STEM: Secure Token Exchange Mechanisms

Author(s):  
Maneesh Darisi ◽  
Janhavi Savla ◽  
Mahesh Shirole ◽  
Sunil Bhirud
Keyword(s):  
2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Anastasia Krasheninnikova ◽  
Désirée Brucks ◽  
Nina Buffenoir ◽  
Dániel Rivas Blanco ◽  
Delphine Soulet ◽  
...  

Abstract Inequity aversion, the negative reaction to unequal treatment, is considered a mechanism for stabilizing cooperative interactions between non-kin group members. However, this might only be adaptive for species that switch cooperative partners. Utilizing a comparative approach, inequity aversion has been assessed in many mammalian species and recently also in corvids and one parrot species, kea, revealing mixed results. To broaden our knowledge about the phylogenetic distribution of inequity aversion, we tested four parrot species in the token exchange paradigm. We varied the quality of rewards delivered to dyads of birds, as well as the effort required to obtain a reward. Blue-headed macaws and African grey parrots showed no reaction to being rewarded unequally. The bigger macaws were less willing to exchange tokens in the “unequal” condition compared to the “equal high” condition in which both birds obtained high quality rewards, but a closer examination of the results and the findings from the control conditions reveal that inequity aversion does not account for it. None of the species responded to inequity in terms of effort. Parrots may not exhibit inequity aversion due to interdependence on their life-long partner and the high costs associated with finding a new partner.


2020 ◽  
Author(s):  
M. Jones ◽  
A. Nadalin ◽  
J. Bradley ◽  
C. Mortimore
Keyword(s):  

2014 ◽  
Vol 17 (6) ◽  
pp. 1329-1340 ◽  
Author(s):  
Marie Bourjade ◽  
Josep Call ◽  
Marie Pelé ◽  
Myriam Maumy ◽  
Valérie Dufour
Keyword(s):  

2021 ◽  
Author(s):  
giovanni bartolomeo

<p>We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a common web token exchange flow plus a HTTP basic authentication. As such, it may easily map to Cloud computing SaaS paradigms, enabling services integration into a single authorization-centric ecosystem even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.</p>


2019 ◽  
Vol 6 (1) ◽  
pp. 48-70 ◽  
Author(s):  
Katie Hall ◽  
Mackenzie Smith ◽  
Jamie L. Russell ◽  
Susan P. Lambeth ◽  
Steven J. Schapiro ◽  
...  

1981 ◽  
Vol 52 (1) ◽  
pp. 223-233 ◽  
Author(s):  
Michael S. Kincaid ◽  
Paul Weisberg ◽  
Edward V. Sims

In two separate studies, specialized tokens were employed as instructional materials to teach 12 colors to preschool children and 14 letter-sounds to kindergarten children. These children were given initially 24 to 30 tokens and given an opportunity to “purchase” various items by recognizing the designated information on each token. Independent probe sessions showed attainment of high levels of recognition for both colors and sounds. Labeling of the instructional stimuli, although not explicitly trained, developed spontaneously, probably as a result of the children's hearing the labels during recognition training and using them in extra-classroom settings.


2008 ◽  
Vol 5 (2) ◽  
pp. 172-175 ◽  
Author(s):  
V Dufour ◽  
M Pelé ◽  
M Neumann ◽  
B Thierry ◽  
J Call

Transfers and services are frequent in the animal kingdom. However, there is no clear evidence in animals that such transactions are based on weighing costs and benefits when giving or returning favours and keeping track of them over time (i.e. calculated reciprocity). We tested two orang-utans ( Pongo pygmaeus abelii ) in a token-exchange paradigm, in which each individual could exchange a token for food with the experimenter but only after first obtaining the token from the other orang-utan. Each orang-utan possessed tokens valuable to their partner but useless to themselves. Both orang-utans actively transferred numerous tokens (mostly partner-valuable) to their partner. One of the orang-utans routinely used gestures to request tokens while the other complied with such requests. Although initially the transfers were biased in one direction, they became more balanced towards the end of the study. Indeed, data on the last three series produced evidence of reciprocity both between and within trials. We observed an increase in the number and complexity of exchanges and alternations. This study is the first experimental demonstration of the occurrence of direct transfers of goods based on calculated reciprocity in non-human-primates.


2021 ◽  
Author(s):  
giovanni bartolomeo

We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a developer familiar web token exchange flow plus a HTTP basic authentication flow. As such, it may map to Cloud computing SaaS paradigm, enabling microservices integration into a single, authorization-centric digital ecosystem, even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.


Sign in / Sign up

Export Citation Format

Share Document