750 research outputs found

    Multi-Scalar-Singlet Extension of the Standard Model - the Case for Dark Matter and an Invisible Higgs Boson

    Full text link
    We consider a simple extension of the Standard Model by the addition of N real scalar gauge singlets \vp that are candidates for Dark Matter. By collecting theoretical and experimental constraints we determine the space of allowed parameters of the model. The possibility of ameliorating the little hierarchy problem within the multi-singlet model is discussed. The Spergel-Steinhardt solution of the Dark Matter density cusp problem is revisited. It is shown that fitting the recent CRESST-II data for Dark Matter nucleus scattering implies that the standard Higgs boson decays predominantly into pairs of Dark Matter scalars. It that case discovery of the Higgs boson at LHC and Tevatron is impossible. The most likely mass of the dark scalars is in the range 15 GeV \lsim \mvp \lsim 50 GeV with BR(h \to \vp\vp) up to 96%.Comment: 18 pages, 15 figure

    Information Outlook, March 2000

    Get PDF
    Volume 4, Issue 3https://scholarworks.sjsu.edu/sla_io_2000/1002/thumbnail.jp

    Phenomenology of a Fake Inert Doublet Model

    Full text link
    We introduce a new way of modeling the physics beyond the Standard Model by considering fake, strictly off-shell degrees of freedom: the fakeons. To demonstrate the approach and exemplify its reach, we re-analyze the phenomenology of the Inert Doublet Model under the assumption that the second doublet is a fakeon. Remarkably, the fake doublet avoids the most stringent ZZ-pole constraints regardless of the chosen mass scale, thereby allowing for the presence of new effects well below the electroweak scale. Furthermore, the absence of on-shell propagation prevents fakeons from inducing missing energy signatures in collider experiments. The distinguishing features of the model appear at the loop level, where fakeons modify the Higgs boson h→γγh\to\gamma\gamma decay width and the Higgs trilinear coupling. The running of Standard Model parameters proceeds as in the usual Inert Doublet Model case. Therefore, the fake doublet can also ensure the stability of the Standard Model vacuum. Our work shows that fakeons are a valid alternative to the usual tools of particle physics model building, with the potential to shape a new paradigm, where the significance of the existing experimental constraints towards new physics must necessarily be reconsidered.Comment: 12 pages, 7 figures, version accepted by JHE

    The case for federated identity management in 5G communications

    Get PDF
    The heterogeneous nature of fifth generation mobile network (5G) makes the access and provision of network services very difficult and raises security concerns. With multi-users and multi-operators, Service-Oriented Authentication (SOA) and authorization mechanisms are required to provide quick access and interaction between network services. The users require seamless access to services regardless of the domain, type of connectivity or security mechanism used. Hence a need for Identity and Access Management (IAM) mechanism to complement the improved user experience promised in 5G. Federated Identity Management (FIdM) a feature of IAM, can provide a user with use Single Sign On (SSO) to access services from multiple Service Providers (SP). This addresses security requirements such as authentication, authorization and user’s privacy from the end user perspectives, however 5G networks access lacks such solution. We propose a Network Service Federated Identity (NS-FId) model that address these security requirements and complements the 5G Service- Based Architecture (SBA). We present different scenarios and applications of the proposed model. We also discuss the benefits of identity management in 5G

    Securing digital identities in the cloud by selecting an apposite federated identity management from SAML, OAuth and OpenID Connect

    Get PDF
    Access to computer systems and the information held on them, be it commercially or personally sensitive, is naturally, strictly controlled by both legal and technical security measures. One such method is digital identity, which is used to authenticate and authorize users to provide access to IT infrastructure to perform official, financial or sensitive operations within organisations. However, transmitting and sharing this sensitive information with other organisations over insecure channels always poses a significant security and privacy risk. An example of an effective solution to this problem is the Federated Identity Management (FIdM) standard adopted in the cloud environment. The FIdM standard is used to authenticate and authorize users across multiple organisations to obtain access to their networks and resources without transmitting sensitive information to other organisations. Using the same authentication and authorization details among multiple organisations in one federated group, it protects the identities and credentials of users in the group. This protection is a balance, mitigating security risk whilst maintaining a positive experience for users. Three of the most popular FIdM standards are Security Assertion Markup Language (SAML), Open Authentication (OAuth), and OpenID Connect (OIDC). This paper presents an assessment of these standards considering their architectural design, working, security strength and security vulnerability, to cognise and ascertain effective usages to protect digital identities and credentials. Firstly, it explains the architectural design and working of these standards. Secondly, it proposes several assessment criteria and compares functionalities of these standards based on the proposed criteria. Finally, it presents a comprehensive analysis of their security vulnerabilities to aid in selecting an apposite FIdM. This analysis of security vulnerabilities is of great significance because their improper or erroneous deployment may be exploited for attacks

    Interacting Dark Sector and Precision Cosmology

    Full text link
    We consider a recently proposed model in which dark matter interacts with a thermal background of dark radiation. Dark radiation consists of relativistic degrees of freedom which allow larger values of the expansion rate of the universe today to be consistent with CMB data (H0H_0-problem). Scattering between dark matter and radiation suppresses the matter power spectrum at small scales and can explain the apparent discrepancies between Λ\LambdaCDM predictions of the matter power spectrum and direct measurements of Large Scale Structure LSS (σ8\sigma_8-problem). We go beyond previous work in two ways: 1. we enlarge the parameter space of our previous model and allow for an arbitrary fraction of the dark matter to be interacting and 2. we update the data sets used in our fits, most importantly we include LSS data with full kk-dependence to explore the sensitivity of current data to the shape of the matter power spectrum. We find that LSS data prefer models with overall suppressed matter clustering due to dark matter - dark radiation interactions over Λ\LambdaCDM at 3-4 σ\sigma. However recent weak lensing measurements of the power spectrum are not yet precise enough to clearly distinguish two limits of the model with different predicted shapes for the linear matter power spectrum. In two Appendices we give a derivation of the coupled dark matter and dark radiation perturbation equations from the Boltzmann equation in order to clarify a confusion in the recent literature, and we derive analytic approximations to the solutions of the perturbation equations in the two physically interesting limits of all dark matter weakly interacting or a small fraction of dark matter strongly interacting.Comment: 29 pages + 2 Appendices; published versio
    • …
    corecore