885 resultados para implicit authentication


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital services require personal information for a variety of reasons. Due to advances in communication technology, new types of services are evolving alongwith traditional Internet services. Due to the diversity of services, the traditional approaches to personal information handling designed for Internet services are inadequate. Therefore, new approaches are necessary. In this thesis, a solution where personal information is stored in and accessed from the user's mobile device is presented. This approach is called Mobile Electronic Personality (ME). The ME approach is compared to the existing approaches which rely on a database either at a service, a trusted third party or a client program. Various personal information properties are taken into account in the comparison of storage locations. The thesis presents both the internal and the communication architecture of the ME. The internal architecture defines how the information is stored in the mobile device. The communication architecture defines how the information can be accessed by different types of services from the ME. The use of the architecture is described for services in different environments. A simple ME based solution for the authentication of a user is defined. The authentication of service, which is required to protect the privacy of the users is also presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study focuses on corporate social responsibility (or CSR)as the latest dimension to emerge in the corporate responsibility and sustainability agenda, which in the recent past has rapidly risen to the top of the list of concerns for civil societies worldwide. Despite the continuing debates and discussions about the scope, benefits, and impacts of CSR to business and community in various sectors, levels, and types of society, many companies have moved forward to confront the opportunities and challenges of CSR. Thus, this study is about those proactive companies with a focus on the importance of CSR and its management inside and outside the company. It is an exploration and learning from the experience of Finnish companies, as well as other actors interested or involved in shaping the course of CSR, locally and globally. It also looks closely at how national culture affects the views, thinking, and management of CSR in a welfare state. This dissertation primarily draws on the analyses of information collected from a series of qualitative interviews and the existing literature in the area. This is complemented by an analysis of written and published documents on CSR from various sources. The results of the study give insightful information and detailed descriptions of a roadmap useful in learning and understanding CSR in Finnish companies. Despite the varying conceptual connotations, essential roadmap indicators point to the importance of framing CSR within the corporate responsibility concept, Finnish development and the welfare state system, globalization, stakeholders, and the pursuit of sustainable development as the main drivers of CSR, the remarkable progress of CSR in companies, and identification of key management areas and practices relevant to CSR. Similarly,the study reveals the importance of culture as essential in understanding and learning CSR. Finnish culture has a positive influence on the views, thinking, and management practices of CSR issues. Such a positive influence of culture, therefore, makes it easy for business people to discuss and understand CSR, because those CSR issues are already considered common and taken-for-granted by Finns and are implicit in the welfare state provisions. The experience of Finnish companies in implementing CSR policies in the supply chain is a concrete proactive step in advancing the message of CSR, that is, to bring companies and suppliers together to work on improving and strengthening relationships towards socially responsible practices worldwide. Such a forward step to deal with CSR issues in the supply chain reflects the companies' commitments and belief that CSR can be managed with the suppliers and gain positive benefits. Despite the problems and complexities, particularly in the global supply chain, managing CSR for Finnish companies presents new opportunities and challenges that are expected to intensify in the near future. The focus on CSR policy implementation inthe supply chain points to the importance of companies taking initiatives and forging cooperation with suppliers with the aim of addressing and improving CSR questions in the supply chains. The proactive stance of Finnish companies toward CSR is complemented by the active supporting role of important societalactors such as the government and NGOs. These actors carry out various promotional efforts and campaigns, thus bringing CSR into the mainstream of Finnish companies and strengthening the synergistic learning about CSR within the Finnish business and civil circles. The efforts of the government and NGOs to promote CSR are indicative of the importance of multipartite involvement and the emergence of better civil regulations. Likewise, their drive to learn from each other, exchange experiences, and contribute in CSR debates facilitated the evolution of CSRnetworks in the country. The results of this study add to the mounting evidence that CSR, in general, has created a new dimension in managing corporate sustainability. This study provides compelling empirical evidence and some direct quotations about CSR in the Finnish context. This information can be used to learn and gain new useful insights, approaches, and concepts for managing CSR.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Control applications of switched mode power supplies have been widely investigated. The main objective ofresearch and development (R&D) in this field is always to find the most suitable control method to be implemented in various DC/DC converter topologies. Inother words, the goal is to select a control method capable of improving the efficiency of the converter, reducing the effect of disturbances (line and load variation), lessening the effect of EMI (electro magnetic interference), and beingless effected by component variation. The main objective of this research work is to study different control methods implemented in switched mode power supplies namely (PID control, hysteresis control, adaptive control, current programmed control, variable structure control (VSC), and sliding mode control (SMC). The advantages and drawbacks of each control method are given. Two control methods, the PID and the SMC are selected and their effects on DC/DC (Buck, Boost, and Buck-Boost) converters are examined. Matlab/SimulinkTM is used to implement PID control method in DC/DC Buck converter and SMC in DC/DC (Buck, and Buck Boost) converters. For the prototype, operational amplifiers (op-amps) are used to implement PID control in DC/DC Buck converter. For SMC op-amps are implemented in DC/DC Buck converter and dSPACETM is used to control the DC/DC Buck-Boost converter. The SMC can be applied to the DC/DC (Buck, Boost, and Buck-Boost) converters. A comparison of the effects of the PID control and the SMC on the DC/DC Buck converter response in steady state, under line variations, load variations, and different component variations is performed. Also the Conducted RF-Emissions between the PID and SMC DC/DC Buck Converter are compared. The thesis shows that, in comparison with the PID control, the SMC provides better steady-state response, better dynamic response, less EMI, inherent order reduction, robustness against system uncertainty disturbances, and an implicit stability proof. Giving a better steady-state and dynamic response, the SMC is implemented in a DC/DC resonant converter. The half-wave zero current switching (HWZCS) DC/DC Buck converter is selected as a converter topology. A general guideline to select the tank component values, needed for the designing of a HWZCS DC/DC Buck, is obtained. The implementation of the SMC to a HWZCS DC/DC Buck converter is analysed. The converter response is investigated in the steady-state region and in the dynamic region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of contextual information in mobile devices is receiving increasing attention in mobile and ubiquitous computing research. An important requirement for mobile development today is that devices should be able to interact with the context. In this paper we present a series of contributions regarding previous work on context-awareness. In the first place, we describe a client-server architecture that provides a mechanism for preparing target non context-aware applications in order to be delivered as context-aware applications in a semi-automatic way. Secondly, the framework used in the server to instantiate specific components for context-awareness, the Implicit Plasticity Framework, provides independence from the underlying mobile technology used in client device, as it is shown in the case studies presented. Finally, proposed infrastructure deals with the interaction among different context constraints provided by diverse sensors. All of these contributions are extensions to the infrastructure based on the Dichotomic View of plasticity, which now offers multi-purpose support.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our efforts are directed towards the understanding of the coscheduling mechanism in a NOW system when a parallel job is executed jointly with local workloads, balancing parallel performance against the local interactive response. Explicit and implicit coscheduling techniques in a PVM-Linux NOW (or cluster) have been implemented. Furthermore, dynamic coscheduling remains an open question when parallel jobs are executed in a non-dedicated Cluster. A basis model for dynamic coscheduling in Cluster systems is presented in this paper. Also, one dynamic coscheduling algorithm for this model is proposed. The applicability of this algorithm has been proved and its performance analyzed by simulation. Finally, a new tool (named Monito) for monitoring the different queues of messages in such an environments is presented. The main aim of implementing this facility is to provide a mean of capturing the bottlenecks and overheads of the communication system in a PVM-Linux cluster.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The dominance of ''ecosystem services'' as a guiding concept for environmental management - where it appears as a neutral, obvious, taken-for-granted concept - hides the fact that there are choices implicit in its framing and in its application. In other words, it is a highly political concept, and its utility depends on the arena in which it is used and what it is used for. Following a political ecology framework, and based on a literature review, bibliometric analyses, and brief examples from two tropical rainforest countries, this review investigates four moments in the construction and application of the ecosystem services idea: socio-historical (the emergence of the discourse), ontological (what knowledge does the concept allow?), scientific (difficulties in its practical application), and political (who wins, who loses?). We show how the concept is a boundary object with widespread appeal, trace the discursive and institutional context within which it gained traction, and argue that choices of scale, definition, and method in measuring ecosystem services frustrate its straightforward application. As a result, it is used in diverse ways by dif- ferent interests to justify different kinds of interventions that at times might be totally opposed. In Madagascar, the ecosystem services idea is mainly used to justify forest conservation in ways open to cri- tique for its neoliberalization of nature or disempowerment of communities. In contrast, in the Brazilian Amazon, the discourse of ecosystem services has served the agendas of traditional populations and family farm lobbies. Ecosystem services, as an idea and tool, are mobilized by diverse actors in real-life situa- tions that lead to complex, regionally particular and fundamentally political outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PLFC is a first-order possibilistic logic dealing with fuzzy constants and fuzzily restricted quantifiers. The refutation proof method in PLFC is mainly based on a generalized resolution rule which allows an implicit graded unification among fuzzy constants. However, unification for precise object constants is classical. In order to use PLFC for similarity-based reasoning, in this paper we extend a Horn-rule sublogic of PLFC with similarity-based unification of object constants. The Horn-rule sublogic of PLFC we consider deals only with disjunctive fuzzy constants and it is equipped with a simple and efficient version of PLFC proof method. At the semantic level, it is extended by equipping each sort with a fuzzy similarity relation, and at the syntactic level, by fuzzily “enlarging” each non-fuzzy object constant in the antecedent of a Horn-rule by means of a fuzzy similarity relation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the context of a two-dimensional exactly solvable model, the dynamics of quantum black holes is obtained by analytically continuing the description of the regime where no black hole is formed. The resulting spectrum of outgoing radiation departs from the one predicted by the Hawking model in the region where the outgoing modes arise from the horizon with Planck-order frequencies. This occurs early in the evaporation process, and the resulting physical picture is unconventional. The theory predicts that black holes will only radiate out an energy of Planck mass order, stabilizing after a transitory period. The continuation from a regime without black hole formationaccessible in the 1+1 gravity theory consideredis implicit in an S-matrix approach and suggests in this way a possible solution to the problem of information loss.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La irrupció dels mitjans digitals està generant en les famílies amb adolescents noves formes d'estar junts i de relacionar-se amb l'exterior, que són viscuts sovint amb ansietat per part dels pares. Per estudiar les normes que tant els pares com els seus fills estan generant per regular-les, i com aquestes regulacions es relacionen amb la reproducció de l'avantatge i el desavantatge generalitzat, es proposa superar l'orientació restringida dels riscos i oportunitats i fixar-se en canvi en la manera comles cultures i identitats familiars generen equilibris particulars en les tensions normatives del treball, el consum i l'autenticitat. Mitjançant una recerca empírica qualitativa amb 23 famílies de dos centres d'educació secundària de l'àrea metropolitana de Barcelona, es constata que enlloc de buscar com normes o estils parentals concrets es relacionen amb diferents posicions socials, és preferible analitzar com les diferents cultures i identitats familiars regulen l'adquisició d'autonomia per part dels fills. Aspectes com la familiaritat i reflexivitat vers la tecnologia, l'establiment de rutines i horaris familiars o els contextos relacionals esdevenen així claus per entendre la reproducció de l'avantatge generalitzat. Aquests elements permeten contextualitzar dinàmicament la complexa combinació de les regulacions implícites i explícites en el procés de maduració dels fills.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work, we have studied the texturization process of (100) c-Si wafers using a low concentration potassium hydroxide solution in order to obtain good quality textured wafers. The optimization of the etching conditions have led to random but uniform pyramidal structures with good optical properties. Then, symmetric heterojunctions were deposited by Hot-Wire CVD onto these substrates and the Quasi-Steady-State PhotoConductance technique was used to measure passivation quality. Little degradation in the effective lifetime and implicit open circuit voltage of these devices (< 20 mV) was observed in all cases. It is especially remarkable that for big uniform pyramids, the open-circuit voltage is comparable to the values obtained on flat substrates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work, we investigate heterojunction emitters deposited by Hot-Wire CVD on p-type crystalline silicon. The emitter structure consists of an n-doped film (20 nm) combined with a thin intrinsic hydrogenated amorphous silicon buffer layer (5 nm). The microstructure of these films has been studied by spectroscopic ellipsometry in the UV-visible range. These measurements reveal that the microstructure of the n-doped film is strongly influenced by the amorphous silicon buffer. The Quasy-Steady-State Photoconductance (QSS-PC) technique allows us to estimate implicit open-circuit voltages near 700 mV for heterojunction emitters on p-type (0.8 Ω·cm) FZ silicon wafers. Finally, 1 cm 2 heterojunction solar cells with 15.4% conversion efficiencies (total area) have been fabricated on flat p-type (14 Ω·cm) CZ silicon wafers with aluminum back-surface-field contact.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we use a Terahertz (THz) time-domain system to image and analyze the structure of an artwork attributed to the Spanish artist Goya painted in 1771. The THz images show features that cannot be seen with optical inspection and complement data obtained with X-ray imaging that provide evidence of its authenticity, which is validated by other independent studies. For instance, a feature with a strong resemblance with one of Goya"s known signatures is seen in the THz images. In particular, this paper demonstrates the potential of THz imaging as a complementary technique along with X-ray for the verification and authentication of artwork pieces through the detection of features that remain hidden to optical inspection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Arvokasta tai luottamuksellista tietoa käsittelevien palveluiden, kuten pankki- ja kauppa-palveluiden, tarjoaminen julkisessa Internet-verkossa on synnyttänyt tarpeen vahvalle todennukselle, eli käyttäjien tunnistuksen varmistamiselle. Vahvassa todennuksessa käytetään salaus-menetelmien tarjoamia keinoja todennus-tapahtuman tieto-turvan parantamiseen heikkoihin todennusmenetelmiin nähden. Todennusta käyttäjätunnus-salasana-yhdistelmällä voidaan pitää heikkona menetelmänä. Julkisen avaimen järjestelmän varmenteita voidaan käyttää WWW-ympäristössä toimivissa palveluissa yhteyden osapuolten todentamiseen. Tässä työssä suunniteltiin vahva käyttäjän todennus julkisen avaimen järjestelmällä WWW-ympäristössä tarjottavalle palvelulle ja toteutettiin palvelun tarjoavan sovelluksen komponentiksi soveltuva yksinkertainen varmentaja OpenSSL-salaustyökalupaketin avulla. Työssä käydään läpi myös salauksen perusteet, julkisen avaimen järjestelmä ja esitellään olemassaolevia varmentajatoteutuksia ja mahdollisia tieto-turva-uhkia Vahva todennus tulee suunnitella siten, että palvelun käyttäjä ymmärtää, mikä tarkoitus hänen toimillaan on ja miten ne edistävät tietoturvaa. Internet-palveluissa käyttäjän vahva todennus ei ole yleistynyt huonon käytettävyyden vuoksi.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Käyttäjien tunnistaminen tietojärjestelmissä on ollut yksi tietoturvan kulmakivistä vuosikymmenten ajan. Ajatus käyttäjätunnuksesta ja salasanasta on kaikkein kustannustehokkain ja käytetyin tapa säilyttää luottamus tietojärjestelmän ja käyttäjien välillä. Tietojärjestelmien käyttöönoton alkuaikoina, jolloin yrityksissä oli vain muutamia tietojärjestelmiä ja niitä käyttivät vain pieni ryhmä käyttäjiä, tämä toimintamalli osoittautui toimivaksi. Vuosien mittaan järjestelmien määrä kasvoi ja sen mukana kasvoi salasanojen määrä ja monimuotoisuus. Kukaan ei osannut ennustaa, kuinka paljon salasanoihin liittyviä ongelmia käyttäjät kohtaisivat ja kuinka paljon ne tulisivat ruuhkauttamaan yritysten käyttäjätukea ja minkälaisia tietoturvariskejä salasanat tulisivat aiheuttamaan suurissa yrityksissä. Tässä diplomityössä tarkastelemme salasanojen aiheuttamia ongelmia suuressa, globaalissa yrityksessä. Ongelmia tarkastellaan neljästä eri näkökulmasta; ihmiset, teknologia, tietoturva ja liiketoiminta. Ongelmat osoitetaan esittelemällä tulokset yrityksen työntekijöille tehdystä kyselystä, joka toteutettiin osana tätä diplomityötä. Ratkaisu näihin ongelmiin esitellään keskitetyn salasanojenhallintajärjestelmän muodossa. Järjestelmän eri ominaisuuksia arvioidaan ja kokeilu -tyyppinen toteutus rakennetaan osoittamaan tällaisen järjestelmän toiminnallisuus.