4,846 Hits in 6.6 sec

Single Sign-On in Service-Oriented Computing [chapter]

Kurt Geihs, Robert Kalcklösch, Andreas Grode
2003 Lecture Notes in Computer Science  
Because implementations of Liberty were not widely available and in order to understand the conceptual implications and practical requirements of SSO we have built our own SSO solution.  ...  Support for Single Sign-On (SSO) is a frequently voiced requirement for Service-Oriented Computing. We discuss SSO strategies and approaches, their requirements and constraints.  ...  Such a system could be a local application at the user-side or a serverside proxy, managed and operated by an administrator who manages the login on behalf of the user.  ... 
doi:10.1007/978-3-540-24593-3_26 fatcat:3tamkpkk65dl5cchrfkrffybku

Comprehensive multiplatform collaboration

Kundan Singh, Xiaotao Wu, Jonathan Lennox, Henning G. Schulzrinne, Nalini Venkatasubramanian
2003 Multimedia Computing and Networking 2004  
We describe the architecture and implementation of our comprehensive multi-platform collaboration framework known as Columbia InterNet Extensible Multimedia Architecture (CINEMA).  ...  The paper discusses the media services needed for collaborative environment, the components provided by CINEMA and the interaction among those components.  ...  An administrator can add additional users as administrator or regular user, change the user type, or access profiles of other users. New users can also "sign-up" for the service from the web.  ... 
doi:10.1117/12.538813 fatcat:m73vq6pk4fdu7i6qrw4ky5yn3m

The Trusted Server: A secure computational environment for privacy compliant evaluations on plain personal data

Nikolaus von Bomhard, Bernd Ahlborn, Catherine Mason, Ulrich Mansmann, Lixiang Li
2018 PLoS ONE  
Distributed computing and data obfuscation technologies reduce but do not eliminate the risk of privacy leakage by administrators.  ...  A growing framework of legal and ethical requirements limit scientific and commercial evalua-tion of personal data.  ...  Apache2 can authenticate against any LDAP server instead of using its own user and password database.  ... 
doi:10.1371/journal.pone.0202752 pmid:30188932 pmcid:PMC6126811 fatcat:6mxz3sezjzb6doaufxitduf7ne

Privacy-Enhancing Technologies [chapter]

Kent Seamons
2021 Modern Socio-Technical Perspectives on Privacy  
Frequent reports of data breaches and sensitive data disclosures underscore the need for effective technologies that users and administrators can deploy to protect sensitive data.  ...  These technologies include secure messaging, secure email, HTTPS, two-factor authentication, and anonymous communication.  ...  Acknowledgments I want to thank Daniel Zappala and our students at BYU that participated in some of the research described in this chapter.  ... 
doi:10.1007/978-3-030-82786-1_8 fatcat:2hciujom6rawxgbhpuahtxfv6i

AnySpot: Pervasive Document Access and Sharing

Jonathan Trevor, David M. Hilbert
2007 IEEE pervasive computing  
AnySpot is a Web-service-based platform that seamlessly connects users to personal and shared documents wherever they go, meeting several key requirements of pervasive information access.  ...  The lowest panel, "Activity," shows the 10 most recent actions-such as emailed, read, faxed, and so on-that the user has performed on the file or folder.  ...  Users don't need to copy or move their files anywhere, and, in the case of shared proxies, all participants can see any subsequent changes to the file.  ... 
doi:10.1109/mprv.2007.50 fatcat:iamo3wutifdzpkyxm6dl3ntuj4

Smart sound environments: merging intentional soundscapes, nonspeech audio cues and ambient intelligence

Ralf Jung
2008 Journal of the Acoustical Society of America  
In the paper, we will describe the architecture of the personalized ambient audio notification service, compositional constraints as well as some findings of a user study.  ...  Acoustics 08 Paris 6427 We introduce an intelligent audio notification system for multi-user environments that provides users with information about events (e.g. important emails) in a more discreet and  ...  AEMN recognizes when one or more registered users enter the room and automatically starts the selected background soundscape and the login process for checking the user accounts on the email server.  ... 
doi:10.1121/1.2936002 fatcat:zchvvyxs55b4vd7wy62flaerwi

An electronic voting service to support decision-making in local government

C Bouras, N Katris, V Triantafillou
2003 Telematics and informatics  
Only authorised users can use the system to vote or create a questionnaire. All users can view results from previous voting procedures.  ...  The service provides the capability to create a questionnaire/poll, view the subject and participate in the voting procedure.  ...  The use of the application must be available to all citizens who have access to the Internet through a personal computer (home, work etc.) or an infokiosk, without (necessarily) having an email account  ... 
doi:10.1016/s0736-5853(03)00017-0 fatcat:gim6i3hqnne3bjradhbkhd5gny

User identity issues in mashups for learning experiences using IMS Learning Design

Luis De la Fuente Valentin, Derick Leony, Abelardo Pardo, Carlos Delgado Kloos
2011 International Journal of Technology Enhanced Learning  
The combination of services that provide personal information in technologies such as educational mashups brings some issues in the management of users' identity and authorization.  ...  This scenario allows to describe the problems of user correspondence, authenticated data retrieval, and remote account creation; a solution using technologies currently available is provided for each,  ...  and "Investigación y Desarrollo de Tecnologías para el e-Learning en la Comunidad de Madrid" funded by the Madrid Regional Government under grant No.  ... 
doi:10.1504/ijtel.2011.039065 fatcat:s6r6bauocjcfvch3iyzs6xgdoq

On the Feasibility of a Technological Response to the Surveillance Morass [chapter]

Joan Feigenbaum, Jérémie Koenig
2014 Lecture Notes in Computer Science  
After presenting some objections to the behavior of the US National Security Agency and its counterparts in allied nations (emphasizing technical problems associated with such behavior, rather than political  ...  We consider mass surveillance from a computer-science perspective.  ...  By entrusting all of our personal data and the records of all of our online activity to one (or a very small number of) for-profit cloud-service providers (Google, Facebook, Yahoo!  ... 
doi:10.1007/978-3-319-12400-1_23 fatcat:eupmk554t5h3xmhhmdds26f7se

Study on Transformation of Distance Education Management by Cloud Computing

Li Yi Qi, Li Xin, Feng Jian Li
2012 International Journal of Information and Education Technology  
System which based on cloud computing has greatly changed the philosophy and operation of distance education, improves the entire level of distance education management.  ...  Distance education has two modes: television teaching and internet teaching, both of them have disadvantages in lack of system expansion capabilities and scalability.  ...  Visiting administration module uses three categories to differentiate users: SaaS providers or application administrators, lessee or lessee administrators and users.  ... 
doi:10.7763/ijiet.2012.v2.211 fatcat:x4pm5trcpve4jdabz5awpiaowq

Extending identity management system with multimodal biometric authentication

Bojan Jovanovic, Ivan Milenkovic, Marija Bogicevic-Sretenovic, Dejan Simic
2016 Computer Science and Information Systems  
In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials.  ...  The authentication process can be additionally secured by using biometric data for user verification.  ...  Acknowledgement This work is a part of the project Multimodal biometry in identity management, funded by Ministry of Education and Science of Serbia, contract number TR-32013.  ... 
doi:10.2298/csis141030003j fatcat:dwz5baknlbfctajxguv6bck6ye

KISS: "Key It Simple and Secure" Corporate Key Management [chapter]

Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor
2013 Lecture Notes in Computer Science  
KISS protects the entire life cycle of cryptographic keys. In particular, KISS allows only authorized applications and/or users to use the keys.  ...  None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB  ...  We are grateful to the reviewers and Aziz Mohaisen for their insightful suggestions.  ... 
doi:10.1007/978-3-642-38908-5_1 fatcat:qtmfikvt2bdprieszmb6eb3xha

Biometric-based Authentication Techniques for Securing Cloud Computing Data - A Survey

Asmaa M., Hala M., Mostafa-Sami M.
2018 International Journal of Computer Applications  
Traditional authentication techniques and credentials does not provide enough security against the modern means of attacks.  ...  With this unlimited growth of using cloud services and the multi-tenancy nature of sharing cloud service instance between different consumers and enterprises, securing accessing to the data of the cloud  ...  If the ID and password match, the server generates a dynamic token to user's email to complete the authentication process.  ... 
doi:10.5120/ijca2018916509 fatcat:qcf4qw4rujbcfcl5hl3h3aioey

Two Aspect Authentication System Using Secure Mobile Devices

S. Uvaraj
2013 International Journal of Wireless Communications and Mobile Computing  
Relying on the personalized and trusted nature of such devices, security features can be deployed on them in order to uniquely identify a user to a service provider.  ...  once they became aware of the potential threats when using an untrusted computer.  ...  The user enters his PIN on the phone, and the phone computes the same security code generated at the time of activation.  ... 
doi:10.11648/j.wcmc.20130101.15 fatcat:75mcbeoc3ne4niympchh7j4ici

An infrastructure for extending applications' user experiences across multiple personal devices

Jeffrey S. Pierce, Jeffrey Nichols
2008 Proceedings of the 21st annual ACM symposium on User interface software and technology - UIST '08  
The applications that users employ on those devices, however, still largely provide user experiences that assume the use of a single computer.  ...  Users increasingly interact with a heterogeneous collection of computing devices.  ...  Users create a single account on a server and affiliate their devices with it. Each device authenticates to the server as the user and has an address of the form userid@server/device.  ... 
doi:10.1145/1449715.1449733 dblp:conf/uist/PierceN08 fatcat:3vzkmuqnwvaz3hcwvul4yii2va
« Previous Showing results 1 — 15 out of 4,846 results