scholarly journals A Digital Signature Model Using XAdES Standard as a Rest Service

Information ◽  
2021 ◽  
Vol 12 (8) ◽  
pp. 289
Author(s):  
Renato Carauta Ribeiro ◽  
Murilo Góes de Almeida ◽  
Edna Dias Canedo

The digital signature of documents and degrees is a topic widely discussed in the Federal Public Administration. Several laws and ordinances were created to standardize the issuance, validation and legal validity of digitally signed documents in national territory, such as the ordinances created by the Ministry of Education (MEC) to regulate the issuance of degrees in digital format. These ordinances created guidelines and standards that must be adopted by Federal Universities for the signing of in digital format. The main objective of this work is to study these ordinances, the main technologies and digital signature standards used in the literature to create a digital signature system model for University of Brasília-UnB, which complies with the MEC and ICP-Brazil standards. Moreover, the model must be developed with the main standards and technologies in the market, cohesive to the current UnB architecture, easy to maintain and update to new standards that may emerge, and also be a fully open source project. An architectural model and a prototype in Java language were developed using XAdES4j library as a microservice intermediated by the bus used in UnB. The prototype developed was compared with the current digital signature system named C3Web. The comparative tests and results between the two solutions showed that the current system used in UnB does not perform the signature in accordance with the standard proposed by the MEC, in addition to being a private system using proprietary technologies for the execution of digital signatures. The tests performed with the proposed model demonstrated that it performs the digital signature in accordance with the XAdES-T standard, regulations of the MEC and ICP-Brazil. In addition, the solution presented a performance comparable to the current system used by UnB with a little more effective security than the current system used. The current model developed in this work can be a basis for the creation of future subscription systems for Brazilian Universities.

Author(s):  
Yariv Itzkovich ◽  
Ella Barhon ◽  
Rachel Lev-Wiesel

This article constructs a comprehensive theoretical model that outlines bystanders’ emotional and behavioral responses to the mistreatment of adolescent peers. The model captures bystanders’ risk and health risk behaviors, which have been overlooked in the context of their reactions; when addressed at all in connection with bystanders of bullying among adolescents, they have been treated separately. Here, we present bystanders’ emotional and cognitive reactions and their impact on bystanders’ responses including a set of responses that demonstrate risk and health risk behaviors that are directed to the bystander as a victim by proxy. The theoretical framework is the conservation of resources theory, which posits that personal resources (i.e., potency and moral disengagement) and social resources impact the process that leads to bystanders’ reactions. Previous models have overlooked the integrative viewpoint of bystanders, and comprehensive models that explain bystanders’ behavioral and emotional responses have received little attention especially with regards to adolescents. Two recent models overlooked core features embedded in the current model, including the risk and health risk behaviors that it integrates. The proposed model presents a novel and more comprehensive view of bystanders’ reactions and the process underlying these reactions. It integrates existing knowledge embedded in other existing models. At the same time, this perspective indicates the centricity of potency as a key resource that dictates the emotional response and behaviors of bystanders. This potentially allows for new applications in the mitigation of adverse impacts that follow the witnessing of mistreatment. The article discusses these applications, which are based on previous findings, their implications for practice, and directions for future empirical research necessary to validate the model.


1976 ◽  
Vol 39 (1) ◽  
pp. 311-318
Author(s):  
Jack Hand ◽  
Robert E. McCarter

The current model for the application of parametric statistics involves only the population sampled, and probability statements refer to proportions of samples or proportions of decisions based upon samples. Most statistical textbooks, however, contain concepts that go beyond the explicitly proposed model. The rudiments of an appropriate, expanded model are presented. It is suggested that the expanded model is more adequate, general, and realistic than the classical model.


2021 ◽  
Author(s):  
Yicheng Song ◽  
Zhuoxin Li ◽  
Nachiketa Sahoo

We propose an approach to match returning donors to fundraising campaigns on philanthropic crowdfunding platforms. It is based on a structural econometric model of utility-maximizing donors who can derive both altruistic (from the welfare of others) and egoistic (from personal motivations) utilities from donating—a unique feature of philanthropic giving. We estimate our model using a comprehensive data set from DonorsChoose.org—the largest crowdfunding platform for K–12 education. We find that the proposed model more accurately identifies the projects that donors would like to donate to on their return in a future period, and how much they would donate, than popular personalized recommendation approaches in the literature. From the estimated model, we find that primarily egoistic factors motivate over two-thirds of the donations, but, over the course of the fundraising campaign, both motivations play a symbiotic role: egoistic motivations drive the funding in the early stages of a campaign when the viability of the project is still unclear, whereas altruistic motivations help reach the funding goal in the later stages. Finally, we design a recommendation policy using the proposed model to maximize the total funding each week considering the needs of all projects and the heterogeneous budgets and preferences of donors. We estimate that over the last 14 weeks of the data period, such a policy would have raised 2.5% more donation, provided 9% more funding to the projects by allocating them to more viable projects, funded 17% more projects, and provided 15% more utility to the donors from the donations than the current system. Counterintuitively, we find that the policy that maximizes total funding each week leads to higher utility for the donors over time than a policy that maximizes donors’ total utility each week. The reason is that the funding-maximizing policy focuses donations on more viable projects, leading to more funded projects, and, ultimately, higher realized donors’ utility. This paper was accepted by Kartik Hosanagar, information systems.


The targeted malignant emails (TME) for PC arrange misuse have become progressively deceptive and all the more generally common as of late. Aside from spam or phishing which is intended to fool clients into uncovering individual data, TME can misuse PC systems and accumulate touchy data which can be a major issue for the association. They can comprise of facilitated and industrious battles that can be terrible. Another email-separating procedure which depends on bowl classifier and beneficiary arranged highlights with an arbitrary backwoods classifier which performs superior to two conventional recognition techniques, Spam Assassin and Clam AV, while keeping up sensible bogus positive rates. This proposed model deals with how to recognize a pernicious bundle (email) for ordinary system into current system. We build up an undermined protocol of network detection that powerfully concludes the correct number of congestive loss of packets that is going to happen. On the chance that one damages the steering convention itself, at that point aggressor may make enormous segments of the system become untreatable. We build up an option shifting technique by utilizing TME explicit element extraction. Our conventions naturally anticipate clog in a deliberate manner, as it is vital in making any such flaw in network recognition reasonable.


2021 ◽  
Vol 11 (2) ◽  
pp. 2167-2184
Author(s):  
Ferril Irham Muzaki

This article aims to formulate the concept of learning administration made in digital format and centralized in the database of the Ministry of Education and Culture of the Republic of Indonesia. In this study, learning administration starting from the Sillabus, Learning Process Design and Evaluation was inputted into the Ministry of Education and Culture's database for the next process, partner teachers who collaborated in the learning process could use it. This article produces a concept, namely (1) technically, teachers can enter learning administration data online as long as the existence of a fiber optic network is adequate, (2) digitalized and centralized learning administration can be carried out as long as regulations provide room for development and (3) from the point of view of the availability of ICT (Information and Communication Technology) it can be done with web database supporting software. The results of this research are expected to be input for policy makers in implementing the administration of Indonesian language learning in thematic elementary schools in a digitalized and centralized manner in a server room at the Ministry of Education and Culture.


2018 ◽  
Vol 10 (1) ◽  
Author(s):  
Dedy Syamsuar

ABSTRACTIPv6 was introduced to replace IPv4 as the main IP address. However, despite being more than 15 years since itsstandardization, IPv6 failed to achieve any meaningful diffusion through the Internet. While previous researchhas debated, discussed and explored the IPv6 adoption, this study provides a theoretical perspective to investigatethe failure of IPv6 to diffuse from resistance perspective. Drawing on Tornatzky and Fleischer’s TOE (Technology-Organization-Environment) framework and integrating prior adoption and resistance literatures, we propose amodel of IPv6 resistance. The antecedents of the proposed model basically represent three dimensions of TOEframework including Technological context (lack of need, satisfaction with current system, switching cost andperceived of threat), Organizational context (resource barrier and IT sophistication) and Environmental context(regulatory support). Furthermore, the model can be used to explore and recognize why most of organization asend user still resist over the IPv6.Keywords: IPv6, resistance technology, adoption technologyABSTRAKIPv6 diperkenalkan untuk menggantikan IPv4 sebagai protocol pengalamatan utama di Internet. Tetapi meskipuntelah lebih dari 15 tahun ditetapkan sebagai standard, IPv6 gagal mencapai difusi yang berarti. Sementarapenelitian sebelumnya telah memperdebatkan, membahas dan mengeksplorasi adopsi IPv6, penelitian inimemberikan perspektif teoritis untuk menyelidiki kegagalan IPv6 untuk menyebar dari perspektif resistansi.Menggunakan kerangka kerja Tornatzky & Fleischer's TOE (Technology-Organization-Environment) danintegrasi dengan literatur adopsi dan resistensi sebelumnya, kami mengusulkan sebuah model resistensi IPv6.Antescedent dari model yang diusulkan pada dasarnya mewakili tiga dimensi kerangka TOE termasuk konteksTeknologi (lack of need, satisfaction with current system, switching cost and perceived of threat), konteksorganisasi ((resource barrier and IT sophistication) dan konteks lingkungan (regulatory support). Selanjutnya,model tersebut dapat digunakan untuk mengeksplorasi dan mengenali mengapa sebagian besar organisasi masihmenolak IPv6.Keywords: IPv6, penolakan teknologi, adopsi teknologi


A digital signature is a checksum which depends on the time period during which it was produced. Human palm biometric is one of the fastest, accurate, reliable and secure biometric techniques for identification and verification because it provides automatic authentication of an individual based on unique features in palm structure. In this paper, an efficient digital signature model for the document is proposed by using human palm. Human palm can give unique features which can be used in generating a secure digital signature. Therefore, this model consists of two sides: the embedding side and extracting side. The embedding side includes (1) image preprocessing stage:(color to grayscale and histogram equalization). (2) feature extraction stage:(GLCM (Haralick) algorithm). (3) Generating digital signature stage:(Elliptic Curve and Cubic Spline function with MD5 algorithm). While the extracting side contains extracting signature stage and matching stage. The accuracy of the generated digital signature by the proposed model is 100%, however false acceptance rate (FAR) is 0%, false reject rate (FRR) is 0%, and equal error rate (ERR) is 0%.


2020 ◽  
Vol 01 (01) ◽  
pp. 52-58
Author(s):  
Olha Rudenko ◽  
Tetiana Shestakovska

Strategic course of Ukraine towards European integration requires a new conceptual basis for the institutionalization of power, the introduction of a modern model of public administration. In the conditions of democratic transit, Ukraine and the countries of Central and Eastern Europe should use a conservative Neo-Weberian State (NWS) Model. This model is normative in terms of implementation in Ukraine, because our country, first, has accumulated necessary democratic potential of public initiative; secondly, it has a tradition of strong state power, capable of independently performing the functions of public goal-setting and making appropriate organic decisions; third, it is able to ensure the longevity of public policy at all administrative levels; fourth, preserves stable corporate values and rules of the civil service; fifth, seeks to bring the process of modernization of the domestic public administration system closer to European standards and practices. The normative and legal conditions necessary for the modernization of the current system of public administration in Ukraine in the direction of implementation of the principles of public administration have been generalized. In Ukraine, modernization of the public administration system, aimed at forming a new model of public administration, is possible only if the objective and subjective preconditions are taken into account, which are critical for the successful implementation of decentralization. It has been identified the following promising stages of decentralization in Ukraine: 1) deconcentration of powers and resources, their legally justified transfer from central government to regional and local government bodies; 2) compliance with the principles of devolution of power; 3) powers and resources will be distributed between traditional public authorities (state and self-governing) and market and public structures; 4) introduction of the newest models of public management, built on the principles of the New Public Management paradigm. Keywords: public administration, state government, decentralization, modernization, European integration.


Author(s):  
Eva Svitačová ◽  
Anna Mravcová

The new phenomenon of global development education (GDE) has gradually penetrated the curricula in Slovakia. For the purpose of more comprehensively preparing future economic actors, who will operate in the new global economic and social environment, we have decided to incorporate this topic into the curriculum at the Faculty of Economics and Management, Slovak University of Agriculture (FEM SUA). The national research project KEGA, supported by the Slovak Republic 's Ministry of Education, Science, Research, and Sport, is also focused on this issue. Its objective is to develop a more comprehensive and current system of GDE for economic faculties in Slovakia, and to propose appropriate methods for its implementation into the educational process. This paper presents information about how the various themes and issues associated with the new educational approach are implemented into the curriculum at FEM SUA, as well as information on what new measures are proposed and are currently being gradually realized in order to clarify to the students the global dimension of processes and phenomena. The project is based on qualitative research undertaken via the study and analysis of public documents and of audio and video recordings made of faculty and at national discussion workshops. Through the analysis of individual discussions we identify not only the appropriate content of GDE within economics faculties but also the most appropriate forms for its implementation into the educational process at FEM SUA and at other economics faculties in Slovakia.


Sign in / Sign up

Export Citation Format

Share Document