Filters








74 Hits in 14.8 sec

Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials [chapter]

Stefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner
2021 IFIP Advances in Information and Communication Technology  
Due to the lack of a global root of trust, we utilize a distributed ledger to build a decentralized web of trust, which verifiers can query to gather information on the trustworthiness of issuing institutions  ...  We do so by enabling participants to publish transformation information, which enables verifiers to transform credentials into their preferred schema.  ...  of any system that enables or supports the authenticated transformation of credentials between schemas directly by the verifier.  ... 
doi:10.1007/978-3-030-78120-0_2 fatcat:uylq3ra5xbbbvhumjrpiqut7j4

Open Identity Summit 2021 - Complete Volume

2021 Open Identity Summit  
processed, the governance of personal information in data lakes has received only cursory attention.  ...  We propose tackling this information using identity management functions and perform a systematic gap analysis based on the FIDIS typology of identity management systems.  ...  Acknowledgement This work has been supported by the COSCA research project [CO20] (NGI TRUST 2nd Open Call (ref: NGI TRUST 2019002)).  ... 
dblp:conf/openidentity/X21 fatcat:o54xtce6rneehgbbpsr3vasvvq

IoT Frameworks and Complexity [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
JSON validation ignores content not matching a schema target. OCF makes use of this behavior by allowing vendors to customize in any way they choose.  ...  If the requesting device authenticates with a credential known to the local device, then the requesting device's ID is known. Another method is by role name.  ... 
doi:10.1007/978-1-4842-2896-8_2 fatcat:amuzgyvgyjakvln6b5il2emsha

Money and Trust in Metaverses, Bitcoin and Stablecoins in global social XR [article]

John Joseph O'Hare, Allen Fairchild, Umran Ali
2022 arXiv   pre-print
A cloud deployable virtual machine based technology stack deployment guide with a focus on cybersecurity best practice can be downloaded from GitHub to experiment with the technologies.  ...  A high level overview of Web3 technologies leads to a description of blockchain, and the Bitcoin network is specifically selected for detailed examination.  ...  It uses Bitcoin keys for authentication, but communicates a schema through a metadata exchange.  ... 
arXiv:2207.09460v2 fatcat:l2zcoloatvhvzmta4cw52ggdju

EOSC-hub D13.4 Periodical assessment of the services

Małgorzata Krakowian
2021 Zenodo  
Furthermore, a set of key common metrics (number of users, number of visits to web-site and marketplace, satisfaction, etc) have been used to perform a global analysis of the impact of the Virtual Access  ...  to the EOSC-hub services that shows a remarkable growth of all these metrics during the project lifetime.  ...  of a community, can publish records under this community if that community only allows me mbers to publish in it • User: user that is registered through B2ACCESS and can create new and administer its  ... 
doi:10.5281/zenodo.5027405 fatcat:5sj7gfcmtfhy7efbdfhs4fq33i

An overview of the 2020 NISO plus inaugural annual conference: A grand experiment

Bonnie Lawlor, Bonnie Lawlor
2020 Information Services and Use  
With two and a half days of networking and education on tap, attendees had the opportunity to learn about emerging and exciting areas of change and development such as Artificial Intelligence and Machine  ...  The goal was to continue some of the best traditions of past NFAIS conferences while building in time for discussions.  ...  If you want to learn more about NISO -its history, mission, and activities -and how you can become involved even if you or your organization is not a member, read the first article in this issue of Information  ... 
doi:10.3233/isu-200099 fatcat:tuldhsgk2vclta6eamnd7fjimu

EOSC-hub D13.2 Periodical assessment of the services

Malgorzata Krakowian
2019 Zenodo  
Furthermore, a set of key common metrics (number of users, number of visits to web-site and marketplace, satisfaction, etc) have been used to perform a global analysis of the impact of the Virtual Access  ...  to the EOSC-hub services that shows a remarkable growth of all these metrics during the project lifetime.  ...  records under this community if that community only allows me mbers to publish in it • User: user that is registered through B2ACCESS and can create new and administer its own existing records through  ... 
doi:10.5281/zenodo.4605787 fatcat:fcvnlagwjjgszatbu4ksutpzny

PARTHENOS D3.1 Guidelines for Common Policies Implementation (1)

Hella Hollander, Francesca Morselli, Femmy Admiraal, Anders Conrad, Thorsten Trippel, Douwe Zeldenrust, Paola Ronzino, Sara Di Giorgio, Antonio Davide Madonna, Mark Hedges
2017 Zenodo  
The document presents the first definition of PARTHENOS high-level principles, offered as common guidelines to build bridges between different, although tightly interrelated fields and stakeholders within  ...  the Humanities by the harmonization of policy definition and their implementation.  ...  supported in our infrastructure  Acceptable if in preferred formats  Other, please specify  No general policy Describe the process you follow (if any) to ensure continued authenticity and integrity  ... 
doi:10.5281/zenodo.2668392 fatcat:fzty4vo4c5ctdcyno7hgip2zgq

Applying Secure Multi-Party Computation In Practice

Riivo Talviste
2017 Zenodo  
The main contribution of this work is an end-to-end process description of deploying secure multi-party computation for the first large-scale registry-based statistical study on linked databases.  ...  We will first give a brief overview of the current state of the art, bring out several shortcomings and address them.  ...  If authentication is required, it generally does not make sense to authenticate to every computation party separately as this would require replicating user authentication code and user credentials database  ... 
doi:10.5281/zenodo.1116316 fatcat:jhzsyrgt2beptj6jdb6axtvzfy

Security And Privacy Architecture

Petr Holub, Common Service IT
2016 Zenodo  
as an appendix to this deliverable.  ...  Privacy protection comprises analysis of risks and design of countermeasures, such as appropriate use of privacyenhancing technologies and security measures.  ...  Another set of LoAs has been proposed by The Interoperable Global Trust Federation (IGTF) : ASPEN, BIRCH, CEDAR, and DOGWOOD.  ... 
doi:10.5281/zenodo.159444 fatcat:xeadlbuxbvg2lijwor5zzxvmwi

International Research Conference on Smart Computing and Systems Engineering SCSE 2020 Proceedings [Full Conference Proceedings]

2020 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE)  
in the University of Kelaniya for their immense support and encouragement they gave throughout the development phase of the data sets.  ...  ACKNOWLEDGMENT The authors would like to thank the Department of Census and Department of Irrigation, Sri Lanka for providing the paddy yield and climate data for this study.  ...  to know you better.  ... 
doi:10.1109/scse49731.2020.9313027 fatcat:gjk5az2mprgvrpallwh6uhvlfi

Basic Concepts [chapter]

2011 Oracle Database Performance and Scalability  
You will find each publication reinforces the series goal of assisting the reader with producing useful, well-engineered software systems.  ...  Each title brings the principles and theory of programming in-the-large and industrial strength software into focus.  ...  For example, one can use a synonym to mask the real name and owner of a schema object or one can provide global access to a schema object by creating the synonym as a public synonym owned by the user group  ... 
doi:10.1002/9781118135532.ch1 fatcat:itsggugltfdqvis5qndwmthbku

D3.1 – State-of-the-Art and Market Analysis Report

ASSIST-IoT Consortium
2021 Zenodo  
Document with main results of SotA review and stakeholders and market analysis carried out.  ...  Some relevant work includes: • W3C's Web of Things which uses JSON-LD to describe things as object with properties, actions, and events, using JSON Schema for describing the data types. • W3C's Resource  ...  secured, • Users of the application are authenticated and authorized, the owner of the service provided is considered as trusted at the client.  ... 
doi:10.5281/zenodo.6705158 fatcat:xote6pjzubcvxo4aqxxbraooxi

Final Report --- Always Already Computational: Collections as Data [article]

Thomas Padilla, Laurie Allen, Hannah Frost, Sarah Potvin, Elizabeth Russey Roke, Stewart Varner
2019 Zenodo  
From 2016-2018 Always Already Computational: Collections as Data documented, iterated on, and shared current and potential approaches to developing cultural heritage collections that support computationally-driven  ...  conferences, and generated nearly a dozen deliverables meant to guide institutions as they consider development of collections as data.  ...  Acknowledgements The project team would like to acknowledge the Institute of Museum and Library Services, whose support made this project possible.  ... 
doi:10.5281/zenodo.3152934 fatcat:4plw2tw3tzha3bt6qwvhrqcyrq

Getting Started with Cloud Computing: A LITA Guide

Ginny M. Boyer
2012 Journal of the Medical Library Association  
Acknowledgments T he editors would like to acknowledge the University of Ottawa's School of Information Studies for the use of facilities during the preliminary phase of editing.  ...  From the vendor's point of view, this can be further complicated if the company operates on a global basis.  ...  In addition, "[t]he Trusted Cloud Initiative, the product of an alliance between the CSA (Cloud Getting Started with Cloud Computing 52 A frequent question is what happens to the library's data if  ... 
doi:10.3163/1536-5050.100.4.019 fatcat:do6p6vw3jfd2bld3ys2xewx26a
« Previous Showing results 1 — 15 out of 74 results