155 research outputs found

    FIM4R Position Paper on the Desired Evolution of EOSC Authentication and Authorisation Infrastructures

    Get PDF
    Authored by: the FIM4R Community The European Open Science Cloud (EOSC) will soon enter the next phase of integration and consolidation with the establishment of a common service portal listing underpinning services that enable distributed resources in the areas of computation, data, open access, and above-the-net collaboration services. The existing e-Infrastructures that are anticipated to be part of the EOSC each provide their own capabilities in terms of trust and identity management, integrity protection and risk management, as well as capabilities to support business continuity and disaster recovery in case of security incidents. There are also specific trust, collaboration management, and security services that are jointly managed by multiple e-Infrastructures for the benefit of (but in many cases not exclusively) the European research and collaboration community as a whole. These include for instance the glue between the EOSC AAI suite of services that each implement the AARC Blueprint Architecture (AARC BPA), i.e. the AAI services such as those from both national and pan-European Infrastructures as well as components such as credential translation bridge services

    Inferring and constructing origin-affiliation information across infrastructures (AARC G057)

    Get PDF
    Conveying affiliation information from origin providers across infrastructures proxies as defined in G025 is only possible if the origin identity provider releases such information. In case no eduPersonScopedAffiliation is provided, it may be partially reconstructed according to these guidelines. If there is no reliable way to infer origi

    Runoff drainage system design

    Get PDF

    Guidelines for Secure Operation of Attribute Authorities and other issuers of access-granting statements

    Get PDF
    These guidelines describe the minimum requirements and recommendations for the secure operation of Attribute Authorities and similar services providing statements for the purpose of obtaining access to infrastructure services. Stated compliance with these guidelines may help to establish trust between issuers and Relying Parties. This document does not define an accreditation process

    Education and social care predictors of offending trajectories: A UK administrative data linkage study

    Get PDF
    Objectives The age-crime curve indicates that criminal behaviour peaks in adolescence and decreases in adulthood, but longitudinal studies suggest that this curve conceals distinct patterns of (re)-offending or trajectories. Some trajectories (e.g., life course persistent offenders) are reported to have distinct risk factors and more negative outcomes than others (e.g., adolescent limited offenders). Methods The current study had two main objectives: (1) To use UK administrative crime data to identify trajectories of (re)-offending; and (2) To prospectively identify (re)-offending trajectories using longitudinal administrative education and social care data. This project uses linked UK administrative data containing the anonymised education and social care records for individuals born between September 1985 and August 1999, which have been linked to later official crime records up to the end of 2017. To identify offending trajectories, we used information on offence type, age of first conviction/caution, age of last recorded conviction/caution and offending history at three age points (Juvenile: 10-17 years; Young adult: 18-20 years; Adult: 21-32 years). Results Latent Class Analyses with and without ‘Gender’ and ‘Ever served a custodial sentence’ as covariates was conducted to identify trajectories of (re)-offending. We are currently developing statistical models to see if we can use prospective longitudinal education and social care factors to discriminate between these trajectories. In my talk, I will share findings on the offending trajectories identified and present some early results on the key education and social care drivers of the offending trajectories. Conclusion Findings from this study has the potential to provide deeper insights into how these education and social care factors might affect (re)-offending patterns. This could inform education, social care and criminal justice system responses to offending behaviours which seek to reduce offending and its associated social and economic costs

    Larval Diet Abundance Influences Size and Composition of the Midgut Microbiota of Aedes aegypti Mosquitoes

    Get PDF
    The midgut microbiota of the yellow fever mosquito Aedes aegypti impacts pathogen susceptibility and transmission by this important vector species. However, factors influencing the composition and size of the microbiome in mosquitoes are poorly understood. We investigated the impact of larval diet abundance during development on the composition and size of the larval and adult microbiota by rearing Aedes aegypti under four larval food regimens, ranging from nutrient deprivation to nutrient excess. We assessed the persistent impacts of larval diet availability on the microbiota of the larval breeding water, larval mosquitoes, and adult mosquitoes under sugar and blood fed conditions using qPCR and high-throughput 16S amplicon sequencing to determine bacterial load and microbiota composition. Bacterial loads in breeding water increased with increasing larval diet. Larvae reared with the lowest diet abundance had significantly fewer bacteria than larvae from two higher diet treatments, but not from the highest diet abundance. Adults from the lowest diet abundance treatment had significantly fewer bacteria in their midguts compared to all higher diet abundance treatments. Larval diet amount also had a significant impact on microbiota composition, primarily within larval breeding water and larvae. Increasing diet correlated with increased relative levels of Enterobacteriaceae and Flavobacteriaceae and decreased relative levels of Sphingomonadaceae. Multiple individual OTUs were significantly impacted by diet including one mapping to the genus Cedecea, which increased with higher diet amounts. This was consistent across all sample types, including sugar fed and blood fed adults. Taken together, these data suggest that availability of diet during development can cause lasting shifts in the size and composition of the microbiota in the disease vector Aedes aegypti

    Co-designing long-term agreements for Landscape Recovery: Head of Terms Template Agreement. Environmental Land Management Test and Trial for DEFRA

    Get PDF
    This document provides Heads of Terms (HoT) guidance for drafting the terms for a long-term agreement (LTA) to enter into a Landscape Recovery (LR) project with Defra and other private sources of funding, should a blended finance approach be adopted. The template HoT has been informed by a combination of desk research, workshops and interviews with land managers and other stakeholders, and the expert knowledge of Strutt & Parker. After an initial review of literature on existing forms of LTA (see Barkley, Short & Chivers 2022), we carried out eight workshops and a series of group and individual interviews with a total of 35 participants (see Barkley, Chivers & Short 2022a, 2022b and 2023). During these, we sought to better understand the key barriers and enablers to participation in LTAs for LR. We also co-designed, with participants, a hypothetical Natural Flood Management (NFM) scenario, around which the template LTA is framed. Initial drafts of clauses for the HoT agreement were shared with participants at workshops and interviews, and final revisions have been made to the document as a result of participant feedback from these sessions. We focused on developing, with participants, an agreement that could meet the needs of agriculturally productive land managers in a lowland, multi-party context. In this document, we detail the clauses that would likely need to be included when drawing up an LTA in this context. By presenting these clauses as they are shown here, we illustrate the many variations that may arise when working with different land managers and stakeholders, each of whom are likely to have differing requirements of an agreement

    Guidelines for Secure Operation of Attribute Authorities and issuers of statements for entities (G071)

    Get PDF
    These guidelines describe the minimum requirements and recommendations for the secure operation of attribute authorities and similar services that make statements about an entity based on well-defined attributes. Adherence to these guidelines may help to establish trust between communities, operators of attribute authorities and issuers, and Relying Parties, infrastructures, and service providers. This document does not define an accreditation process

    WLCG Authorisation from X.509 to Tokens

    Full text link
    The WLCG Authorisation Working Group was formed in July 2017 with the objective to understand and meet the needs of a future-looking Authentication and Authorisation Infrastructure (AAI) for WLCG experiments. Much has changed since the early 2000s when X.509 certificates presented the most suitable choice for authorisation within the grid; progress in token based authorisation and identity federation has provided an interesting alternative with notable advantages in usability and compatibility with external (commercial) partners. The need for interoperability in this new model is paramount as infrastructures and research communities become increasingly interdependent. Over the past two years, the working group has made significant steps towards identifying a system to meet the technical needs highlighted by the community during staged requirements gathering activities. Enhancement work has been possible thanks to externally funded projects, allowing existing AAI solutions to be adapted to our needs. A cornerstone of the infrastructure is the reliance on a common token schema in line with evolving standards and best practices, allowing for maximum compatibility and easy cooperation with peer infrastructures and services. We present the work of the group and an analysis of the anticipated changes in authorisation model by moving from X.509 to token based authorisation. A concrete example of token integration in Rucio is presented.Comment: 8 pages, 3 figures, to appear in the proceedings of CHEP 201
    corecore