8,609 research outputs found

    Towards a metric for recognition-based graphical password security

    Get PDF
    Recognition-based graphical password (RBGP) schemes are not easily compared in terms of security. Current research uses many different measures which results in confusion as to whether RBGP schemes are secure against guessing and capture attacks. If it were possible to measure all RBGP schemes in a common way it would provide an easy comparison between them, allowing selection of the most secure design. This paper presents a discussion of potential attacks against recognition-based graphical password (RBGP) authentication schemes. As a result of this examination a preliminary measure of the security of a recognition-based scheme is presented. The security measure is a 4-tuple based on distractor selection, shoulder surfing, intersection and replay attacks. It is aimed to be an initial proposal and is designed in a way which is extensible and adjustable as further research in the area develops. Finally, an example is provided by application to the PassFaces scheme

    The effectiveness of intersection attack countermeasures for graphical passwords

    Get PDF
    Recognition-based graphical passwords are one of several proposed alternatives to alphanumerical passwords for user authentication. However, there has been limited work on the security of such schemes. Often authors state a possible attack combined with a proposed countermeasure, but the efficacy of the counter measure is not always quantitatively examined. One possible attack which has been discussed without this examination is an intersection attack. If we can establish which countermeasures for this attack are effective, this will provide insight which will make it possible to select the appropriate countermeasure for the level of security required by a given system. Our approach involved creating a simulation of intersection attacks using each of five possible counter measures. The number of attacks which had to be performed before success for each approach was noted and compared to a control where no counter measure was implemented. Our results show that for three of the five countermeasures there was a significant increase in the number of attacks before success, one showed a significant decrease and the other did not show any statistical significance. We show that it is not decisive that using dummy screens when an incorrect image is selected will increase the number of attacks required. We also show that increasing the number of challenge screens reduces the number of attacks required before success as the number of challenge screens approaches the size of the passimage set. Our results allow one to make a more reliable choice of countermeasure to reduce intersection attacks

    Humility, Listening and ā€˜Teaching in a Strong Senseā€™

    Get PDF
    My argument in this paper is that humility is implied in the concept of teaching, if teaching is construed in a strong sense. Teaching in a strong sense is a view of teaching as linked to studentsā€™ embodied experiences (including cognitive and moral-social dimensions), in particular studentsā€™ experiences of limitation, whereas a weak sense of teaching refers to teaching as narrowly focused on student cognitive development. In addition to detailing the relation between humility and strong sense teaching, I will also argue that humility is acquired through the practice of teaching. My discussion connects to the growing interest, especially in virtue epistemology discourse, in the idea that teachers should educate for virtues. Drawing upon John Dewey and contemporary virtue epistemology discourse, I discuss humility, paying particular attention to an overlooked aspect of humility that I refer to as the educative dimension of humility. I then connect this concept of humility to the notion of teaching in a strong sense. In the final section, I discuss how humility in teaching is learned in the practice of teaching by listening to students in particular ways. In addition, I make connections between my concept of teaching and the practice of cultivating studentsā€™ virtues. I conclude with a critique of common practices of evaluating good teaching, which I situate within the context of international educational policy on teacher evaluation

    Who Are the Stakeholders in Environmental Risk Decisions - How Should They Be Involved

    Get PDF
    [Excerpt] In the United States, as in other countries, public participation in environmental policy decisions has come a long way. In its infancy, it was limited to public hearings concerning decisions that were, for all practical purposes, done deals. Overturning public agency decisions could be accomplished only through expensive, often protracted, usually futile court cases, and then only if the issue was justiciable and the plaintiff had the funds and standing to sue. In recent decades - especially since the 1960s - opportunities for public participation in the U.S. have been overhauled. Access to documents has been assured through federal and state freedom of information acts. The public may be asked to help - scope the issue at hand (i.e., determine its salient features) early in the decision-making process. Informal question and answer sessions often supplement the formal, one-way testimony of public hearings. No longer are decisions typically made behind closed doors. Public comments usually are documented and accompanied by written responses from the decision-making agency. Administrative reviews of decisions are often a first recourse, before bringing suit. And, standing to sue is more broadly interpreted. But public participation has two inherent deficiencies. First, it fails to differentiate among members of the public. Second, it preserves an us/them distinction between the decision-making agency and citizens. As a remedy, stakeholder involvement - which does differentiate among citizens and does help to lower us/them barriers - is an increasingly popular supplement to conventional public participation, especially on controversial issues involving environmental risks

    Technology of nuclear-Brayton space power systems

    Get PDF
    The present technology of Brayton power systems is reviewed. The potential for even higher system efficiency at the 10 KWe level is assessed as well as the potential for comparable efficiency with an output of 1 or 2 KWe. Systems accommodation of isotope decay is briefly discussed. The salient features are described for a Brayton power system based on this technology and employing the ZrH reactor. Reactor lives for this and competitive systems are compared. Growth capability with an advanced reactor is assessed. A concept for application of this technology to driving a gas-dynamic laser is described

    Alternative power-generation systems

    Get PDF
    The present state of the art of thermal power systems is surveyed. Because of the great potential variety of thermal power systems, the heat sources, the power conversion systems, and the integration of thermal power systems with missions are treated sequentially

    Goals of thermionic program for space power

    Get PDF
    The thermionic and Brayton reactor concepts were compared for application to space power. For a turbine inlet temperature of 15000 K the Brayton powerplant weighted 5 to 40% less than the thermionic concept. The out of core concept separates the thermionic converters from their reactor. Technical risks are diminished by: (1) moving the insolator out of the reactor; (2) allowing a higher thermal flux for the thermionic converters than is required of the reactor fuel; and (3) eliminating fuel swelling's threat against lifetime of the thermionic converters. Overall performance can be improved by including power processing in system optimization for design and technology on more efficient, higher temperature power processors. The thermionic reactors will be larger than those for competitive systems with higher conversion efficiency and lower reactor operating temperatures. It is concluded that although the effect of reactor size on shield weight will be modest for unmanned spacecraft, the penalty in shield weight will be large for manned or man-tended spacecraft

    Preliminary assessment of power-generating tethers in space and of propulsion for their orbit maintenance

    Get PDF
    The concept of generating power in space by means of a conducting tether deployed from a spacecraft was studied. Using hydrogen and oxygen as the rocket propellant to overcome the drag of such a power-generating tether would yield more benefit than if used in a fuel cell. The mass consumption would be 25 percent less than the reactant consumption of fuel cells. Residual hydrogen and oxygen in the external tank and in the orbiter could be used very effectively for this purpose. Many other materials (such as waste from life support) could be used as the propellant. Electrical propulsion using tether generated power can compensate for the drag of a power-generating tether, half the power going to the useful load and the rest for electric propulsion. In addition, the spacecraft's orbital energy is a large energy reservoir that permits load leveling and a ratio of peak to average power equal to 2. Critical technologies to be explored before a power-generating tether can be used in space are delineated

    Institutional Controls for Contaminated Sites: Help Or Hazard

    Get PDF
    The authors discuss the different institutional controls available to control long term site remediation of hazardous waste to prevent exposure to residual contamination

    Experience in investigation of components of alkali-metal-vapor space power systems

    Get PDF
    Components of reactor-powered alkali metal-vapor turbogenerator space power syste
    • ā€¦
    corecore