scholarly journals A System for Distributed Minting and Management of Persistent Identifiers

2015 ◽  
Vol 10 (1) ◽  
pp. 280-286 ◽  
Author(s):  
Łukasz Bolikowski ◽  
Aleksander Nowiński ◽  
Wojtek Sylwestrzak

Minting persistent identifiers and managing their metadata is typically governed by a single organization. Such a single point of failure poses a risk to longevity and long-term preservation of identifiers. In this paper we address the risk by proposing a radically different approach, in which minting and management of persistent identifiers is distributed, and the integrity of the distributed system is guaranteed by public-key cryptography. We describe the general architecture of the system, analyse its robustness and discuss potential deployment scenarios.

10.28945/2156 ◽  
2015 ◽  
Author(s):  
Aderonke Peace Akinduro ◽  
Boniface Kayode Alese ◽  
Olufunso Dayo Alowolodu ◽  
Aderonke Favour-Bethy Thompson ◽  
Akintoba Emmanuel Akinwonmi

The most common way of ensuring confidentiality of data or documents by individuals, governments, and institutions such as banks, hospitals, and other commercial enterprises is by consigning their secrets to a computer system. But this has not solved the problems of upholding security, instead they are more compounded due to the fact that secrets sharing is generally desired but only in a tightly controlled manner. This could be resolved by the introduction of a secured shared processing system. Secured shared processing system is a system that comprises of several computers whereby one stands as a secured, trusted system while the other systems are connected to it. The system do not divide up a memory or a clock; the computers only communicate with each other by exchanging messages over a communication channel; and each computer has its own memory and operates on its own operating system. This is achieved with the aid of Cryptographic mechanisms in which EI Gamal model was adopted as a Public-key cryptography scheme which will be applied on a workstation distributed System.


IFLA Journal ◽  
2017 ◽  
Vol 43 (1) ◽  
pp. 5-21 ◽  
Author(s):  
Pierre-Yves Burgi ◽  
Eliane Blumer ◽  
Basma Makhlouf-Shabou

In this article, the authors report on an ongoing data life cycle management national project realized in Switzerland, with a major focus on long-term preservation. Based on an extensive document analysis as well as semi-structured interviews, the project aims at providing national services to respond to the most relevant researchers’ data life cycle management needs, which include: guidelines for establishing a data management plan, active data management solutions, long-term preservation storage options, training, and a single point of access and contact to get support. In addition to presenting the different working axes of the project, the authors describe a strategic management and lean startup template for developing new business models, which is key for building viable services.


GlaucomaNews ◽  
2020 ◽  
pp. 65-69
Author(s):  
T.E. Lipatkina ◽  
◽  
Е.V. Karlova ◽  
A.V. Zolotarev ◽  
◽  
...  

Patients with primary open-angle glaucoma (POAG) and ophthalmic hypertension have an increased likelihood of developing occlusions (thrombosis) of the central retinal vein. Different groups of antihypertensive drugs differ in their mechanism of action and may affect concomitant ocular pathology, in particular, retinal edema, which occurs, for example, in occlusion of the central retinal vein. Used in most patients with glaucoma, prostaglandin analogs can contribute to the long-term preservation of macular edema due to the effect on the permeability of the vascular wall. Preparations of other pharmacological groups, reducing the production of aqueous humor, on the contrary, may contribute to its regression. Therefore, the question of choosing a drug for antihypertensive therapy in patients with primary open-angle glaucoma and concomitant macular edema is relevant and is for further study.


2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


Sign in / Sign up

Export Citation Format

Share Document