1,038 research outputs found
Guideline on the exchange of specific assurance information between Infrastructures
Infrastructures and generic e-Infrastructures compose an âeffectiveâ assurance profile derived from several sources, yet it is desirable to exchange the resulting assurance assertion obtained between Infrastructures so that it need not be re-computed by a recipient Infrastructure or Infrastructure service provider. This document describes the assurance profiles recommended to be used by the Infrastructure AAI Proxies between infrastructures
Guidelines on expressing group membership and role information
This document standardises the way group membership information is expressed. It defines a URN-based identification scheme that supports: indicating the entity that is authoritative for each piece of group membership information; expressing VO membership and role information; representing group hierarchies
Guidelines on stepping up the authentication component in AAIs implementing the AARC BPA
A number of research community use cases require users to verify their identity by using more than one type of credentials, for instance using password authentication, together with some physical object such as a phone or usb stick that generates tokens/pins, etc. At the same time, there are services that may require an already logged in user to re-authenticate using a stronger authentication mechanism when accessing sensitive resources. Authentication step-up is then needed to improve the original authentication strength of those users. This document provides guidelines on step-up of the authentication component. It covers requirements and implementation recommendations, describes a proposed authentication step-up model, and outlines related work and documentation
Taking a Proposal Seriously : Orientations to Agenda and Agency in Support Workersâ Responses to Client Proposals
While joint decision-making is regularly launched by a proposal, it is the recipientsâ responses that crucially influence the proposal outcome. This chapter examines how support workers respond to the proposals made by clients during rehabilitation group meetings at the Clubhouse. Drawing on a collection of 180 client-initiated proposal sequences, the paper describes two dilemmas that the support workers face when seeking to take client proposals âseriously.â The first concerns the meetingâs agenda and consists of a tension between providing recognition for the individual client and encouraging collective participation. The second dilemma has to do with agency and consists of a tension between focusing on the client as the originator of the proposal and avoiding treating him or her alone accountable for it. The analysis of these dilemmas contributes to a deeper understanding of group decision-making, in general, while these findings have specific relevance in mental health rehabilitation.While joint decision-making is regularly launched by a proposal, it is the recipientsâ responses that crucially influence the proposal outcome. This chapter examines how support workers respond to the proposals made by clients during rehabilitation group meetings at the Clubhouse. Drawing on a collection of 180 client-initiated proposal sequences, the paper describes two dilemmas that the support workers face when seeking to take client proposals âseriously.â The first concerns the meetingâs agenda and consists of a tension between providing recognition for the individual client and encouraging collective participation. The second dilemma has to do with agency and consists of a tension between focusing on the client as the originator of the proposal and avoiding treating him or her alone accountable for it. The analysis of these dilemmas contributes to a deeper understanding of group decision-making, in general, while these findings have specific relevance in mental health rehabilitation.Peer reviewe
Forward with Active Clamp for space applications: clamp capacitor, dynamic specifications and EMI filter impact on the power stage design
The impact of the clamp capacitor design, the dynamic specifications and the EMI filter design on the power stage design of a 28V 50W Forward with Active Clamp converter for space applications is analyzed along this paper. Clamp capacitor is designed by considering the ECSS standards limitations for the semiconductors and saturation of the magnetic components, and considering the influence of the resonance between this capacitance and the magnetizing inductance on the input impedance of the converter. Dynamic specifications influence are analyzed. Additionally, the EMI filter design process is described. Singlestage and Multi-stage approaches are proposed. All these features make an increase of 2:4W losses and 1:6 higher area of the converter, compared with a preliminary design of the power stage, before considering these aspects
Expression of REFEDS RAF assurance components for identities derived from social media accounts
Infrastructure Proxies may convey assurance information derived from multiple sources, one of which may be âsocial identityâ sources. This guidance explains under which conditions combination of assurance information and augmentation of identity data within the Infrastructure Proxy should result in assertion of the REFEDS Assurance Framework components âunique identifierâ, and when it may be appropriate to assert the âidentity proofingâ component value low
Recommendations on the exchange of personal data in accounting data sharing
Provide templates for policies that operators of different components in the infrastructures can use. It provides updates about the legal context and identifies the minimal set of information needed by the participants in the prevalent use cases. Note: it predated version 2 of the GEANT Code of Conduct, which will revise these recommendations
Guidelines for Credential Delegation
In distributed environments it is often necessary for a remote service to access other services on behalf of a user, or for a software agent to act on behalf of the user. This guidelines consider delegation of credentials based on signed assertions, session tickets, âtokensâ of various types, and proxy certificates
- âŠ