834 resultados para security, usability, identity management, authentication, authorization
Resumo:
The Iowa Homeland Security and Emergency Management Department administers the E911 Program per Code of Iowa, Chapter 34A to protect the health, safety, and welfare of the people of Iowa. Iowa has 115 Public Safety Answering Points across 99 counties that handle both landline and wireless 911 calls for the citizens of Iowa.Enhanced 911 (E911) means a service which provides the user of a public telephone system the ability to reach a public safety answering point (PSAP) by dialing the digits 911.
Resumo:
This annual report highlights the many programs and initiatives with which the Iowa Homeland Security and Emergency Management Division is involved.
Resumo:
The goal of this work is to design and implement authentication and authorization section to PeerHood system. PeerHood system is developedin Lappeenranta University of Technology. It provides functions of discovering devices compatible with PeerHood and listing services offered by those devices; based on wireless technologies: Wi-Fi, Bluetooth and GPRS. The thesis describes implementation of the security approach intomobile Ad-Hoc environment and includes both authentication and authorization processes.
Resumo:
Lyhyen kantaman radiotekniikoiden hyödyntäminen mahdollistaa uudenlaisten paikallisten palveluiden käytön ja vanhojen palveluiden kehittämisen. Kulunvalvonta on päivittäisenä palveluna valittu työn esimerkkisovellukseksi. Useita tunnistus- ja valtuutustapoja tutkitaan, ja julkisen avaimen infrastruktuuri on esitellään tarkemmin. Langattomat tekniikat Bluetooth, Zigbee, RFID ja IrDA esitellän yleisellä tasolla langattomat tekniikat –luvussa. Bluetooth-tekniikan rakennetta, mukaan lukien sen tietoturva-arkkitehtuuria, tutkitaan tarkemmin. Bluetooth-tekniikkaa käytetään työssä suunnitellun langattoman kulunvalvontajärjestelmän tietojen siirtoon. Kannettava päätelaite toimii käyttäjän henkilökohtaisena luotettuna laitteena, jota voi käyttää avaimena. Käyttäjän tunnistaminen ja valtuuttaminen perustuu julkisen avaimen infrastruktuuriin. Ylläpidon allekirjoittamat varmenteet sisältävät käyttäjän julkisen avaimen lisäksi tietoa hänestä ja hänen oikeuksistaan. Käyttäjän tunnistaminen kulunvalvontapisteissä tehdään julkisen ja salaisen avaimen käyttöön perustuvalla haaste-vastaus-menetelmällä. Lyhyesti, järjestelmässä käytetään Bluetooth-päätelaitteita langattomina avaimina.
Resumo:
Aufbau einer föderativen Dienstlandschaft in der Ruhr-Region auf Basis von SAML mit dem Ziel eine organisationsübergreifende Nutzung von webbasierten IT-Diensten zu ermöglichen
Resumo:
This research addressed the development of a consolidated model designed especially to cover the security and usability attributes of a software product. As a starting point, we built a new usability model on the basis of well-known quality standards and models. We then used an existing security model to analyse the relationship between these two approaches. This analysis consisted of a systematic mapping study of the relationship between security and usability as global quality factors. We identified five relationship types: inverse, direct, relative, one-way inverse, and no relationship. Most authors agree that there is an inverse relationship between security and usability. However, this is not a unanimous finding, and this study unveils a number of open questions, like application domain dependency and the need to explore lower-level relationships between attribute subcharacteristics. In order to clarify the questions raised during the research, we conducted a second systematic mapping to further analyse the finer-grained structure of these factors, such as authentication as a subset of security and user efficiency as a subset of usability. The most relevant finding is that efficiency does not depend on the security level during the authentication process. There are other subfactors that require analysis. Accordingly, this research is the first part of a larger project to develop a full-blown consolidated model for security and usability.
Resumo:
Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.
Liferay, Lecture2Go, Hochschulapps, OERs-MOOCs, Open IDM, e-Identity, CampusSource White Paper Award
Resumo:
Vorträge und Präsentationen von der CampusSource Tagung am 25.04.2013 bei der FernUniversität in Hagen zu den Themen:Liferay, Lecture2Go, Hochschulapps, OERs-MOOCs, Open IDM, e-Identity, CampusSource White Paper Award
Resumo:
The Business and Information Technologies (BIT) project strives to reveal new insights into how modern IT impacts organizational structures and business practices using empirical methods. Due to its international scope, it allows for inter-country comparison of empirical results. Germany — represented by the European School of Management and Technologies (ESMT) and the Institute of Information Systems at Humboldt-Universität zu Berlin — joined the BIT project in 2006. This report presents the result of the first survey conducted in Germany during November–December 2006. The key results are as follows: • The most widely adopted technologies and systems in Germany are websites, wireless hardware and software, groupware/productivity tools, and enterprise resource planning (ERP) systems. The biggest potential for growth exists for collaboration and portal tools, content management systems, business process modelling, and business intelligence applications. A number of technological solutions have not yet been adopted by many organizations but also bear some potential, in particular identity management solutions, Radio Frequency Identification (RFID), biometrics, and third-party authentication and verification. • IT security remains on the top of the agenda for most enterprises: budget spending was increasing in the last 3 years. • The workplace and work requirements are changing. IT is used to monitor employees' performance in Germany, but less heavily compared to the United States (Karmarkar and Mangal, 2007).1 The demand for IT skills is increasing at all corporate levels. Executives are asking for more and better structured information and this, in turn, triggers the appearance of new decision-making tools and online technologies on the market. • The internal organization of companies in Germany is underway: organizations are becoming flatter, even though the trend is not as pronounced as in the United States (Karmarkar and Mangal, 2007), and the geographical scope of their operations is increasing. Modern IT plays an important role in enabling this development, e.g. telecommuting, teleconferencing, and other web-based collaboration formats are becoming increasingly popular in the corporate context. • The degree to which outsourcing is being pursued is quite limited with little change expected. IT services, payroll, and market research are the most widely outsourced business functions. This corresponds to the results from other countries. • Up to now, the adoption of e-business technologies has had a rather limited effect on marketing functions. Companies tend to extract synergies from traditional printed media and on-line advertising. • The adoption of e-business has not had a major impact on marketing capabilities and strategy yet. Traditional methods of customer segmentation are still dominating. The corporate identity of most organizations does not change significantly when going online. • Online sales channel are mainly viewed as a complement to the traditional distribution means. • Technology adoption has caused production and organizational costs to decrease. However, the costs of technology acquisition and maintenance as well as consultancy and internal communication costs have increased.
Resumo:
Shipping list no.: 2003-0242-P.
Resumo:
For the last several years, mobile devices and platform security threats, including wireless networking technology, have been top security issues. A departure has occurred from automatic anti-virus software based on traditional PC defense: risk management (authentication and encryption), compliance, and disaster recovery following polymorphic viruses and malware as the primary activities within many organizations and government services alike. This chapter covers research in Turkey as a reflection of the current market – e-government started officially in 2008. This situation in an emerging country presents the current situation and resistances encountered while engaging with mobile and e-government interfaces. The authors contend that research is needed to understand more precisely security threats and most of all potential solutions for sustainable future intention to use m-government services. Finally, beyond m-government initiatives' success or failure, the mechanisms related to public administration mobile technical capacity building and security issues are discussed.
Resumo:
The development of economical relations increases the interaction between organizations and stakeholders. It is no more acceptable to manage an organization under a transactional perspective where suppliers had a fundamental role. Nowadays organizations are being managed under a relational perspective where relations and relationship management in general have consequences in identity management (Hakansson e Snehota, 1989, 1995). A correct perception and management of identity is necessary to achieve distinctiveness in the competitive environment. This way, identity is influenced by relations with stakeholders in general and particularly with competitors. The ICIG concept states that identity is related with the values of the organization and it helps creating distinctiveness in the competitive environment (Van Riel, Balmer, 1997); Baker and Balmer (1997) state that identity is what the organization is; Suvatjis and de Chernatony (2005) refer that expressing identity is a dynamic process that evolves the use of a management model to face context changes; Kapferer (1991) states that brand identity is the project, the self conception of the brand. After reviewing and confronting literature under the plethora of identities’ concepts and perspectives (He, Balmer, 2007) one can’t find an integrative answer with all the elements that contribute to identity of organizations. The authors are strongly interested to contribute to the elimination of this limitation and to answer to strategic management needs. In a marketing context one can find: - the corporate identity approach that is focused in the distinctive attributes of an organization (Abratt, Balmer, Marwick e Fill, Stuart, Balmer and Gray, Alessandri, Suvatjis and de Chernatony) - the brand identity approach (related with the application of corporate identity studies to brands) - Kapferer, Semprini, Aaker, de Chernatony). Kapferer (1991), one of the most prolific authors in this field was the first author to integrate identity in a brand concept. In his view, identity is an emission concept. This idea is shared also by Aaker (1996). Yet, identity has to be managed in a competitive environment which is constantly changing. After reviewing and confronting literature, authors select concepts that are generally accepted by the investigators in order to design a model to analyze and manage identity: - corporate identity models: personality, image/reputation, culture, philosophy, mission, strategy, structure, communication - some of these concepts derive from identity models and others from identity management models; - brand identity models – Kapferer (1991, 2008) identity prism, witch is basis of literature in this field: culture, physical facet, personality, relationship (between brand and consumer), reflected consumer, consumers` self-concept. After discussion authors decide to include other concept in line with other authors` view: country of origin (Aaker, 1996). A discussion eliminates the twin concepts and the final selection is as follows: personality, image/reputation, culture (including philosophy and mission), strategy, structure, communication, culture, physical facet, relationship (between brand and consumer), reflected consumer, consumers` self-concept and according to authors` reflections “relationships” deriving from competitors` actions in competitive environment. Competitors’ actions and decisions have a stronger influence in the organizations` positioning than any other stakeholder as stated before. This is a work in progress towards a new model in identity analysis and management so an exploratory study will follow inquiring experts on identity in order to evaluate these concepts and correct the theoretical perspectives.
Resumo:
Identity is traditionally defined as an emission concept (Kapferer, 2008). Yet, some research points out that there are external factors that that can influence it (Kennedy, 1975; Markwick e Fill, 1997; Balmer e Gray, 2000). This subject is even more interesting if one considers corporate brands. According to Aaker (2004) the number, the power and the credibility of corporate associations are bigger in the case corporate brands. Literature recognizes the influence of relationships between companies in identity management (Hakansson and Snehota, 1989, 1995; Hakansson and Ford, 2002). Yet, given the increasingly important role of corporate brands, it is surprising that to date no attempt to evaluate that influence has been made in corporate brand´s identity management and reputation. Also Keller and Lehman (2006) highlight relationships and costumer experience as two areas requiring more investigation. The authors argue that corporate brand´s identity can be developed under a relational perspective using relationships with other recognised brands in order to generate positive reputations in stakeholders. Based in relationship and corporate brand identity management, a framework is developed to identify how corporate brands select, develop and invest in relationships with other brands. The context of the proposed relationship concept is the services area (Dwyer et al, 1987; Moorman et al, 1992; Rauyruen et al, 2005 and Hennig-Thurau and Klee, 1997). An empirical qualitative research is designed using two reputational technological higher education institutions (two corporate brands) acting in Portuguese public higher education market.
Resumo:
El despliegue de un esquema de confianza es fundamental para poder desarrollar servicios de seguridad que permitan administrar y operar una red. Sin embargo, las soluciones empleadas en las redes tradicionales no se adaptan a un entorno ad hoc debido a la naturaleza dinámica y sin infraestructura de estas redes. En el presente trabajo se propone un esquema de confianza práctico y eficiente basado en una infraestructura de clave pública distribuida, umbral y jerárquica, que no requiere sincronización temporal entre todos los nodos de la red. La autorización de usuarios en el sistema se hace a través de certificados de corta duración que eliminan la necesidad de mantener la publicación y diseminación de unas listas de revocación. Por otro lado, una entidad externa de confianza permite alargar la reputación de un usuario de la red más allá de la existencia de la propia red.
Resumo:
Diplomityössä on tutkittu toteutettavan kunnossapidon hallintajärjestelmän ekstranet- ja asiakasrajapintojen rakentamiseen tarvittavaa teknologiaa sekä sitä, millaisia ratkaisuja tietoturvallisuuden ja käytettävyyden varmistaminen vaatii. Tulosten perusteella esitetään vaihtoehtoisia ratkaisuja paikkariippumattomien etäyhteyksien toteuttamiseksi työntekijöille ja asiakaskumppaneille. Vaihtoehdoista valitaan lopuksi asetettuihin kriteereihin nähden paras suositeltavaksi ekstranet- ja asiakasrajapintojen toteutukseksi. Yritysten välisen asiakas- ja kumppanuusyhteistyön lisääntyessä syntyy yhä useammin tarve tarjota omien työntekijöiden lisäksimyös valituille kumppaneille rajattu pääsy yrityksen sisäisiin järjestelmiin. Tällaisten etäyhteyksien toteuttamiseksi tarvitaan rajapinta käyttäjien ja järjestelmien välille. Päätös rajapintatoteutuksesta riippuu siitä, miten eri vaihtoehdot täyttävät käytölle asetetut tietoturvallisuus- ja käytettävyystavoitteet.