70,723 research outputs found

    The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

    Full text link
    Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users' digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point of compromise. The protocol relies on decentralized identifiers (DIDs) under development by the W3C Verifiable Claims Community Group and the concept of self-sovereign identity. To accomplish this, we propose specification and implementation of a decentralized biometric credential storage option via blockchains using DIDs and DID documents within the IEEE 2410-2017 Biometric Open Protocol Standard (BOPS)

    Secure Mobile Social Networks using USIM in a Closed Environment

    Get PDF
    Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrollment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfill the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification

    Creative methodologies for understanding a creative industry

    Get PDF
    The chapter presents a conceptual framework for the identification and analysis of value creating and value capture systems within creative industry contexts based on theoretical and empirical studies. It provides a ‘digital economy’ perspective of the creative industries as a micro-level example of a wider analytical problem, which is how society changes itself. The increasing level of innovation and creativity produces greater levels of instability in social structures (habits, norms etc.) Completely new industries can arise (and ‘creatively’ destroy old ones) as new stabilised patterns form, particularly where entry costs are tumbling, such as digital milieu. Observations of workshops over several days with creative groups, interviews with creative enterprises, literature reviews on creative industries, business models and value systems have informed the analysis and conceptualisation. As a result we present a conceptual framework that we suggest can capture how novelty arises as emergent order over time. We have extended previous work that investigates the significance of emergence in theorising entrepreneurship into an exploration of how to articulate the creation and flow of value and effective ontology in a creative landscape. In the digital economy, the creative industries revolve around dynamic, innovative and often unorthodox collaborations, whereby numerous large, small and micro-businesses come together for the duration of a project, then disband and form new partnerships for the next project. Research designs must therefore address multiple contexts and levels presenting an analytical challenge to researchers. Methodologically, we suggest that the framework has analytical potential to support the collection of data: ordering and categorising empirical observations concerning how different phenomena emerge over time across multiple levels of analysis and contexts. Conceptually, the work broadens the notions of ‘business model’ to consider value creating systems and particular states reached by those systems in their evolution. The work contributes new concepts for researchers in this field and a wider framework for practitioners and policy makers

    Development of an Extended Product Lifecycle Management through Service Oriented Architecture.

    Get PDF
    Organised by: Cranfield UniversityThe aim of this work is to define new business opportunities through the concept of Extended Product Lifecycle Management (ExtPLM), analysing its potential implementation within a Service Oriented Architecture. ExtPLM merges the concepts of Extended Product, Avatar and PLM. It aims at allowing a closer interaction between enterprises and their customers, who are integrated in all phases of the life cycle, creating new technical functionalities and services, improving both the practical (e.g. improving usage, improving safety, allowing predictive maintenance) and the emotional side (e.g. extreme customization) of the product.Mori Seiki – The Machine Tool Company; BAE Systems; S4T – Support Service Solutions: Strategy and Transitio

    Shaping a Corporate Identity From Below; the Role of the BAT Bulletin.

    Get PDF
    Existing studies that have explored the use of company journals as a mode of corporate communication during the early 20th century have invariably adopted an instrumentalist view of these publications. Company journals have been seen as a means of projecting to employees a top-down view of organisations. This article identifies a counter-example in which the origins of a company journal, the 'Bat Bulletin', are seen to arise as the result of an initiative stemming from the employees themselves. These antecedents gave the 'Bat Bulletin' a high degree of legitimacy amongst staff and provided the company with an important means of establishing a unified corporate culture across a disparate group international operating companies. Over time, however, the contents of the journal gradually became more conventional, and it was eventually closed down when the strategy of international integration ceased to be a desirable corporate objective during the 1930's

    Mobile phone and e-government in Turkey: practices and technological choices at the cross-road

    Get PDF
    Enhanced data services through mobile phones are expected to be soon fully transactional and embedded within future mobile consumption practices. While private services will surely continue to take the lead, others such as government and NGOs will become more prominent m-players. It is not yet sure which form of technological standards will take the lead including enhance SMS based operations or Internet based specifically developed mobile phone applications. With the introduction of interactive transactions via mobile phones, currently untapped segment of the populations (without computers) have the potential to be accessed. Our research, as a reflection of the current market situation in an emerging country context, in the case of mobile phones analyzes the current needs or emergence of dependencies regarding the use of m/e-government services from the perspective of municipality officers. We contend that more research is needed to understand current preparatory bottlenecks and front loading activities to be able to encourage future intention to use e-government services through mobile phone technologies. This study highlights and interprets the current emerging practices and praxis for consuming m-government services within government
    corecore