D-FOAF: Distributed Identity Management with Access Rights Delegation

Author(s):  
Sebastian Ryszard Kruk ◽  
Sławomir Grzonkowski ◽  
Adam Gzella ◽  
Tomasz Woroniecki ◽  
Hee-Chul Choi
Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


2016 ◽  
pp. 129-155
Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


2016 ◽  
Vol 45 (2) ◽  
pp. 28-48 ◽  
Author(s):  
Isaac Dery

Women’s access to and control over productive resources, including land, has increasingly been recognized in global discussions as a key factor in reducing poverty, ensuring food security and promoting gender equality. Indeed, this argument has been widely accepted by both feminists and development theorists since the 1980s. Based on qualitative research with 50 purposively selected men and women, this study explored the complexity of women’s access to and control over land within a specific relationship of contestations, negotiations, and manipulations with men. Data were analyzed using thematic analysis. While theoretically, participants showed that women’s [secure] access to and control over land has beneficial consequences to women themselves, households and the community at large, in principle, women's access and control status was premised in the traditional framework which largely deprives women, equal access and/or control over the land. The study indicates that even though land is the most revered resource and indeed, the dominant source of income for the rural poor, especially women, gender-erected discrimination and exclusion lie at the heart of many rural women in gaining access to land. This study argues that women's weak access rights and control over land continue to perpetuate the feminization of gender inequality–while men were reported to possess primary access and control over land as the heads of households, women were argued to have secondary rights due to their ‘stranger statuses’ in their husbands’ families. Overall, the degree of access to land among women was reported to be situated within two broad contexts–marriage and inheritance.


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


Author(s):  
Ian Parkman ◽  
Samuel Holloway

While most academic research has considered authenticity from the consumers perspective, this paper proposes and tests a new empirical operationalization of Beverlands (2005) widely cited proposition that firm-side authenticity is…partly true and partly rhetorical (p.1008). Our study presents a model based on the Competitive Advantage (CA) that results from congruence between the partly true aspects of the firms internal culture, resources, and capabilities measured as Innovation Capacity (IC), alongside Corporate Identity Management (CIM) as the organizations partly rhetorical outwardly-directed corporate branding and marketing promotions activities. Our findings are interpreted through a four-quadrant Rosetta Stone framework for evaluating firm-side authenticity across organizational contexts and environments describing how high-IC/high-CIM (i.e., Authentic) firms create differentiation from low-IC/low-CIM Inauthentic organizations and low-IC/high-CIM Faux Imitators competitors who attempt to compensate for their lack of IC through increased investments in CIM.


Sign in / Sign up

Export Citation Format

Share Document