157 resultados para Token authenticators
Resumo:
This project describes an authentication technique that is shoulder-surfing resistant. Shoulder surfing is an attack in which an attacker can get access to private information by observing the user’s interaction with a terminal, or by using recording tools to record the user interaction and study the obtained data, with the objective of obtaining unauthorized access to a target user’s personal information. The technique described here relies on gestural analysis coupled with a secondary channel of authentication that uses button pressing. The thesis presents and evaluates multiple alternative algorithms for gesture analysis, and furthermore assesses the effectiveness of the technique.
Resumo:
A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.
Resumo:
Broadcast networks that are characterised by having different physical layers (PhL) demand some kind of traffic adaptation between segments, in order to avoid traffic congestion in linking devices. In many LANs, this problem is solved by the actual linking devices, which use some kind of flow control mechanism that either tell transmitting stations to pause (the transmission) or just discard frames. In this paper, we address the case of token-passing fieldbus networks operating in a broadcast fashion and involving message transactions over heterogeneous (wired or wireless) physical layers. For the addressed case, real-time and reliability requirements demand a different solution to the traffic adaptation problem. Our approach relies on the insertion of an appropriate idle time before a station issuing a request frame. In this way, we guarantee that the linking devices’ queues do not increase in a way that the timeliness properties of the overall system turn out to be unsuitable for the targeted applications.
Resumo:
A recent trend in distributed computer-controlled systems (DCCS) is to interconnect the distributed computing elements by means of multi-point broadcast networks. Since the network medium is shared between a number of network nodes, access contention exists and must be solved by a medium access control (MAC) protocol. Usually, DCCS impose real-time constraints. In essence, by real-time constraints we mean that traffic must be sent and received within a bounded interval, otherwise a timing fault is said to occur. This motivates the use of communication networks with a MAC protocol that guarantees bounded access and response times to message requests. PROFIBUS is a communication network in which the MAC protocol is based on a simplified version of the timed-token protocol. In this paper we address the cycle time properties of the PROFIBUS MAC protocol, since the knowledge of these properties is of paramount importance for guaranteeing the real-time behaviour of a distributed computer-controlled system which is supported by this type of network.
Resumo:
Fieldbus networks aim at the interconnection of field devices such as sensors, actuators and small controllers. Therefore, they are an effective technology upon which Distributed Computer Controlled Systems (DCCS) can be built. DCCS impose strict timeliness requirements to the communication network. In essence, by timeliness requirements we mean that traffic must be sent and received within a bounded interval, otherwise a timing fault is said to occur. P-NET is a multi-master fieldbus standard based on a virtual token passing scheme. In P-NET each master is allowed to transmit only one message per token visit, which means that in the worst-case the communication response time could be derived considering that the token is fully utilised by all stations. However, such analysis can be proved to be quite pessimistic. In this paper we propose a more sophisticated P-NET timing analysis model, which considers the actual token utilisation by different masters. The major contribution of this model is to provide a less pessimistic, and thus more accurate, analysis for the evaluation of the worst-case communication response time in P-NET fieldbus networks.
Resumo:
Fieldbus communication networks aim to interconnect sensors, actuators and controllers within distributed computer-controlled systems. Therefore, they constitute the foundation upon which real-time applications are to be implemented. A specific class of fieldbus communication networks is based on a simplified version of token-passing protocols, where each station may transfer, at most, a single message per token visit (SMTV). In this paper, we establish an analogy between non-preemptive task scheduling in single processors and the scheduling of messages on SMTV token-passing networks. Moreover, we clearly show that concepts such as blocking and interference in non-preemptive task scheduling have their counterparts in the scheduling of messages on SMTV token-passing networks. Based on this task/message scheduling analogy, we provide pre-run-time schedulability conditions for supporting real-time messages with SMTV token-passing networks. We provide both utilisation-based and response time tests to perform the pre-run-time schedulability analysis of real-time messages on SMTV token-passing networks, considering RM/DM (rate monotonic/deadline monotonic) and EDF (earliest deadline first) priority assignment schemes
Resumo:
Animal Cognition, V.6, pp. 259–267
Resumo:
Half-penny token struck for general circulation in Upper Canada, about 1816. The token is one of a few issues which commemorate Sir Issac Brock. The name Brock is misspelled "Brook" on this token. The other side bears the picture of a sailing vessel and the motto "Success to the Commerce of Upper Canada".
Resumo:
As the only person of color in your workplace you may experience feelings of isolation and hopelessness. However, it is possible to survive this situation. To do so, you must go .through an empowering developmental process. You no longer have to be a Token. Learn how you can become a Pioneer and a Crusader for social justice.
Resumo:
Self-control is a prerequisite for complex cognitive processes such as cooperation and planning. As such, comparative studies of self-control may help elucidate the evolutionary origin of these capacities. A variety of methods have been developed to test for self-control in non-human primates that include some variation of foregoing an immediate reward in order to gain a more favorable reward. We used a token exchange paradigm to test for self-control in capuchin monkeys (Cebus apella). Animals were trained that particular tokens could be exchanged for food items worth different values. To test for self-control, a monkey was provided with a token that was associated with a lower-value food. When the monkey exchanged the token, the experimenter provided the monkey with a choice between the lower-value food item associated with the token or another token that was associated with a higher-value food. If the monkey chose the token, they could then exchange it for the higher-value food. Of seven monkeys trained to exchange tokens, five demonstrated that they attributed value to the tokens by differentially selecting tokens for higher-value foods over tokens for lower-value foods. When provided with a choice between a food item or a token for a higher-value food, two monkeys selected the token significantly more than expected by chance. The ability of capuchin monkeys to forego an immediate food reward and select a token that could then be traded for a more preferred food demonstrated some degree of self-control. Thus, results suggest a token exchange paradigm could be a successful technique for assessing self-control in this New World species.
Resumo:
Increasingly, families referred for Intensive Family Preservation Services have not experienced a crisis of maltreatment, focused on the parent; rather these families have children with chronic behavioral difficulties for which their parents lack the skills to cope. These are the same families whose children were formerly placed in residential programs. This paper presents The Family Partners Credit Card System, incorporating behavioral techniques developed to treat children in out-of-home placements into a family preservation model. Two case examples illustrate how the system has been modified to train biological or adoptive parents in parenting skills, enable them to teach their children pro-family behaviors, and reinforce new behaviors through a credit card that monitors an ongoing balance of credits and fines.
Resumo:
Edited by Emily Percival.
Resumo:
Subtitle varies slightly.
Resumo:
Starr & Niles, print.