2,263,376 research outputs found

    Interoperable geographically distributed astronomical infrastructures: technical solutions

    Get PDF
    The increase of astronomical data produced by a new generation of observational tools poses the need to distribute data and to bring computation close to the data. Trying to answer this need, we set up a federated data and computing infrastructure involving an international cloud facility, EGI federated, and a set of services implementing IVOA standards and recommendations for authentication, data sharing and resource access. In this paper we describe technical problems faced, specifically we show the designing, technological and architectural solutions adopted. We depict our technological overall solution to bring data close to computation resources. Besides the adopted solutions, we propose some points for an open discussion on authentication and authorization mechanisms.Comment: 4 pages, 1 figure, submitted to Astronomical Society of the Pacific (ASP

    Internal report cluster 1: Urban freight innovations and solutions for sustainable deliveries (2/4)

    Get PDF
    Technical report about sustainable urban freight solutions, part 2 of

    Internal report cluster 1: Urban freight innovations and solutions for sustainable deliveries (3/4)

    Get PDF
    Technical report about sustainable urban freight solutions, part 3 of

    DEVELOPMENT OF TECHNICAL SOLUTIONS AIMED AT IMPROVING TECHNOLOGICAL CAPABILITIES, DESIGN CHARACTERISTICS AND INCREASING THE SERVICE LIFE OF BRIQUETTE PRESSES

    Get PDF
    Development of technical solutions for manufacturing and further use advanced roller press having advanced technological capabilities and increased resource exploitation

    The Einstein-Vlasov system

    Get PDF
    Rigorous results on solutions of the Einstein-Vlasov system are surveyed. After an introduction to this system of equations and the reasons for studying it, a general discussion of various classes of solutions is given. The emphasis is on presenting important conceptual ideas, while avoiding entering into technical details. Topics covered include spatially homogenous models, static solutions, spherically symmetric collapse and isotropic singularities.Comment: Lecture notes from Cargese worksho

    ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology

    Get PDF
    Reliable authentication requires the devices and channels involved in the process to be trustworthy; otherwise authentication secrets can easily be compromised. Given the unceasing efforts of attackers worldwide such trustworthiness is increasingly not a given. A variety of technical solutions, such as utilising multiple devices/channels and verification protocols, has the potential to mitigate the threat of untrusted communications to a certain extent. Yet such technical solutions make two assumptions: (1) users have access to multiple devices and (2) attackers will not resort to hacking the human, using social engineering techniques. In this paper, we propose and explore the potential of using human-based computation instead of solely technical solutions to mitigate the threat of untrusted devices and channels. ZeTA (Zero Trust Authentication on untrusted channels) has the potential to allow people to authenticate despite compromised channels or communications and easily observed usage. Our contributions are threefold: (1) We propose the ZeTA protocol with a formal definition and security analysis that utilises semantics and human-based computation to ameliorate the problem of untrusted devices and channels. (2) We outline a security analysis to assess the envisaged performance of the proposed authentication protocol. (3) We report on a usability study that explores the viability of relying on human computation in this context
    corecore