920 resultados para SSO,Shibboleth,2FA,ADFS,Strong Authentication
Resumo:
In this paper we use a Terahertz (THz) time-domain system to image and analyze the structure of an artwork attributed to the Spanish artist Goya painted in 1771. The THz images show features that cannot be seen with optical inspection and complement data obtained with X-ray imaging that provide evidence of its authenticity, which is validated by other independent studies. For instance, a feature with a strong resemblance with one of Goya"s known signatures is seen in the THz images. In particular, this paper demonstrates the potential of THz imaging as a complementary technique along with X-ray for the verification and authentication of artwork pieces through the detection of features that remain hidden to optical inspection.
Resumo:
Résumé : L'amygdale latérale (AL) joue un .rôle essentiel dans la plasticité synaptique à la base du conditionnement de la peur. Malgré le faite que la majorité des cellules de l'AL reçoivent les afférentes nécessaires, une potentialisation dans seulement une partie d'entre elles est obligatoire afin que l'apprentissage de la peur ait lieu. Il a été montré que ces cellules expriment la forme active de CREB, et celui-ci a été associé aux cellules dites de type 'nonaccomrnodating' (nAC). Très récemment, une étude a impliqué les circuits récurrents de l'AL dans le conditionnement de la peur. Un lien entre ces deux observations n'a toutefois jamais été établi. t Nous avons utilisé un protocole in vitro de forte activation de l'AL, résultant dans l'induction de 'bursts' provenant de l'hippocampe et se propageant jusqu'à l'AL. Dans l'AL ces 'bursts' atteignent toutes les cellules et se propagent à travers plusieurs chemins. Utilisant ce protocole, nous avons, pour la première fois pu associer dans l'AL, des cellules connectées de manière récurrente avec des cellules de type nAC. Aussi bien dans ces dernières que dans les cellules de type 'accommodating' (AC), une diminution dans la transmission inhibitrice, à la fois exprimée de manière pré synaptique mais également indépendant de la synthèse de protéine a pu être observé. Au contraire, une potentialisation induite et exprimée au niveau pré synaptique ainsi que dépendante de la synthèse de protéine a pu être trouvé uniquement dans les cellules de type nAC. De plus, une hyperexcitabilité, dépendante des récepteurs NMDA a pu être observé, avec une sélection préférentielle des cellules du type nAC dans la génération de bursts. Nous avons également pu démontrer que la transformation d'un certain nombre de cellules de type AC en cellules dites nAC accompagnait cette augmentation générale de l'excitabilité de l'AL. Du faite da la grande quantité d'indices suggérant une connexion entre le système noradrénergique et les états de peur/d'anxiété, les effets d'une forte activation de l'AL sur ce dernier ont été investigués et ont révélés une perte de sa capacité de modulation du 'spiking pattern'. Finalement, des changements au niveau de l'expression d'un certain nombre de gènes, incluant celui codant pour le BDNF, a pu être trouvé à la suite d'une forte activation de l'AL. En raison du lien récemment décrit entre l'expression de la forme active de CREB et des cellules de type nAC ainsi que celui de l'implication des cellules de l'AL connectés de manière récurrente dans l'apprentissage de la peur, nos résultats nous permettent de suggérer un modèle expliquant comment la potentialisation des connections récurrentes entre cellules de type nAC pourrait être à la base de leur recrutement sélectif pendant le conditionnement de la peur. De plus, ils peuvent offrir des indices par rapport aux mécanismes à travers lesquels une sous population de neurones peut être réactivée par une stimulation externe précédemment inefficace, et induire ainsi un signal suffisamment fort pour qu'il soit transmit aux structures efférentes de l'AL. Abstract : The lateral nucleus of the amygdala (LA) is critically involved in the plasticity underlying fear-conditioned learning (Sah et al., 2008). Even though the majority of cells in the LA receive the necessary sensory inputs, potentiation in only a subset is required for fear learning to occur (Repa et al., 2001; Rumpel et al., 2005). These cells express active CREB (CAMP-responsive element-binding protein) (Han et al., 200, and this was related to the non-accommodating (nAC) spiking phenotype (Viosca et al., 2009; Zhou et al., 2009). In addition, a very recent study implicated recurrently connected cells of the LA in fear conditioned learning (Johnson et al., 2008). A link between the two observations has however never been made. In rats, we used an in vitro protocol of strong activation of the LA, resulting in bursting activity, which spread from the hippocampus to the LA. Within the LA, this activity reached all cells and spread via a multitude of pathways. Using this model, we were able to link, for the first time, recurrently connected cells in the LA with cells of the nAC phenotype. While we found a presynaptically expressed, protein synthesis independent decrease in inhibitory synaptic transmission in both nAC and accommodating (AC) cells, only nAC cells underwent a presynaptically induced and expressed, protein synthesis dependent potentiation. Moreover we observed an NMDA dependent hyperexcitability of the LA, with a preferential selection of nAC cells into burst generation. The transformation of a subset of AC cells into nAC cells accompanied this general increase in LA excitability. Given the considerable evidence suggesting a relationship between the central noradrenergic (NA) system and fear/anxiety states (Itoi, 2008), the effects of strong activation of the LA on the noradrenergic system were investigated, which revealed a loss of its modulatory actions on cell spiking patterns. Finally, we found changes in the expression levels of a number of genes; among which the one coding for $DNF, to be induced by strong activation of the LA. In view of the recently described link between nAC cells and expression of pCREB (phosphorylated cAMP-responsive element-binding protein) as well as the involvement of recurrently connected cells of the LA in fear-conditioned learning, our findings may provide a model of how potentiation of recurrent connections between nAC neurons underlies their recruitment into the fear memory trace. Additionally, they may offer clues as to the mechanisms through which a selected subset of neurons can be reactivated by smaller, previously ineffective external stimulations to respond with a sufficiently strong signal, which can be transmitted to downstream targets of the LA.
Resumo:
Many prairie restoration projects are hampered by a lack of knowledge on how to restore the high diversity found in prairies, while at the same time preventing the establishment of a large weedy component. Methods are needed to increase diversity and abundance of native species while minimizing exotic species invasions in both 1) newly planted restorations and 2) established restorations. We established an experiment in Story and Monona counties in 2005 to determine the effects of different native cover crop species and timing of seeding on the establishment of new prairie restorations. We found that adding a 30-species prairie mix in early spring led to diverse native communities, but adding the mix in the late summer or the following year after cover crops established led to low diversity communities dominated by exotics. The identity of cover crops affected communities less than timing of seed additions. A second seed addition added to ash after a spring fire in the seventh year (Monona County site) increased recruitment from the prairie mix slightly, but the increase was not enough to cause convergence in the treatments. Surprisingly, the second seed addition increased diversity only in communities that were already the most diverse (i.e., in plots seeded with the prairie mix in early spring before cover crops established). These results imply that 1) cover crops are not effective for establishing prairie and 2) over seeding into established plots may not be an easy and efficient way to increase native recruitment and lower weedy species abundances. Therefore, focusing on establishing high levels of recruitment and diversity and excluding weedy species during the critical time early in establishment should be a priority for new projects.
Resumo:
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.
Resumo:
The goal of this work is to design and implement authentication and authorization section to PeerHood system. PeerHood system is developedin Lappeenranta University of Technology. It provides functions of discovering devices compatible with PeerHood and listing services offered by those devices; based on wireless technologies: Wi-Fi, Bluetooth and GPRS. The thesis describes implementation of the security approach intomobile Ad-Hoc environment and includes both authentication and authorization processes.
Resumo:
Tutkimuksen päätavoitteena oli ymmärtää vahvojen brändien ja brändipääoman rakentamisprosessia, painottaen erityisesti sponsoroinnin roolia tässä prosessissa. Tutkimus suoritettiin laadullisena tutkimuksena, jossa käytettiintapaustutkimusmenetelmää. Tutkimuksen aineisto kerättiin suurimmista online artikkelitietokannoista sekä kolmesta henkilökohtaisesta haastattelusta case-yrityksen edustajien kanssa. Tutkimuksen teoreettisen perustan muodosti brändipääoma-käsite ja sen osa-alueet, näiden liittyminen vahvoihin brändeihin ja brändien rakentamiseen, sekä sponsoroinnin strateginen käyttö brändien rakentamisessa. Lisäksi tutkimuksen empiirinen perusta arvio ja testasi näitä oletuksia ja aikaisemmin käsiteltyjä teorioita case-brändi Battery energiajuoman valossa. Tutkimus osoitti, että nykypäivänä kovan kilpailun markkinointiympäristössä, sponsorointi edustaa vaihtoehtoista tapaa rakentaa vahvoja, omalaatuisia ja suotuisia brändejä, joilla on korkea brändipääoma. Sponsoroinnista on tullut yhä tärkeämpi kommunikointiväline brändien rakentamisessa ja erityisesti siellä missä perinteiset menetelmät ovat muuttumassa tehottomiksi. Empiirisessä osassa selvisi, että sponsorointia on käytetty menestyksekkäästi strategisena keinona vahvan ja omalaatuisen Battery brändin ja sen korkean brändipääoman rakentamisessa.
Resumo:
PURPOSE: Rechallenge with temozolomide (TMZ) at first progression of glioblastoma after temozolomide chemoradiotherapy (TMZ/RT→TMZ) has been studied in retrospective and single-arm prospective studies, applying temozolomide continuously or using 7/14 or 21/28 days schedules. The DIRECTOR trial sought to show superiority of the 7/14 regimen. EXPERIMENTAL DESIGN: Patients with glioblastoma at first progression after TMZ/RT→TMZ and at least two maintenance temozolomide cycles were randomized to Arm A [one week on (120 mg/m(2) per day)/one week off] or Arm B [3 weeks on (80 mg/m(2) per day)/one week off]. The primary endpoint was median time-to-treatment failure (TTF) defined as progression, premature temozolomide discontinuation for toxicity, or death from any cause. O(6)-methylguanine DNA methyltransferase (MGMT) promoter methylation was prospectively assessed by methylation-specific PCR. RESULTS: Because of withdrawal of support, the trial was prematurely closed to accrual after 105 patients. There was a similar outcome in both arms for median TTF [A: 1.8 months; 95% confidence intervals (CI), 1.8-3.2 vs. B: 2.0 months; 95% CI, 1.8-3.5] and overall survival [A: 9.8 months (95% CI, 6.7-13.0) vs. B: 10.6 months (95% CI, 8.1-11.6)]. Median TTF in patients with MGMT-methylated tumors was 3.2 months (95% CI, 1.8-7.4) versus 1.8 months (95% CI, 1.8-2) in MGMT-unmethylated glioblastoma. Progression-free survival rates at 6 months (PFS-6) were 39.7% with versus 6.9% without MGMT promoter methylation. CONCLUSIONS: Temozolomide rechallenge is a treatment option for MGMT promoter-methylated recurrent glioblastoma. Alternative strategies need to be considered for patients with progressive glioblastoma without MGMT promoter methylation.
Resumo:
In this paper we use a Terahertz (THz) time-domain system to image and analyze the structure of an artwork attributed to the Spanish artist Goya painted in 1771. The THz images show features that cannot be seen with optical inspection and complement data obtained with X-ray imaging that provide evidence of its authenticity, which is validated by other independent studies. For instance, a feature with a strong resemblance with one of Goya"s known signatures is seen in the THz images. In particular, this paper demonstrates the potential of THz imaging as a complementary technique along with X-ray for the verification and authentication of artwork pieces through the detection of features that remain hidden to optical inspection.
Resumo:
This thesis is composed of three main parts. The first consists of a state of the art of the different notions that are significant to understand the elements surrounding art authentication in general, and of signatures in particular, and that the author deemed them necessary to fully grasp the microcosm that makes up this particular market. Individuals with a solid knowledge of the art and expertise area, and that are particularly interested in the present study are advised to advance directly to the fourth Chapter. The expertise of the signature, it's reliability, and the factors impacting the expert's conclusions are brought forward. The final aim of the state of the art is to offer a general list of recommendations based on an exhaustive review of the current literature and given in light of all of the exposed issues. These guidelines are specifically formulated for the expertise of signatures on paintings, but can also be applied to wider themes in the area of signature examination. The second part of this thesis covers the experimental stages of the research. It consists of the method developed to authenticate painted signatures on works of art. This method is articulated around several main objectives: defining measurable features on painted signatures and defining their relevance in order to establish the separation capacities between groups of authentic and simulated signatures. For the first time, numerical analyses of painted signatures have been obtained and are used to attribute their authorship to given artists. An in-depth discussion of the developed method constitutes the third and final part of this study. It evaluates the opportunities and constraints when applied by signature and handwriting experts in forensic science. A brief summary covering each chapter allows a rapid overview of the study and summarizes the aims and main themes of each chapter. These outlines presented below summarize the aims and main themes addressed in each chapter. Part I - Theory Chapter 1 exposes legal aspects surrounding the authentication of works of art by art experts. The definition of what is legally authentic, the quality and types of the experts that can express an opinion concerning the authorship of a specific painting, and standard deontological rules are addressed. The practices applied in Switzerland will be specifically dealt with. Chapter 2 presents an overview of the different scientific analyses that can be carried out on paintings (from the canvas to the top coat). Scientific examinations of works of art have become more common, as more and more museums equip themselves with laboratories, thus an understanding of their role in the art authentication process is vital. The added value that a signature expertise can have in comparison to other scientific techniques is also addressed. Chapter 3 provides a historical overview of the signature on paintings throughout the ages, in order to offer the reader an understanding of the origin of the signature on works of art and its evolution through time. An explanation is given on the transitions that the signature went through from the 15th century on and how it progressively took on its widely known modern form. Both this chapter and chapter 2 are presented to show the reader the rich sources of information that can be provided to describe a painting, and how the signature is one of these sources. Chapter 4 focuses on the different hypotheses the FHE must keep in mind when examining a painted signature, since a number of scenarios can be encountered when dealing with signatures on works of art. The different forms of signatures, as well as the variables that may have an influence on the painted signatures, are also presented. Finally, the current state of knowledge of the examination procedure of signatures in forensic science in general, and in particular for painted signatures, is exposed. The state of the art of the assessment of the authorship of signatures on paintings is established and discussed in light of the theoretical facets mentioned previously. Chapter 5 considers key elements that can have an impact on the FHE during his or her2 examinations. This includes a discussion on elements such as the skill, confidence and competence of an expert, as well as the potential bias effects he might encounter. A better understanding of elements surrounding handwriting examinations, to, in turn, better communicate results and conclusions to an audience, is also undertaken. Chapter 6 reviews the judicial acceptance of signature analysis in Courts and closes the state of the art section of this thesis. This chapter brings forward the current issues pertaining to the appreciation of this expertise by the non- forensic community, and will discuss the increasing number of claims of the unscientific nature of signature authentication. The necessity to aim for more scientific, comprehensive and transparent authentication methods will be discussed. The theoretical part of this thesis is concluded by a series of general recommendations for forensic handwriting examiners in forensic science, specifically for the expertise of signatures on paintings. These recommendations stem from the exhaustive review of the literature and the issues exposed from this review and can also be applied to the traditional examination of signatures (on paper). Part II - Experimental part Chapter 7 describes and defines the sampling, extraction and analysis phases of the research. The sampling stage of artists' signatures and their respective simulations are presented, followed by the steps that were undertaken to extract and determine sets of characteristics, specific to each artist, that describe their signatures. The method is based on a study of five artists and a group of individuals acting as forgers for the sake of this study. Finally, the analysis procedure of these characteristics to assess of the strength of evidence, and based on a Bayesian reasoning process, is presented. Chapter 8 outlines the results concerning both the artist and simulation corpuses after their optical observation, followed by the results of the analysis phase of the research. The feature selection process and the likelihood ratio evaluation are the main themes that are addressed. The discrimination power between both corpuses is illustrated through multivariate analysis. Part III - Discussion Chapter 9 discusses the materials, the methods, and the obtained results of the research. The opportunities, but also constraints and limits, of the developed method are exposed. Future works that can be carried out subsequent to the results of the study are also presented. Chapter 10, the last chapter of this thesis, proposes a strategy to incorporate the model developed in the last chapters into the traditional signature expertise procedures. Thus, the strength of this expertise is discussed in conjunction with the traditional conclusions reached by forensic handwriting examiners in forensic science. Finally, this chapter summarizes and advocates a list of formal recommendations for good practices for handwriting examiners. In conclusion, the research highlights the interdisciplinary aspect of signature examination of signatures on paintings. The current state of knowledge of the judicial quality of art experts, along with the scientific and historical analysis of paintings and signatures, are overviewed to give the reader a feel of the different factors that have an impact on this particular subject. The temperamental acceptance of forensic signature analysis in court, also presented in the state of the art, explicitly demonstrates the necessity of a better recognition of signature expertise by courts of law. This general acceptance, however, can only be achieved by producing high quality results through a well-defined examination process. This research offers an original approach to attribute a painted signature to a certain artist: for the first time, a probabilistic model used to measure the discriminative potential between authentic and simulated painted signatures is studied. The opportunities and limits that lie within this method of scientifically establishing the authorship of signatures on works of art are thus presented. In addition, the second key contribution of this work proposes a procedure to combine the developed method into that used traditionally signature experts in forensic science. Such an implementation into the holistic traditional signature examination casework is a large step providing the forensic, judicial and art communities with a solid-based reasoning framework for the examination of signatures on paintings. The framework and preliminary results associated with this research have been published (Montani, 2009a) and presented at international forensic science conferences (Montani, 2009b; Montani, 2012).
Resumo:
This article envisions the use of context-awareness to improve single sign-on solutions (SSO) for mobile users. The attribute-based SSO is expected to increase users' perceived ease of use of the system and service providers' authentication security of the application. From these two features we derive two value propositions for a new business model for mobile platforms. The business model can be considered as an instantiation of the privacy-friendly business model pattern presented in our previous work, reinforcing our claim that privacy-friendly value propositions are possible and can be used to obtain a competitive advantage.
Resumo:
Lyhyen kantaman radiotekniikoiden hyödyntäminen mahdollistaa uudenlaisten paikallisten palveluiden käytön ja vanhojen palveluiden kehittämisen. Kulunvalvonta on päivittäisenä palveluna valittu työn esimerkkisovellukseksi. Useita tunnistus- ja valtuutustapoja tutkitaan, ja julkisen avaimen infrastruktuuri on esitellään tarkemmin. Langattomat tekniikat Bluetooth, Zigbee, RFID ja IrDA esitellän yleisellä tasolla langattomat tekniikat –luvussa. Bluetooth-tekniikan rakennetta, mukaan lukien sen tietoturva-arkkitehtuuria, tutkitaan tarkemmin. Bluetooth-tekniikkaa käytetään työssä suunnitellun langattoman kulunvalvontajärjestelmän tietojen siirtoon. Kannettava päätelaite toimii käyttäjän henkilökohtaisena luotettuna laitteena, jota voi käyttää avaimena. Käyttäjän tunnistaminen ja valtuuttaminen perustuu julkisen avaimen infrastruktuuriin. Ylläpidon allekirjoittamat varmenteet sisältävät käyttäjän julkisen avaimen lisäksi tietoa hänestä ja hänen oikeuksistaan. Käyttäjän tunnistaminen kulunvalvontapisteissä tehdään julkisen ja salaisen avaimen käyttöön perustuvalla haaste-vastaus-menetelmällä. Lyhyesti, järjestelmässä käytetään Bluetooth-päätelaitteita langattomina avaimina.
Resumo:
Langattomat lähiverkot ovat viime vuosikymmeninä saavuttaneet suuren suosion. Tässä työssä käsitellään käyttäjien todentamisjärjestelmän suunnittelua ja kehitystä langattomaan monioperaattoriverkkoon. Langattomassa monioperaattoriverkossa käyttäjillä on mahdollisuus käyttää eri operaattoreiden palveluita. Aluksi käsitellään olemassa olevia todentamismenetelmiä ja -järjestelmiä. minkä jälkeen kuvaillaan todentamisjärjestelmä langattomille monioperaattoriverkoille. Todentamisjärjestelmän ratkaisuvaihtoehtoja esitellään kaksi, niin sanotut moni- istunto - ja yksittäisistuntomalli. Moni-istuntomalli on normaali lähestymistapa käyttäjien todentamiseen tietokonejärjestelmissä. Siinä käyttäjän pitää tunnistautua ja todentaa itsensä jokaiselle verkon palvelulle erikseen. Yksittäisistuntomallissa pyritään parempaan luotettavuuteen ja käytettävyyteen. Siinä käyttäjä todentaa itsensä vain kerran ja voi sen jälkeen päästä useisiin palveluihin. Työn loppuosassa kuvaillaan suunnitellun järjestelmän toteutusta. Lisäksi ehdotetaan vaihtoehtoisia toteutustapoja, analysoidaan järjestelmän heikkouksia ja kerrotaan jatkokehitysmahdoillisuuksista.
Resumo:
Internet-palvelujen määrä kasvaa jatkuvasti. Henkilöllä on yleensä yksi sähköinen identiteetti jokaisessa käyttämässään palvelussa. Autentikointitunnusten turvallinen säilytys käy yhä vaikeammaksi, kun niitä kertyy yhdet jokaisesta uudesta palvelurekisteröitymisestä. Tämä diplomityö tarkastelee ongelmaa ja ratkaisuja sekä palvelulähtöisestä että teknisestä näkökulmasta. Palvelulähtöisen identiteetinhallinnan liiketoimintakonsepti ja toteutustekniikat – kuten single sign-on (SSO) ja Security Assertion Markup Language (SAML) – käydään läpi karkeiden esimerkkien avulla sekä tutustuen Nokia Account -hankkeessa tuotetun ratkaisun konseptiin ja teknisiin yksityiskohtiin. Nokia Account -palvelun ensimmäisen version toteutusta analysoidaan lopuksi identiteetinhallintapalveluiden suunnitteluperiaatteita ja vaatimuksia vasten.