1,019 research outputs found

    Guideline on the exchange of specific assurance information between Infrastructures

    Get PDF
    Infrastructures and generic e-Infrastructures compose an ‘effective’ assurance profile derived from several sources, yet it is desirable to exchange the resulting assurance assertion obtained between Infrastructures so that it need not be re-computed by a recipient Infrastructure or Infrastructure service provider. This document describes the assurance profiles recommended to be used by the Infrastructure AAI Proxies between infrastructures

    Guidelines on expressing group membership and role information

    Get PDF
    This document standardises the way group membership information is expressed. It defines a URN-based identification scheme that supports: indicating the entity that is authoritative for each piece of group membership information; expressing VO membership and role information; representing group hierarchies

    Guidelines on stepping up the authentication component in AAIs implementing the AARC BPA

    Get PDF
    A number of research community use cases require users to verify their identity by using more than one type of credentials, for instance using password authentication, together with some physical object such as a phone or usb stick that generates tokens/pins, etc. At the same time, there are services that may require an already logged in user to re-authenticate using a stronger authentication mechanism when accessing sensitive resources. Authentication step-up is then needed to improve the original authentication strength of those users. This document provides guidelines on step-up of the authentication component. It covers requirements and implementation recommendations, describes a proposed authentication step-up model, and outlines related work and documentation

    Taking a Proposal Seriously : Orientations to Agenda and Agency in Support Workers’ Responses to Client Proposals

    Get PDF
    While joint decision-making is regularly launched by a proposal, it is the recipients’ responses that crucially influence the proposal outcome. This chapter examines how support workers respond to the proposals made by clients during rehabilitation group meetings at the Clubhouse. Drawing on a collection of 180 client-initiated proposal sequences, the paper describes two dilemmas that the support workers face when seeking to take client proposals “seriously.” The first concerns the meeting’s agenda and consists of a tension between providing recognition for the individual client and encouraging collective participation. The second dilemma has to do with agency and consists of a tension between focusing on the client as the originator of the proposal and avoiding treating him or her alone accountable for it. The analysis of these dilemmas contributes to a deeper understanding of group decision-making, in general, while these findings have specific relevance in mental health rehabilitation.While joint decision-making is regularly launched by a proposal, it is the recipients’ responses that crucially influence the proposal outcome. This chapter examines how support workers respond to the proposals made by clients during rehabilitation group meetings at the Clubhouse. Drawing on a collection of 180 client-initiated proposal sequences, the paper describes two dilemmas that the support workers face when seeking to take client proposals “seriously.” The first concerns the meeting’s agenda and consists of a tension between providing recognition for the individual client and encouraging collective participation. The second dilemma has to do with agency and consists of a tension between focusing on the client as the originator of the proposal and avoiding treating him or her alone accountable for it. The analysis of these dilemmas contributes to a deeper understanding of group decision-making, in general, while these findings have specific relevance in mental health rehabilitation.Peer reviewe

    Forward with Active Clamp for space applications: clamp capacitor, dynamic specifications and EMI filter impact on the power stage design

    Get PDF
    The impact of the clamp capacitor design, the dynamic specifications and the EMI filter design on the power stage design of a 28V 50W Forward with Active Clamp converter for space applications is analyzed along this paper. Clamp capacitor is designed by considering the ECSS standards limitations for the semiconductors and saturation of the magnetic components, and considering the influence of the resonance between this capacitance and the magnetizing inductance on the input impedance of the converter. Dynamic specifications influence are analyzed. Additionally, the EMI filter design process is described. Singlestage and Multi-stage approaches are proposed. All these features make an increase of 2:4W losses and 1:6 higher area of the converter, compared with a preliminary design of the power stage, before considering these aspects

    Expression of REFEDS RAF assurance components for identities derived from social media accounts

    Get PDF
    Infrastructure Proxies may convey assurance information derived from multiple sources, one of which may be ‘social identity’ sources. This guidance explains under which conditions combination of assurance information and augmentation of identity data within the Infrastructure Proxy should result in assertion of the REFEDS Assurance Framework components “unique identifier”, and when it may be appropriate to assert the “identity proofing” component value low

    Recommendations on the exchange of personal data in accounting data sharing

    Get PDF
    Provide templates for policies that operators of different components in the infrastructures can use. It provides updates about the legal context and identifies the minimal set of information needed by the participants in the prevalent use cases. Note: it predated version 2 of the GEANT Code of Conduct, which will revise these recommendations

    Guidelines for Credential Delegation

    Get PDF
    In distributed environments it is often necessary for a remote service to access other services on behalf of a user, or for a software agent to act on behalf of the user. This guidelines consider delegation of credentials based on signed assertions, session tickets, “tokens” of various types, and proxy certificates
    • 

    corecore