Filters








147,083 Hits in 5.9 sec

OpenID-enabled browser

San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov
2011 Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems - CHI EA '11  
OpenID is an open and promising Web single sign-on solution; however, the interaction flows provided by OpenID are inconsistent, counter-intuitive, and vulnerable to phishing attacks.  ...  single sign-on user experience for the average web users.  ...  When a user tries to sign onto an RP website, our identity-enabled browser prompts the user to select an identity to sign on to the RP (one-click sign on), without creating or entering a user name and  ... 
doi:10.1145/1979742.1979763 dblp:conf/chi/SunPMDHB11 fatcat:2wexorsxtvbihdmytme4eormxm

E. coli gene regulatory networks are inconsistent with gene expression data

Simon J Larsen, Richard Röttger, Harald H H W Schmidt, Jan Baumbach
2018 Nucleic Acids Research  
Changes in the expression of transcription factors are commonly believed to have a causal effect on the expression of their targets.  ...  We conclude that, at least in E. coli, one cannot expect a causal relationship between the expression of transcription and factors their targets, and that the current static GRN does not adequately explain  ...  Finally, the SigNetTrainer tool (23) uses an integer linear programming approach to repair inconsistent signs in a single gene expression experiment to match a given interaction network, or identify insertions  ... 
doi:10.1093/nar/gky1176 pmid:30462289 pmcid:PMC6326786 fatcat:reh3wsdx5bhnnjicih3akype5a

A billion keys, but few locks

San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, Konstantin Beznosov
2010 Proceedings of the 2010 workshop on New security paradigms - NSPW '10  
As a result, there are currently over one billion OpenID-enabled user accounts provided by major CSPs, but only a few relying parties.  ...  In this paper, we discuss the problem of Web SSO adoption for RPs and argue that solutions in this space must offer RPs sufficient business incentives and trustworthy identity services in order to succeed  ...  ACKNOWLEDGMENTS We thank members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) who supplied valuable feedback on the earlier drafts of this paper.  ... 
doi:10.1145/1900546.1900556 dblp:conf/nspw/SunBHB10 fatcat:sjqbjtmypnemhk55sppo4zgoe4

Persistent perceptual grouping effects in the evaluation of simple arithmetic expressions

Jessie Rivera, Patrick Garrigan
2016 Memory & Cognition  
In sum, the persistent effects of unit formation and spatial attention emphasize the importance of perceptual processing in the development of human expertise in this domain.  ...  Goldstone (2007a, 2010) demonstrated that an explicit rule, operator precedence for simple arithmetic expressions, is enforced in part by perceptual processes like unit formation and attention.  ...  Errors in which a single digit, B1,ŵ as pressed accounted for 18 % of unclassified errors in the white noise mask condition, and 19 % of unclassified errors in the numbers mask condition.  ... 
doi:10.3758/s13421-016-0593-z pmid:26887867 fatcat:iuhlhhqr2rc4xl45g2wi4xmyla

Exposing Inconsistent Web Search Results with Bobble [chapter]

Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, Alex C. Snoeren
2014 Lecture Notes in Computer Science  
of different conditions, alerting the user to the extent of inconsistency present in the set of search results returned to them by Google.  ...  Given their critical role as gateways to Web content, the search results a Web search engine provides to its users have an out-sized impact on the way each user views the Web.  ...  In contrast, we are less interested in the distinction between different personalization methods, and focus instead on the effects of a single search personalization algorithm.  ... 
doi:10.1007/978-3-319-04918-2_13 fatcat:kmnh2p3pwnhdnb3oa56ibzkspq

Implications of SSO Solutions on Cloud Applications

Mohamed Watfa, Shakir Khan, Ali Radmehr
2014 Communications and Network  
This resulted in the need for several layers of password authentications for cloud applications access. Single Sign-On (SSO) is a tool of access control of multiple software systems.  ...  The trend in businesses is moving towards a single browser tool on portable devices to access cloud applications which would increase portability but at the same time would introduce security vulnerabilities  ...  In OpenID, user provides a variety of identity which may be any website or web-based application where user already has an user account (e.g. Google).  ... 
doi:10.4236/cn.2014.63020 fatcat:2bqrmaobunajhcbbtnaes4qksq

What makes users refuse web single sign-on?

San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov
2011 Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11  
OpenID is an open and promising Web single sign-on (SSO) solution.  ...  We also found that with an improved affordance and privacy control, more than 60% of study participants would use Web SSO solutions on the websites they trust.  ...  Acknowledgements We thank study participants for their time, and members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) who provided valuable feedback on the earlier  ... 
doi:10.1145/2078827.2078833 dblp:conf/soups/SunPMDHB11 fatcat:op7y3y6xe5eofkijmy6vnz2axi

Integration versus separation in Stroop-like counting interference tasks1

Miya Muroi, Colin M. Macleod
2004 Japanese psychological research (Print)  
In the integrated task, participants enumerated digits (inconsistent condition) or letters (neutral condition) while attempting to ignore the identity of the characters.  ...  Contrasted with the pattern in the color-word Stroop task, these results suggest that dimensional separation has different effects on interference depending on the overall amount of interference.  ...  Most recently, MacLeod (1998) investigated the effect of training on an integrated version (word printed in color) and a separated version (color bar beside word) of the Stroop task and found that interference  ... 
doi:10.1111/j.1468-5884.2004.00236.x fatcat:oftu2oquzfct7nyf242rc25zka

Inconsistencies undermine the credibility of confession evidence

Matthew A. Palmer, Lizzie Button, Emily Barnett, Neil Brewer
2014 Legal and Criminological Psychology  
Inconsistencies influenced participants' verdicts regardless of whether an alternative explanation was made salient, such that inconsistent confessions resulted in fewer guilty verdicts than consistent  ...  Drawing on principles from attribution theory, we hypothesized that inconsistencies would undermine the credibility of confession evidence only when there was a salient, plausible alternative explanation  ...  To further explore this account, we tested whether the effect of inconsistency on verdicts were mediated by perceptions that the defendant had an ulterior motive to confess.  ... 
doi:10.1111/lcrp.12048 fatcat:ip5ac5bb75ddflbhugxw3ourqq

WSASRESSO - A Novel Framework for Analysis of SAML based SSO Protocols using Black Box Penetration Testing

Shymala Gowri, Nivaashini Mathappan, Hema Priya, Sasidharan R.
2017 International Journal of Computer Applications  
Single Sign-On (SSO) is a simplified approach which relieves users from the burden of dealing with multiple credentials but at the same time presents new security challenges.  ...  With three different parties participating in the authentication process, SSO solutions involve different layers of communication and exchange of credentials that are enabled by using HTTP redirection  ...  From the aspect of the user, Single Sign-on enables the experience of logging in to Stack Overflow with one's Facebook account.  ... 
doi:10.5120/ijca2017915304 fatcat:fhq25fuc6rcwhbmvzgrgl6xpei

Interference in letter identification: A test of feature-specific inhibition

Jeffrey L. Santee, Howard E. Egeth
1980 Perception & Psychophysics  
The role of perceptual interference in letter identification was investigated in three experiments designed to test the feature-specific inhibition model proposed by Bjork and Murray (1977) .  ...  Results from Experiment 2 indicated that single-target performance is a function of the degree of feature similarity between the target letter and background characters in a stimulus display.  ...  An identical experiment was conducted on a different set of subjects, except that ambiguous characters were used in place of the nontarget letter O.  ... 
doi:10.3758/bf03206121 pmid:7383817 fatcat:gaj74d5qxjexbiffjze223amua

Locus of semantic priming effects in speeded naming

Alan H. Kawamoto, Kathryn Goeltz, Jennifer T. Agbayani, Kristy Groel
1998 Psychonomic Bulletin & Review  
Contrary to previous reports of an interaction of prime and regularity (a factor closely related to consistency) on naming latency, we found no interaction of prime and consistency on response latency.  ...  These duration results cannot be accounted for by previous proposals, but they can be accounted for by models in which phonemes are activated in parallel rather than serially from left to right and in  ...  in the sign of the slope of the waveform within the window reached a predetermined criterion.  ... 
doi:10.3758/bf03208844 fatcat:te6udhox4vaj3hhxtivuf5v3pa

Page 395 of The Southern Magazine Vol. 14, Issue 4 [page]

1874 The Southern Magazine  
loss of temper or person- alities as signs of weakness in an argument, but rather consider the English coolness and the French courtesy to an opponent as marks of insincerity or indifference)— demonstrating  ...  These, so far as we can remember them, all turn upon a single question of fact or identity, which settled, the rest is plain.  ... 

Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model

San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov
2013 Zenodo  
OpenID and OAuth are open and simple web single sign-on (SSO) protocols that have been adopted by major service providers, and millions of supporting websites.  ...  in their perceived web SSO value due to the employment of password management practices.  ...  Acknowledgements We thank study participants for their time, and members of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE), who provided valuable feedback on the earlier  ... 
doi:10.5281/zenodo.3264654 fatcat:pfn3dkjglzdx5l3zmcqqug57oy

Where are my containers?

Marc Asendorf, Hasanur Jaman Seam, Christian Maeder, Salva Daneshgadeh Cakmakci, Bernhard J. Berger
2021 Zenodo  
The trust between players is limited as they are frequently competitors, yet communication if not done in an ad hoc manner often occurs without much provision for confidentiality and integrity.  ...  The players usually operate their own local databases and exchange state changes of containers via bilateral peer-to-peer communication that may easily lead to inconsistent information.  ...  ACKNOWLEDGMENT We thank the organizers of the workshop and the anonymous reviewers for their valuable feedback.  ... 
doi:10.5281/zenodo.5604449 fatcat:5njn3en6nzatnkyu3lnyhevpwm
« Previous Showing results 1 — 15 out of 147,083 results