73,940 research outputs found

    Anonymous Single-Sign-On for n designated services with traceability

    Get PDF
    Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations. In this paper we describe a new approach whereby anonymous authentication to different verifiers is achieved via authorisation tags and pseudonyms. The particular innovation of our scheme is authentication can only occur between a user and its designated verifier for a service, and the verification cannot be performed by any other verifier. The benefit of this authentication approach is that it prevents information leakage of a user's service access information, even if the verifiers for these services collude which each other. Our scheme also supports a trusted third party who is authorised to de-anonymise the user and reveal her whole services access information if required. Furthermore, our scheme is lightweight because it does not rely on attribute or policy-based signature schemes to enable access to multiple services. The scheme's security model is given together with a security proof, an implementation and a performance evaluation.Comment: 3

    Clarens Client and Server Applications

    Get PDF
    Several applications have been implemented with access via the Clarens web service infrastructure, including virtual organization management, JetMET physics data analysis using relational databases, and Storage Resource Broker (SRB) access. This functionality is accessible transparently from Python scripts, the Root analysis framework and from Java applications and browser applets.Comment: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 4 pages, LaTeX, no figures, PSN TUCT00

    Skilled Trades Playbook: Dynamic Partnerships for a New Economy

    Get PDF
    Many businesses, especially those that rely on skilled trades workers, report difficulty finding qualified individuals to fill open jobs. We believe it's time to meet this training challenge by creating partnerships that provide an opportunity to better align the skill needs of businesses with the education and training offered by community colleges. Unfortunately, many businesses and community colleges interested in such partnerships don't know where to start. That's why this playbook was created -- as a tool for businesses, community colleges and anyone else trying to find out if this solution may make sense, showing how to get started building a partnership and the benefits that may result. It includes checklists and links to outside resources throughout this playbook that can be used either to have a conversation about beginning a partnership or guiding efforts to sustain an existing partnership. The ideas in this playbook in part grew out of a Partnerships in Practice event at the Aspen Institute in February 2013, where business leaders, community college presidents and academic experts discussed the reality and scope of the skills gap, the challenges they face, and how businesses and schools can work together to prepare the future and incumbent workforce. This was combined with real-world examples of local partnerships that are preparing skilled trades workers

    Closing the Teacher Quality Gap in Philadelphia: New Hope and Old Hurdles

    Get PDF
    This study of teacher staffing issues in the School District of Philadelphia, the third in a series, outlines the degree to which the district has succeeded in upgrading teachers' professional credentials, recruiting and retaining them, and equitably distributing experienced and credentialed teachers across all types of schools. Since the passage of NCLB and the state's takeover of the district in 2001, the district has succeeded in improving the certification rates of its teachers, especially new teachers, and in drastically cutting the number of emergency-certified teachers and classroom vacancies. It has also improved new teacher retention and has modernized and decentralized its hiring process. At the same time, it has not been able to change the pattern of having the least qualified teachers in schools serving the highest percentages of poor and minority students nor its poor long-term rate of teacher retention. The district is also challenged to speed up and simplify its hiring and school placement process and to hire more minority teachers

    Preparedness, Career Advancement, and the Glass Ceiling

    Get PDF
    Glass Ceiling ReportGlassCeilingBackground15Preparedness.pdf: 4582 downloads, before Oct. 1, 2020

    Understanding the Workforce Needs of New Jersey's Public Health and Other Disaster Management Employers

    Get PDF
    This report explores the priority workforce needs of New Jersey's public disaster management system. An advisory group of disaster management-related employers from law enforcement and state and local public health systems and educational institutions was convened in the spring of 2006 to identify priority workforce skill needs. Researchers also conducted interviews with state officials, domestic security, public health, and disaster planning experts, as well as reviews of labor market information, state and national websites, and industry and scholarly literature

    TCG based approach for secure management of virtualized platforms: state-of-the-art

    Get PDF
    There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which need to be addressed to gain stakeholders confidence in the dynamics of new environment. One important facet of these challenges is establishing 'Trust' which is a basic primitive for any viable business model. The Trusted computing group (TCG) offers technologies and mechanisms required to establish this trust in the target platforms. Moreover, TCG technologies enable protecting of sensitive data in rest and transit. This report explores the applicability of relevant TCG concepts to virtualize enterprise resources securely for provisioning, establish trust in the target platforms and securely manage these virtualized Trusted Platforms

    A trustworthy mobile agent infrastructure for network management

    Get PDF
    Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model; the management community requires an evolutionary, rather than a revolutionary, use of mobile agents. Furthermore, security for distributed management is a major concern; agent-based management systems inherit the security risks of mobile agents. We have developed a Java-based mobile agent infrastructure for network management that enables the safe integration of mobile agents with the SNMP protocol. The security of the system has been evaluated under agent to agent-platform and agent to agent attacks and has proved trustworthy in the performance of network management tasks
    • …
    corecore