875 resultados para SSO,Shibboleth,2FA,ADFS,Strong Authentication
Resumo:
The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impact their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on giving the user a hardware token that generates one-time-passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this paper, we propose a scalable OTP solution using mobile phones and based on trusted computing technology that combines enhanced usability with strong security.
Resumo:
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and integrity of the navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of navigation message authentication for Galileo and next generation GPS systems.
Resumo:
This paper describes a secure framework for tracking applications that use the Galileo signal authentication services. First a number of limitations that affect the trust of critical tracking applications, even in presence of authenticated GNSS signals, are detailed. Requirements for secure tracking are then introduced; detailing how the integrity characteristics of the Galileo authentication could enhance the security of active tracking applications. This paper concludes with a discussion of our existing tracking technology using a Siemens TC45 GSM/GPRS module and future development utilizing our previously proposed trusted GNSS receiver.
Resumo:
Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in real world applications and continuous authentication scenarios. One of the main issues is that the presented CBAS are based on several samples of training data either of both intruder and valid users or only the valid users' profile. This means that historical profiles for either the legitimate users or possible attackers should be available or collected before prediction time. However, in some cases it is impractical to gain the biometric data of the user in advance (before detection time). Another issue is the variability of the behaviour of the user between the registered profile obtained during enrollment, and the profile from the testing phase. The aim of this paper is to identify the limitations in current CBAS in order to make them more practical for real world applications. Also, the paper discusses a new application for CBAS not requiring any training data either from intruders or from valid users.
Resumo:
Social enterprises are diverse in their mission, business structures and industry orientations. Like all businesses, social enterprises face a range of strategic and operational challenges and utilize a range of strategies to access resources in support of their venture. This exploratory study examined the strategic management issues faced by Australian social enterprises and the ways in which they respond to these. The research was based on a comprehensive literature review and semi-structured interviews with 11 representatives of eight social enterprises based in Victoria and Queensland. The sample included mature social enterprises and those within two years of start-up. In addition to the research report, the outputs of the project include a series of six short documentaries, which are available on YouTube at http://www.youtube.com/user/SocialEnterpriseQUT#p/u. The research reported on here suggests that social enterprises are sophisticated in utilizing processes of network bricolage (Baker et al. 2003) to mobilize resources in support of their goals. Access to network resources can be both enabling and constraining as social enterprises mature. In terms of the use of formal business planning strategies, all participating social enterprises had utilized these either at the outset or the point of maturation of their business operations. These planning activities were used to support internal operations, to provide a mechanism for managing collective entrepreneurship, and to communicate to external stakeholders about the legitimacy and performance of the social enterprises. Further research is required to assess the impacts of such planning activities, and the ways in which they are used over time. Business structures and governance arrangements varied amongst participating enterprises according to: mission and values; capital needs; and the experiences and culture of founding organizations and individuals. In different ways, participants indicated that business structures and governance arrangements are important ways of conferring legitimacy on social enterprise, by signifying responsible business practice and strong social purpose to both external and internal stakeholders. Almost all participants in the study described ongoing tensions in balancing social purpose and business objectives. It is not clear, however, whether these tensions were problematic (in the sense of eroding mission or business opportunities) or productive (in the sense of strengthening mission and business practices through iterative processes of reflection and action). Longitudinal research on the ways in which social enterprises negotiate mission fulfillment and business sustainability would enhance our knowledge in this area. Finally, despite growing emphasis on measuring social impact amongst institutions, including governments and philanthropy, that influence the operating environment of social enterprise, relatively little priority was placed on this activity. The participants in our study noted the complexities of effectively measuring social impact, as well as the operational difficulties of undertaking such measurement within the day to day realities of running small to medium businesses. It is clear that impact measurement remains a vexed issue for a number of our respondents. This study suggests that both the value and practicality of social impact measurement require further debate and critically informed evidence, if impact measurement is to benefit social enterprises and the communities they serve.
Resumo:
AWARD-WINNING American play and screen writer Neil LaBute is known for producing character-driven dramas that concentrate on the darker side of human nature and desire. In Fat Pig, LaBute picks up on a familiar theme: the way a perverse social preference for physical perfection affects human relationships. It is a topic LaBute has tackled before in The Shape of Things, a compelling play in which a beautiful young woman's efforts to help her new boyfriend pursue a program of self-improvement are eventually revealed to be part of a bizarre human experiment for her master-of-fine-arts degree.
Resumo:
The purpose of this research is to report preliminary empirical evidence regarding the association between common physical performance measures and health-related quality of life (HRQoL) of hospitalized older adults recovering from illness and injury. Frequently, these patients do not return to premorbid levels of independence and physical ability. Rehabilitation for this population often focuses on improving physical functioning and mobility with the intention of maximizing their HRQoL for discharge and thereafter. For this reason, longitudinal use of physical performance measures as an indicator of improvement in physical functioning (and thus HRQoL) is common. Although this is a logical approach, there have been mixed results from previous investigations into the association between common measures of physical function and HRQoL amongst other adult patient populations.1,2 There has been no previous investigation reporting the association between HRQoL and a variety of common physical performance measures in hospitalized older adults.
Resumo:
Human resource flexibility is important in entrepreneurial ventures that need to respond to the changing challenges of growing the new business. This research investigates the impact of previously well-known people (strong ties) as entrepreneurial team members on the human resource flexibility of new ventures. Data collected from German founding entrepreneurs in technology-oriented, incubator-based firms shows that choosing a well known individual to join the entrepreneurial team increases the founder's ability to modify the team member's work role, but complicates asking the team member to leave the team if required. Hence, strong ties both increase and reduce human resource flexibility. However, the effect of strong ties on role modifiability is statistically significant only with novice entrepreneurs. These research findings counsel founders to discuss role modification and exit during partnership and entrepreneurial team membership negotiations.
Resumo:
X.509 public key certificates use a signature by a trusted certification authority to bind a given public key to a given digital identity. This document specifies how to use X.509 version 3 public key certificates in public key algorithms in the Secure Shell protocol.
Resumo:
This brief consumer marketing case study was published in a consumer marketing text book.
Resumo:
1. A diverse array of patterns has been reported regarding the spatial extent of population genetic structure and effective dispersal in freshwater macroinvertebrates. In river systems, the movements of many taxa can be restricted to varying degrees by the natural stream channel hierarchy. 2. In this study, we sampled populations of the non-biting freshwater midge Echinocladius martini in the Paluma bioregion of tropical northeast Queensland to investigate fine scale patterns of within- and among-stream dispersal and gene flow within a purported historical refuge. We amplified a 639 bp fragment of mitochondrial COI and analysed genetic structure using pairwise ΦST, hierarchical AMOVA, Mantel tests and a parsimony network. Genetic variation was partitioned among stream sections using Streamtree to investigate the effect of potential instream dispersal barriers. 3. The data revealed strong natal site fidelity and significant differentiation among neighbouring, geographically proximate streams. We found evidence for only episodic adult flight among sites on separate stream reaches. Overall, however, our data suggested that both larval and adult dispersal was largely limited to within a stream channel. 4. This may arise from a combination of the high density of riparian vegetation physically restricting dispersal and from the joint effects of habitat stability and large population sizes. Together these may mitigate the requirement for movement among streams to avoid inbreeding and local extinction due to habitat change and may thus enable persistence of upstream populations in the absence of regular compensatory upstream flight. Taken together, these data suggest that dispersal of E. martini is highly restricted, to the scale of only a few kilometres, and hence occurs predominantly within the natal stream.
Resumo:
Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.
Resumo:
Crystal growth of bulk CdTe in short-duration microgravity is performed by the unidirectional cooling method. The largest growth grains in microgravity samples are 4X2mm. The cooling profiles indicate undercooling melts in microgravity. Cooling melt samples in microgravity generate strong gradient of temperature due to stop thermal convections. Temperature distribution in the melt is calculated by the one-dimensional equation of heat conduction, and about 100 K-undercooling is considered to occur at the cooling surface.