878 resultados para user authentication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The user guide describes how to undertake an assessment using the nursing needs assessment tool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While mobile technologies can provide great personalized services for mobile users, they also threaten their privacy. Such personalization-privacy paradox are particularly salient for context aware technology based mobile applications where user's behaviors, movement and habits can be associated with a consumer's personal identity. In this thesis, I studied the privacy issues in the mobile context, particularly focus on an adaptive privacy management system design for context-aware mobile devices, and explore the role of personalization and control over user's personal data. This allowed me to make multiple contributions, both theoretical and practical. In the theoretical world, I propose and prototype an adaptive Single-Sign On solution that use user's context information to protect user's private information for smartphone. To validate this solution, I first proved that user's context is a unique user identifier and context awareness technology can increase user's perceived ease of use of the system and service provider's authentication security. I then followed a design science research paradigm and implemented this solution into a mobile application called "Privacy Manager". I evaluated the utility by several focus group interviews, and overall the proposed solution fulfilled the expected function and users expressed their intentions to use this application. To better understand the personalization-privacy paradox, I built on the theoretical foundations of privacy calculus and technology acceptance model to conceptualize the theory of users' mobile privacy management. I also examined the role of personalization and control ability on my model and how these two elements interact with privacy calculus and mobile technology model. In the practical realm, this thesis contributes to the understanding of the tradeoff between the benefit of personalized services and user's privacy concerns it may cause. By pointing out new opportunities to rethink how user's context information can protect private data, it also suggests new elements for privacy related business models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

AbstractDigitalization gives to the Internet the power by allowing several virtual representations of reality, including that of identity. We leave an increasingly digital footprint in cyberspace and this situation puts our identity at high risks. Privacy is a right and fundamental social value that could play a key role as a medium to secure digital identities. Identity functionality is increasingly delivered as sets of services, rather than monolithic applications. So, an identity layer in which identity and privacy management services are loosely coupled, publicly hosted and available to on-demand calls could be more realistic and an acceptable situation. Identity and privacy should be interoperable and distributed through the adoption of service-orientation and implementation based on open standards (technical interoperability). Ihe objective of this project is to provide a way to implement interoperable user-centric digital identity-related privacy to respond to the need of distributed nature of federated identity systems. It is recognized that technical initiatives, emerging standards and protocols are not enough to guarantee resolution for the concerns surrounding a multi-facets and complex issue of identity and privacy. For this reason they should be apprehended within a global perspective through an integrated and a multidisciplinary approach. The approach dictates that privacy law, policies, regulations and technologies are to be crafted together from the start, rather than attaching it to digital identity after the fact. Thus, we draw Digital Identity-Related Privacy (DigldeRP) requirements from global, domestic and business-specific privacy policies. The requirements take shape of business interoperability. We suggest a layered implementation framework (DigldeRP framework) in accordance to model-driven architecture (MDA) approach that would help organizations' security team to turn business interoperability into technical interoperability in the form of a set of services that could accommodate Service-Oriented Architecture (SOA): Privacy-as-a-set-of- services (PaaSS) system. DigldeRP Framework will serve as a basis for vital understanding between business management and technical managers on digital identity related privacy initiatives. The layered DigldeRP framework presents five practical layers as an ordered sequence as a basis of DigldeRP project roadmap, however, in practice, there is an iterative process to assure that each layer supports effectively and enforces requirements of the adjacent ones. Each layer is composed by a set of blocks, which determine a roadmap that security team could follow to successfully implement PaaSS. Several blocks' descriptions are based on OMG SoaML modeling language and BPMN processes description. We identified, designed and implemented seven services that form PaaSS and described their consumption. PaaSS Java QEE project), WSDL, and XSD codes are given and explained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This case study introduces our continuous work to enhance the virtual classroom in order to provide faculty and students with an environment open to their needs, compliant with learning standards and, therefore compatible with other e-learning environments, and based on open source software. The result is a modulable, sustainable and interoperable learning environment that can be adapted to different teaching and learning situations by incorporating the LMS integrated tools as well as wikis, blogs, forums and Moodle activities among others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La llegada de las tecnologías de la información, y su uso cada vez mayor y generalizado que se está haciendo de ellas, ha permitido para que una nueva situación aparezca que, a su vez, ha originado - de hecho, que ha precipitado - una serie de cambios de gran importancia en todos los niveles, pero especialmente en los niveles sociales, económicos y culturales. Este nueva escena ha tenido una gran influencia en el entorno pedagógico. De hecho, la aparición de nuevos modelos educativos como resultado de este cambio ha estado sucediendo de una manera continuada e ininterrumpida durante la década pasada. Estos cambios recientes en los sistemas actuales de enseñanza y de aprendizaje han significado un aumento y un cambio en el tipo de demandas hechas desde las bibliotecas y los centros de documentación.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More than seventy years after their initial characterisation, the aetiology of inflammatory bowel diseases remains elusive. A recent review evaluating the incidence trends of the last 25 years concluded that an increasing incidence has been observed almost worldwide. A north-south gradient is still found in Europe. Genetic associations are variably reproduced worldwide and indicate a strong impact of environmental factors. Tumour necrosis factor alpha (TNF-alpha) has been shown to play a critical role in the pathogenesis of inflammatory bowel disease (IBD). TNF-alpha blockers are biological agents that specifically target this key cytokine in the inflammatory process and have become a mainstay in the therapy of inflammatory bowel diseases. This paper reviews the necessary investigations before using such agents, the use of such agents in pregnancy and lactation, the role of co-immunosuppression, how to monitor efficacy and safety, dose-adaptation, and the decision as to when to switch to another TNF-alpha blocker. Finally it gives recommendations for special situations. Currently there are three TNF-alpha blockers available for clinical use in IBD in Switzerland: infliximab (Remicade), adalimumab (Humira) and certolizumab pegol (Cimzia). Infliximab is a chimeric monoclonal antibody composed of a human IgG1 constant region and a murine variable region and is administered intravenously. Adalimumab is a humanised monoclonal antibody, with both human IgG1 constant and variable regions. Certolizumab pegol is a pegylated, humanised monoclonal anti-TNF fragment antigen binding fragment. Both adalimumab and certolizumab pegol are administered by subcutaneous injection. The efficacy and safety of TNF-alpha blockers in Crohn's disease has been reviewed. The authors conclude that the three above-mentioned agents are effective in luminal Crohn's disease. In fistulizing Crohn's disease, TNF-alpha blockers other than infliximab require additional investigation.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the design and implementation of QRP, an open source proof-of-concept authentication system that uses a two-factorauthentication by combining a password and a camera-equipped mobile phone, acting as an authentication token. QRP is extremely secure asall the sensitive information stored and transmitted is encrypted, but it isalso an easy to use and cost-efficient solution. QRP is portable and can be used securely in untrusted computers. Finally, QRP is able to successfully authenticate even when the phone is offline.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A blind speech watermarking scheme that meets hard real-time deadlines is presented and implemented. In addition, one of the key issues in these block-oriented watermarking techniques is to preserve the synchronization. Namely, to recover the exact position of each block in the mark extract process. In fact, the presented scheme can be split up into two distinguished parts, the synchronization and the information mark methods. The former is embedded into the time domain and it is fast enough to be run meeting real-time requirements. The latter contains the authentication information and it is embedded into the wavelet domain. The synchronization and information mark techniques are both tunable in order to allow a con gurable method. Thus, capacity, transparency and robustness can be con gured depending on the needs. It makes the scheme useful for professional applications, such telephony authentication or even sending information throw radio applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To guarantee the success of a virtual library is essential that all users can access all the library resources independently of the user's location.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our work is concerned with user modelling in open environments. Our proposal then is the line of contributions to the advances on user modelling in open environments thanks so the Agent Technology, in what has been called Smart User Model. Our research contains a holistic study of User Modelling in several research areas related to users. We have developed a conceptualization of User Modelling by means of examples from a broad range of research areas with the aim of improving our understanding of user modelling and its role in the next generation of open and distributed service environments. This report is organized as follow: In chapter 1 we introduce our motivation and objectives. Then in chapters 2, 3, 4 and 5 we provide the state-of-the-art on user modelling. In chapter 2, we give the main definitions of elements described in the report. In chapter 3, we present an historical perspective on user models. In chapter 4 we provide a review of user models from the perspective of different research areas, with special emphasis on the give-and-take relationship between Agent Technology and user modelling. In chapter 5, we describe the main challenges that, from our point of view, need to be tackled by researchers wanting to contribute to advances in user modelling. From the study of the state-of-the-art follows an exploratory work in chapter 6. We define a SUM and a methodology to deal with it. We also present some cases study in order to illustrate the methodology. Finally, we present the thesis proposal to continue the work, together with its corresponding work scheduling and temporalisation