevier Ltd. All rights reserved.
Resumo:
The skin secretions of frogs and toads (Anura) have long been a known source of a vast abundance of bioactive substances. In the past decade, transcriptome data of the granular glands of anuran skin has given new impetus to investigations of the putative constituent peptides. Alytes obstetricans was recently investigated and novel peptides with antimicrobial activity were isolated and functionally characterised. However, genetic data for the evolutionarily ancient lineage to which Alytes belongs (midwife toads; Alytidae) remains unavailable.
Here we present the first such genetic data for Alytidae, derived via the granular gland transcriptome of a closely-related species of midwife toad, Alytes maurus. First, we present nucleotide sequences of the entire peptide precursors for four novel antimicrobial peptides (AMPs). The two precursors resemble those from Bombinatoridae in both their structural architecture and amino acid sequence. Each precursor comprises two AMPs as tandem repeats, with a member of the alyteserin-1 family (alyteserin-1Ma: GFKEVLKADLGSLVKGIAAHVAN-NH2 or alyteserin-1Mb: GFKEVLKAGLGSLVKGIPAHVAN-NH2) followed by its corresponding member from the alyteserin-2 family (alyteserin-2Ma: FIGKLISAASGLLSHL-NH2 or alyteserin-2Mb: ILGAIIPLVSGLLSHL-NH2). Synthetic replicates of the four AMPs possessed minimal inhibitory concentrations (MICs) ranging from 9.5 to 300 µM, with the most potent being alyteserin-2Ma. Second, we also cloned the cDNA encoding an alytesin precursor, with the active alytesin exhibiting high sequence identity to bombesin-related peptides from other frogs. All putative mature peptide sequences were confirmed to be present in the skin secretion via LC/MS.
The close structural resemblance of the alyteserin genes that we isolated for A. maurus with those of Bombina provide independent molecular evidence for a close evolutionary relationship between these genera as well as more support for the convergent evolution of the AMP system within anurans. In contrast to the more evolutionarily conserved nature of neuropeptides (including alytesin, which we also isolated), the more variable nature of the AMP system together with the sporadic distribution of AMPs among anuran amphibians fuels in part our hypothesis that the latter system was co-opted secondarily to fulfil a function in the innate immune system, having originally evolved for defence against potential macropredators.
Resumo:
Cloud services are exploding, and organizations are converging their data centers in order to take advantage of the predictability, continuity, and quality of service delivered by virtualization technologies. In parallel, energy-efficient and high-security networking is of increasing importance. Network operators, and service and product providers require a new network solution to efficiently tackle the increasing demands of this changing network landscape. Software-defined networking has emerged as an efficient network technology capable of supporting the dynamic nature of future network functions and intelligent applications while lowering operating costs through simplified hardware, software, and management. In this article, the question of how to achieve a successful carrier grade network with software-defined networking is raised. Specific focus is placed on the challenges of network performance, scalability, security, and interoperability with the proposal of potential solution directions.
Resumo:
Je reconnais l’aide financière du Centre d’études ethniques des Universités montréalaises (CEETUM), du Ministère de l’Éducation – Aide Financières au Études (AFE), et ainsi que de l’Université de Montréal (Département de psychologie et Faculté des études supérieures) dans la réalisation de ce mémoire.