scholarly journals ePassport and eID Technologies

Author(s):  
Lucjan Hanzlik ◽  
Mirosław Kutyłowski

AbstractThis chapter is devoted to the design and implementation of electronic ID (eID) such as ePassports and electronic personal identity documents. We present an overview of existing and emerging concepts, both concerning threats and possible countermeasures. Thereby we aim to shed light on the development of ubiquitous systems, where many artifacts will require strong electronic identification with similar properties to those in the case of eIDs issued for humans.

Conatus ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 71
Author(s):  
David Menčik

This paper intends to discuss some aspects of what we conceive as personal identity: what it consists in, as well as its alleged fragility. First I will try to justify the methodology used in this paper, that is, the use of allegories in ontological debates, especialy in the form of thought experiments and science fiction movies. Then I will introduce an original thought experiment I call “Who am I actually?,” one that was coined with the intent to shed light on several aspects of the issue under examination, that is, the fragility of personal identity. Then I will move on to Christopher Nolan’s film The Prestige, as well as to Derek Parfit’s ‘divided minds’ thought experiment, to further discuss the fragility of personal identity; next to identity theft, the prospect of duplication is also intriguing, especially with regard to the psychological impact this might have on both the prototype and the duplicate. I will conclude with the view that spatial and temporal proximity or coexistence, especially when paired with awareness on behalf of the duplicates, would expectedly result in the infringement of the psychological continuity of one’s identity.


2012 ◽  
Vol 263-266 ◽  
pp. 402-407 ◽  
Author(s):  
Bin Lu ◽  
Yan Gan Zhang ◽  
Jin Nan Zhang

Embedded devices are confined to be agents although they have been deployed in network management system for decades. We shed light on this situation by designing and implementing a new full-featured embedded network management system. On one hand, this system can still be an agent; on the other hand, this system provides a friendly GUI and I/O devices such as mouse and keyboard, which allows administrators to conveniently monitor and configure the managed equipment. The new system is developed on ARM with Linux using multithreading method, and it is deployed on ROADM equipment in optical network. SNMP is applied to be the network management protocol.


1988 ◽  
Vol 24 (2) ◽  
pp. 239-256 ◽  
Author(s):  
Matthew Kapstein

In the present essay our concern will be with some of the earliest documents that shed light on the development of Indian reflections on the puzzles of personal identity. These texts are derived from the Upanisads, which exemplify a type of literature that some philosophers may regard as classic, but not as philosophy. What I will be proposing here is that we attempt to regard such very ancient sources of Indian thought more philosophically, more in the manner that some recent writers have begun to re–examine the Presocratics. I attempt to show that although philosophical method was not yet developed in the early literature under consideration (as equally it was not in Anaxagoras or Heraclitus), several important arguments are nonetheless already emerging there in limine. In surveying these proto–arguments, we will also have occasion to remark on their historical and/or conceptual affinities with the developed philosophies of later ages.


2021 ◽  
Author(s):  
Jim Albert Charlton Everett ◽  
Joshua August Skorburg ◽  
Jordan Livingston

In this chapter we critically review interdisciplinary work from philosophy, psychology, and neuroscience to shed light on perceptions of personal identity and selfhood. We review recent research that has addressed traditional philosophical questions about personal identity using empirical methods, focusing on the “moral self effect”: the finding that morality, more so than memory, is perceived to be at the core of personal identity. We raise and respond to a number of key questions and criticisms about this work. We begin by considering the operationalization of identity concepts in the empirical literature, before turning to explore the boundary conditions of “moral self effect” and how generalizable it is, and then reflecting on how this work might be connected more deeply with other neuroscience research shedding light on the self. Throughout, we highlight connections between classical themes in philosophy, psychology, and neuroscience, while also suggesting new directions for interdisciplinary collaboration.


Author(s):  
Robert Klitgaard

Corruption and culture interact in ways that shed light on broader issues of culture and development. New statistical analyses show how various measures of corruption are strongly associated with cultural indicators. These associations lead to fallacious inferences, such as that cultural patterns of corruption imply cultural causation or indicate the need for a wholesale change of culture. It is more helpful to think of clashes of cultural norms within countries. The practical challenge is to reform systems so that the norms opposing harmful corruption have more scope, the norms favoring it less. Also, some “cultures of corruption” can be understood with the help of game theory—and this approach leads to helpful anti-corruption measures. We don’t have to try to “change our culture” to reduce corruption, but we do have to take our culture into account in design and implementation of anti-corruption initiatives. Examples are drawn from Brazil, Niger, and South Sudan.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 520
Author(s):  
Nikolaos Koutroumpouchos ◽  
Christoforos Ntantogian ◽  
Christos Xenakis

TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices. Although TEEs have been promoted as the starting point for establishing a device root of trust, a number of published attacks against the most broadly utilized TEE implementations request a second view on their security. The aim of this research is to provide an analytical and educational exploration of TrustZone-based TEE vulnerabilities with the goal of pinpointing design and implementation flaws. To this end, we provide a taxonomy of TrustZone attacks, analyze them, and more importantly derive a set of critical observations regarding their nature. We perform a critical appraisal of the vulnerabilities to shed light on their underlying causes and we deduce that their manifestation is the joint effect of several parameters that lead to this situation. The most important ones are the closed implementations, the lack of security mechanisms, the shared resource architecture, and the absence of tools to audit trusted applications. Finally, given the severity of the identified issues, we propose possible improvements that could be adopted by TEE implementers to remedy and improve the security posture of TrustZone and future research directions.


2019 ◽  
Vol 47 (6) ◽  
pp. 1733-1747 ◽  
Author(s):  
Christina Klausen ◽  
Fabian Kaiser ◽  
Birthe Stüven ◽  
Jan N. Hansen ◽  
Dagmar Wachten

The second messenger 3′,5′-cyclic nucleoside adenosine monophosphate (cAMP) plays a key role in signal transduction across prokaryotes and eukaryotes. Cyclic AMP signaling is compartmentalized into microdomains to fulfil specific functions. To define the function of cAMP within these microdomains, signaling needs to be analyzed with spatio-temporal precision. To this end, optogenetic approaches and genetically encoded fluorescent biosensors are particularly well suited. Synthesis and hydrolysis of cAMP can be directly manipulated by photoactivated adenylyl cyclases (PACs) and light-regulated phosphodiesterases (PDEs), respectively. In addition, many biosensors have been designed to spatially and temporarily resolve cAMP dynamics in the cell. This review provides an overview about optogenetic tools and biosensors to shed light on the subcellular organization of cAMP signaling.


2020 ◽  
Vol 29 (3S) ◽  
pp. 631-637
Author(s):  
Katja Lund ◽  
Rodrigo Ordoñez ◽  
Jens Bo Nielsen ◽  
Dorte Hammershøi

Purpose The aim of this study was to develop a tool to gain insight into the daily experiences of new hearing aid users and to shed light on aspects of aided performance that may not be unveiled through standard questionnaires. Method The tool is developed based on clinical observations, patient experiences, expert involvement, and existing validated hearing rehabilitation questionnaires. Results An online tool for collecting data related to hearing aid use was developed. The tool is based on 453 prefabricated sentences representing experiences within 13 categories related to hearing aid use. Conclusions The tool has the potential to reflect a wide range of individual experiences with hearing aid use, including auditory and nonauditory aspects. These experiences may hold important knowledge for both the patient and the professional in the hearing rehabilitation process.


2015 ◽  
Vol 24 (3) ◽  
pp. 106-113 ◽  
Author(s):  
Stephen N. Calculator

Purpose To provide an overview of communication characteristics exhibited by individuals with Angelman Syndrome (AS) and special considerations associated with the design and implementation of augmentative and alternative communication (AAC) programs. Method Results of recent studies exploring individuals' uses of AAC are reviewed, with particular emphasis on factors related to individuals' acceptance and successful uses of AAC systems. Results Not applicable Conclusion Despite their inconsistent access to practices previously found to foster individuals' acceptance of AAC systems, individuals with AS demonstrate the ability to use AAC systems, including high-tech AAC devices, successfully.


2006 ◽  
Vol 37 (11) ◽  
pp. 42
Author(s):  
KERRI WACHTER

Sign in / Sign up

Export Citation Format

Share Document