29,309 research outputs found

    The Development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration

    Get PDF
    Digital identities are being utilized more than ever as a means to authenticate computer users in order to control access to systems, web services, and networks. To maintain these digital identities, administrators turn to Identity Management solutions to offer protection for users, business partners, and networks. This paper proposes an analysis of Identity Management to be accomplished in the form of a graduate level course of study for a ten-week period for the Networking, Security, and Systems Administration department at Rochester Institute of Technology. This course will be designed for this department because of its emphasis on securing, protecting, and managing the identities of users within and across networks. Much of the security-related courses offered by the department focus primarily on security within enterprises. Therefore, Identity Management, a topic that is becoming more popular within enterprises each day, would compliment these courses. Students that enroll in this course will be more equipped to satisfy the needs of modern enterprises when they graduate because they will have a better understanding of how to address security issues that involve managing user identities across networks, systems, and enterprises. This course will focus on several aspects of Identity Management and its use in enterprises today. Covered during the course will be the frameworks of Identity Management, for instance, Liberty Identity Federation Framework and OASIS SAML 2.0; the Identity Management models; and some of the major Identity Management solutions that are in use today such as Liberty Alliance, Microsoft Passport, and Shibboleth. This course will also provide the opportunity to gain hands on experience by facilitating exemplar technologies used in laboratory investigations

    Photovoltaic design integration at Battery Park City, New York

    Get PDF
    This paper is a study of the photovoltaic (PV) systems in the buildings’ design of the Battery Park City (BPC) residential development, in New York. The BPC development is the first in the US to mandate, through the 2000 Battery Park City Authority (BPCA) guidelines, the use of PV as renewable energy generation system in its individual buildings. The scope of this study is to show how PV is integrated in the BPC buildings’ design process, and what can be learned for future PV applications. The study draws directly from the design decision making sources, investigating on the concerns and suggestions of the BPC architects, PV installers and real estate developers. It attempts to contrast a theoretical approach that sees PV as a technology to domesticate in architecture and bring, through grounded research, PV industry closer to the architectural design process. The findings of the study suggest that while stringent environmental mandates help, in the short term, to kick-start the use of PV systems in buildings, it is the recognition of the PV’s primary role as energy provider, its assimilation in the building industry, and its use in a less confining building program that allows for its evolution in architecture

    Requirements for identity management in next generation networks

    Full text link
    Identity management will become crucial to the success of Next Generation Networks (NGN). However, until now very little research has been done in this fieid. This paper presents the requirements for identity management in NGN which are currently being investigated by our research group. Our analysis is based on the characteristics and requirements of NGN architectures, services, network operators, end users, identity management requirements for web services, recent standardization efforts by various bodies, etc

    Tutorial: Identity Management Systems and Secured Access Control

    Get PDF
    Identity Management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today’s computing environment involves a variety of user and machine centric forms of digital identities and fuzzy organizational boundaries. With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and social challenges. The first part of the tutorial describes the history and conceptualization of IdMS, current trends and proposed paradigms, identity lifecycle, implementation challenges and social issues. The second part addresses standards, industry initia-tives, and vendor solutions. We conclude that there is disconnect between the need for a universal, seamless, trans-parent IdMS and current proposed standards and vendor solutions

    Geomagnetism : review 2010

    Get PDF
    The Geomagnetism team measures, records, models and interprets variations in the Earth’s natural magnetic fields, across the world and over time. Our data and expertise help to develop scientific understanding of the evolution of the solid Earth and it’s atmospheric, oceanic and space environments. We also provide geomagnetic products and services to industry and academics and we use our knowledge to inform and educate the public, government and the private sector

    Public Health Care Funding: The Battle Over Planned Parenthood

    Get PDF
    • …
    corecore