63,832 research outputs found
PKI Scalability Issues
This report surveys different PKI technologies such as PKIX and SPKI and the
issues of PKI that affect scalability. Much focus is spent on certificate
revocation methodologies and status verification systems such as CRLs,
Delta-CRLs, CRS, Certificate Revocation Trees, Windowed Certificate Revocation,
OCSP, SCVP and DVCS.Comment: 23 pages, 2 figure
A Roadmap to Reduce U.S. Food Waste by 20 Percent
The magnitude of the food waste problem is difficult to comprehend. The U.S. spends $218 billion a year -- 1.3% of GDP -- growing, processing, transporting, and disposing of food that is never eaten. The causes of food waste are diverse, ranging from crops that never get harvested, to food left on overfilled plates, to near-expired milk and stale bread. ReFED is a coalition of over 30 business, nonprofit, foundation, and government leaders committed to building a different future, where food waste prevention, recovery, and recycling are recognized as an untapped opportunity to create jobs, alleviate hunger, and protect the environment -- all while stimulating a new multi-billion dollar market opportunity. ReFED developed A Roadmap to Reduce U.S. Food Waste as a data-driven guide to collectively take action to reduce food waste at scale nationwide.This Roadmap report is a guide and a call to action for us to work together to solve this problem. Businesses can save money for themselves and their customers. Policymakers can unleash a new wave of local job creation. Foundations can take a major step in addressing environmental issues and hunger. And innovators across all sectors can launch new products, services, and business models. There will be no losers, only winners, as food finds its way to its highest and best use
Machine-Readable Privacy Certificates for Services
Privacy-aware processing of personal data on the web of services requires
managing a number of issues arising both from the technical and the legal
domain. Several approaches have been proposed to matching privacy requirements
(on the clients side) and privacy guarantees (on the service provider side).
Still, the assurance of effective data protection (when possible) relies on
substantial human effort and exposes organizations to significant
(non-)compliance risks. In this paper we put forward the idea that a privacy
certification scheme producing and managing machine-readable artifacts in the
form of privacy certificates can play an important role towards the solution of
this problem. Digital privacy certificates represent the reasons why a privacy
property holds for a service and describe the privacy measures supporting it.
Also, privacy certificates can be used to automatically select services whose
certificates match the client policies (privacy requirements).
Our proposal relies on an evolution of the conceptual model developed in the
Assert4Soa project and on a certificate format specifically tailored to
represent privacy properties. To validate our approach, we present a worked-out
instance showing how privacy property Retention-based unlinkability can be
certified for a banking financial service.Comment: 20 pages, 6 figure
Preservation for Institutional Repositories: practical and invisible
With good prospects for growth in institutional repository (IR) contents, in the UK, due to the proposed RCUK policy on mandating deposit of papers on funded work, and internationally due to the Berlin 3 recommendation, it is timely to investigate preservation solutions for IRs. The paper takes a broad view of preservation issues for IRs - based on practice, experience and visions for the future - from the perspective of Preserv, a JISC-funded project. It considers preservation in the context of IRs. Based on the OAIS preservation model, an architecture is proposed to support distributed preservation services for IRs. Work performed so far involves adapting the IR user deposit interface in a pilot version of EPrints software for building IRs, and determining accurate file format information using Pronom software. The paper looks ahead briefly at the role of preservation service providers, working for the IR, within this architecture. The strategy is to take practical steps that are, as far as possible, invisible to all but those concerned with the preservation process for IRs
GridCertLib: a Single Sign-on Solution for Grid Web Applications and Portals
This paper describes the design and implementation of GridCertLib, a Java
library leveraging a Shibboleth-based authentication infrastructure and the
SLCS online certificate signing service, to provide short-lived X.509
certificates and Grid proxies. The main use case envisioned for GridCertLib, is
to provide seamless and secure access to Grid/X.509 certificates and proxies in
web applications and portals: when a user logs in to the portal using
Shibboleth authentication, GridCertLib can automatically obtain a Grid/X.509
certificate from the SLCS service and generate a VOMS proxy from it. We give an
overview of the architecture of GridCertLib and briefly describe its
programming model. Its application to some deployment scenarios is outlined, as
well as a report on practical experience integrating GridCertLib into portals
for Bioinformatics and Computational Chemistry applications, based on the
popular P-GRADE and Django softwares.Comment: 18 pages, 1 figure; final manuscript accepted for publication by the
"Journal of Grid Computing
Prospects for a European Animal Welfare Label from the German Perspective: Supply Chain Barriers
The Federal Government of Germany as well as the European Commission are discussing the establishment of an animal welfare label. This label should enable consumers to make a conscious purchasing decision on animal welfare products. Various studies show that many consumers (in Germany around 20 %) prefer products produced under animal friendly conditions. However, the supply of such products is limited. The following study examines the source of this discrepancy by way of an action‐based analytical approach and identifies different barriers within the supply chain that prevent the establishment of a market segment for animal welfare products. Although consumer demand will be decisive for long‐term success, first of all the stakeholders of the supply chain must be convinced. If the stakeholders are not prepared to participate in an animal welfare program the diffusion phase can take a very long time or even fail. This study presents such supply chain barriers and interprets them in the light of neoinstitutionalism.animal welfare, label, supply chain, neo‐institutionalism., Food Consumption/Nutrition/Food Safety, Food Security and Poverty, Industrial Organization, Research Methods/ Statistical Methods, Risk and Uncertainty,
- …