834 resultados para security, usability, identity management, authentication, authorization
Resumo:
User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system
Levinasian ethics and the representation of the other in international and cross-cultural management
Resumo:
In this paper, we seek to further the discussion, problematization and critique of west/east identity relations in ICM studies by considering the ethics of the relationship – an issue never far beneath the surface in discussions of Orientalism. In particular we seek to both examine and question the ethics of representation in relation to a critique of what has come to be known as international and cross-cultural management (ICM). To pursue such a discussion, we draw specifically on the ethical elaborations of Emmanuel Levinas as well as his chief interlocutors Jacques Derrida and Zygmunt Bauman. The value of this discussion, we propose, is that Levinas offers a philosophy that holds as its central concept the relationship between the self and Other as the primary ethical and pre-ontological relation. Levinas’ philosophy provides a means of extending the post-colonial critique of ICM, and ICM provides a context in which the Levinasian ethics can be brought to bear on a significant issue on contemporary business and management.
Resumo:
Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.
Resumo:
Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.