102 resultados para password


Relevância:

10.00% 10.00%

Publicador:

Resumo:

www.hotcopy.info is a public site provided by the Faculty of Arts to all who are interested in the HOTcopy project created for Journalism Studies at Deakin University. The Website has also been created for the staff and students of the Journalism Major Program. Restricted areas of the site are designated for use by students and staff of Deakin University and require password access. These areas contain information about the conduct of courses and the development, use and evaluation of HOTcopy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As part of the security within distributed systems, various services and resources need protection from unauthorized use. Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems. In addition, our framework retains several practice-friendly properties of the underlying two-factor authentication, which we believe is of independent interest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, typing biometrics is applied as an additional security measure to the password-based or Personal Identification Number (PIN)-based systems to authenticate the identity of computer users. In particular, keystroke pressure and latency signals are analyzed using the Fuzzy Min-Max (FMM) neural network for authentication purposes. A special pressure-sensitive keyboard is designed to collect keystroke pressure signals, in addition to the latency signals, from computer users when they type their passwords. Based on the keystroke pressure and latency signals, the FMM network is employed to classify the computer users into two categories, i.e., genuine users or impostors. To assess the effectiveness of the proposed approach, two sets of experiments are conducted, and the results are compared with those from statistical methods and neural network models. The experimental outcomes positively demonstrate the potentials of using typing biometrics and the FMM network to provide an additional security layer for the current password-based or PIN-based methods in authenticating the identity of computer users.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background
Well managed diabetes requires active self-management in order to ensure optimal glycaemic control and appropriate use of available clinical services and other supports. Peer supporters can assist people with their daily diabetes self-management activities, provide emotional and social support, assist and encourage clinical care and be available when needed.
Methods
A national database of Australians diagnosed with type 2 diabetes is being used to invite people in pre-determined locations to participate in community-based peer support groups. Peer supporters are self-identified from these communities. All consenting participants receive diabetes self-management education and education manual prior to randomization by community to a peer support intervention or usual care. This multi-faceted intervention comprises four interconnected components for delivering support to the participants. (1) Trained supporters lead 12 monthly group meetings. Participants are assisted to set goals to improve diabetes self-management, discuss with and encourage each other to strengthen linkages with local clinical services (including allied health services) as well as provide social and emotional support. (2) Support through regular supporter-participant or participant-participant contact, between monthly sessions, is also promoted in order to maintain motivation and encourage self-improvement and confidence in diabetes self-management. (3) Participants receive a workbook containing diabetes information, resources and community support services, key diabetes management behaviors and monthly goal setting activity sheets. (4) Finally, a password protected website contains further resources for the participants. Supporters are mentored and assisted throughout the intervention by other supporters and the research team through attendance at a weekly teleconference. Data, including a self-administered lifestyle survey, anthropometric and biomedical measures are collected on all participants at baseline, 6 and 12 months. The primary outcome is change in cardiovascular disease risk using the UKPDS risk equation. Secondary outcomes include biomedical, quality of life, psychosocial functioning, and other lifestyle measures. An economic evaluation will determine whether the program is cost effective.
Discussion
This manuscript presents the protocol for a cluster randomized controlled trial of group-based peer support for people with type 2 diabetes in a community setting. Results from this trial will contribute evidence about the effectiveness of peer support in achieving effective self-management of diabetes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The contemporary conjuncture based on the capitalistic knowledge converges to the corporal consciousness that makes us see, feel, taste and hear, be in/to pieces. Disembodied reason legitimate and legislate ways of being and living socially and its development is the dehumanization of human relations causing pain and suffering. The objective of this work is to discuss the body as pedagogical matrix through imagistic/artistic elements: music, painting and literature. Metaphors lead to self knowledge of human subjectivity and approach us to the kaleidoscope of sensitive knowledge and enables learning to learn with the infinite combinations of images, knowledge, feelings and worldviews. The song Memória da Pele comes in the voice of Maria Betânia speak of the memories that are not mine, but are tattooed in me in the memory of skin, singing the memories of a love lived by who tries to forget rationally, but the body insists on remembering. It is password to think about what we are. The short story by Clarice Lispector, entitled Miss Algarve, narrates the life story of an unmarried and virgin woman, and her encounter with an alien called Ixtlan. Until then, she who lived as if every day were a Monday, found herself seduced by the pleasure of having a body in contact with another body, which also allowed her to give visibility to the bodies of others. She had repudiation by the immorality that her body and the other s perspired. The discovery of the body brings important lessons for nursing, involving our body and the others'. The painting the flying bed or Henry Ford Hospital, by Frida Kahlo, is our final metaphor. The traumatic experience of abortion is shown in this painting trough the picture of the artist naked in a hospital bed. This painting invites us to reflect on our work process. We need to think in multiple dimensions of the being and accept the invitation of art, so that the lightness confronts us with the weight imposed by the hegemonic ideology. I believe it is not a single view, but the many views that should justify the knowledge and practices of nursing; what matters is that they are woven into the dialogue, democracy, provided that protagonism of those individuals involved in this process, in the wandering and uncertainty, in the rewiring, solidarity, plurality. To this end, the body must be the great pedagogue that is able to be viewed not as a tapestry seen by the right view, as the logical knowledge sees, but seen by the opposite side in its singular, irregular, discontinuous weavings

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient mechanisms that assures user authentication in this sort of environment, in the system login as well as throughout his session, has been pointed out as a serious deficiency. Some studies have been led about possible biometric applications for web authentication. However, password based authentication still prevails. With the popularization of biometric enabled devices and resultant fall of prices for the collection of biometric traits, biometrics is reconsidered as a secure remote authentication form for web applications. In this work, the face recognition accuracy, captured on-line by a webcam in Internet environment, is investigated, simulating the natural interaction of a person in the context of a distance course environment. Partial results show that this technique can be successfully applied to confirm the presence of users throughout the course attendance in an educational distance course. An efficient client/server architecture is also proposed. © 2009 Springer Berlin Heidelberg.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pós-graduação em Ciência da Computação - IBILCE

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[ES] Este Trabajo de Fin de Grado ha tenido como objetivo el desarrollo de un gestor de menús de restaurantes como aplicación web para una empresa que ofrece hostings de menús y publicidad mediante la publicación de dichos menús en pantallas y portales web. Las empresas asociadas (bares y restaurantes) podrán elaborar menús compuestos de dos platos (primero y segundo), postre y bebidas para ser ‘enviados’ al servicio de publicación. La aplicación proporciona un sistema de gestión de dichos menús facilitando la reutilización de platos entre menús, la personalización de la imagen representativa de cada plato, así como diversas operaciones de copia, visualización y modificación de los menús y de los platos. Los usuarios registrados tendrán la posibilidad de recuperar su contraseña de forma automática en caso de que la misma sea olvidada. La información relacionada con los platos, menús y usuarios registrados será almacenada automáticamente sobre una base de datos diseñada al efecto. Por otro lado, la aplicación web dispone de una página accesible únicamente para el administrador para la gestión de los usuarios, por ejemplo, editar, alta, baja, habilitar y deshabilitar cuentas de usuarios. Por último, las tecnologías y herramientas utilizadas en la elaboración de este trabajo incluyen Php, Mysql, jQuery, CSS, HTML y sobre todo el framework Twitter Bootstrap que ha sido de gran ayuda en el desarrollo del proyecto.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

L’università di Bologna, da sempre attenta alle nuove tecnologie e all’innovazione, si è dotata nel 2010 di un Identity Provider (IDP), ovvero un servizio per la verifica dell’identità degli utenti dell’organizzazione tramite username e password in grado di sollevare le applicazioni web (anche esterne all’organizzazione) dall’onere di verificare direttamente le credenziali dell’utente delegando totalmente la responsabilità sul controllo dell’identità digitale all’IDP. La soluzione adottata (Microsoft ADFS) si è dimostrata generalmente semplice da configurare e da gestire, ma ha presentato problemi di integrazione con le principali federazioni di identità regionali e italiane (FedERa e IDEM) a causa di una incompatibilità con il protocollo SAML 1.1, ancora utilizzato da alcuni dei servizi federati. Per risolvere tale incompatibilità il "CeSIA – Area Sistemi Informativi e Applicazioni" dell’Università di Bologna ha deciso di dotarsi di un Identity Provider Shibboleth, alternativa open source ad ADFS che presenta funzionalità equivalenti ed è in grado di gestire tutte le versioni del protocollo SAML (attualmente rilasciato fino alla versione 2.0). Il mio compito è stato quello di analizzare, installare, configurare e integrare con le federazioni IDEM e FedERa un’infrastruttura basata sull’IDP Shibboleth prima in test poi in produzione, con la collaborazione dei colleghi che in precedenza si erano occupati della gestione della soluzione Microsoft ADFS. Il lavoro che ho svolto è stato suddiviso in quattro fasi: - Analisi della situazione esistente - Progettazione della soluzione - Installazione e configurazione di un Identity Provider in ambiente di test - Deploy dell’Identity Provider in ambiente di produzione

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trattasi di un sistema basato sulla mappatura degli access point utilizzabile su un'applicazione per smartphone con piattaforma Android. Sono stati usati ambienti di lavoro come Eclipse, affiancato da Lamp e API, utili per visualizzare le mappe da Google Maps. E' stato creato un database online, in modo tale che gli utenti possano condividere le proprie registrazioni (solo quelle che non richiedono una password e quindi utilizzabili da tutti). Il tutto testato tramite un emulatore Android

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In questa tesi si revisiona l'architettura di TuCSoN on Cloud. Sono trattati i problemi riguardanti la gestione dei nodi TuCSoN su un cloud simulato su Cloudify; ovvero come sono memorizzati i vari tuple centre per ogni utente. É inoltre trattato il problema della concorrenza e della sicurezza, ovvero di come é gestita la password dell'utente.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La tesi, come da titolo, progettazione e sviluppo di un ecosistema per la gestione di studi dentistici, tratta propriamente di un insieme di programmi software per gestire al meglio uno studio dentistico. Uno dei due software dell'ecosistema, consente al medico dentista di effettuare una gestione dei pazienti e dei relativi trattamenti svolti all'interno dello studio dentistico dal personale medico. I dati sono conseguentemente salvati all'interno di un database centrale. Il secondo software, più nello specifico un sito web, consente ai pazienti, mediante username e password, di accedere all'area riservata e monitorare i propri dati personali ed i trattamenti effettuati dal personale medico all'interno dello studio. Il software in uso nello studio del dentista consente quindi sia lettura che scrittura dei dati sul database. Il sito consente solamente la lettura dei dati stessi.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Individual Video Training iVT and Annotating Academic Videos AAV: two complementing technologies 1. Recording communication skills training sessions and reviewing them by oneself, with peers, and with tutors has become standard in medical education. Increasing numbers of students paired with restrictions of financial and human resources create a big obstacle to this important teaching method. 2. Everybody who wants to increase efficiency and effectiveness of communication training can get new ideas from our technical solution. 3. Our goal was to increase the effectiveness of communication skills training by supporting self, peer and tutor assessment over the Internet. Two technologies of SWITCH, the national foundation to support IT solutions for Swiss universities, came handy for our project. The first is the authentication and authorization infrastructure providing all Swiss students with a nationwide single login. The second is SWITCHcast which allows automated recording, upload and publication of videos in the Internet. Students start the recording system by entering their single login. This automatically links the video with their password. Within a few hours, they find their video password protected on the Internet. They now can give access to peers and tutors. Additionally, an annotation interface was developed. This software has free text as well as checklist annotations capabilities. Tutors as well as students can create checklists. Tutor’s checklists are not editable by students. Annotations are linked to tracks. Tracks can be private or public. Public means visible to all who have access to the video. Annotation data can be exported for statistical evaluation. 4. The system was well received by students and tutors. Big numbers of videos were processed simultaneously without any problems. 5. iVT http://www.switch.ch/aaa/projects/detail/UNIBE.7 AAV http://www.switch.ch/aaa/projects/detail/ETHZ.9