multiple identity
Recently Published Documents


TOTAL DOCUMENTS

154
(FIVE YEARS 53)

H-INDEX

12
(FIVE YEARS 3)

2022 ◽  
Author(s):  
giovanni bartolomeo

<p>We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a common web token exchange flow plus a HTTP basic authentication. As such, it may easily map to Cloud computing SaaS paradigms, enabling services integration into a single authorization-centric ecosystem even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.</p>


2022 ◽  
Vol 15 (1) ◽  
pp. 1-21
Author(s):  
Varun Prajapati ◽  
Brij B. Gupta

User Authentication plays a crucial role in smart card based systems. Multi-application smart cards are easy to use as a single smart card supports more than one application. These cards are broadly divided into single identity cards and Multi-identity cards. In this paper we have tried to provide a secure Multi-identity Multi-application Smart Card Authentication Scheme. Security is provided to user’s data by using dynamic tokens as verifiers and nested cryptography. A new token is generated after every successful authentication for next iteration. Anonymity is also provided to data servers which provides security against availability attacks. An alternate approach to store data on servers is explored which further enhances the security of the underlying system.


2021 ◽  
pp. 8-21
Author(s):  
Joel A Lane ◽  
Deanna N. Cor

Many developmental tasks of emerging adulthood involve identify formation. Trying to develop a sense of self can be challenging, given the many aspects of identity. For certain students, having membership in multiple identity groups means competing values, traditions, and practices. This chapter first provides an overview of social identity theory, including attention to the development of identity through an interpersonal lens and through an intergroup lens. Then, it identifies how emerging adults learn about themselves and develop confidence and the ways and means through which they find their motivation. Guiding questions help readers apply this information to their work with emerging adults in higher education.


Author(s):  
O.Yu. Kurnykin

The article considers political processes in the Kyrgyz Republic through the prism of complexly structured identity and historical memory of the Kyrgyz people. Manifestations of retraditionalization of the Kyrgyz social organization are considered as an inevitable consequence of disengagement from the Union center’s control. The author emphasizes multilayered and segmented character of the Kyrgyz political culture that integrates traditionalism and modernization. The formation of multiple identity is characterized as a consequence of objective processes of reformatting the social environment as a result of technological innovations, intensification of intercultural and intercivilizational contacts, increasing mobility of the population. The article shows the fundamental role of the folk epic Manas in formation of national identity with the dominant tendency to strengthen the position of Islam in the multi-layered and syncretic religious practice of the Kyrgyz. The influence of tribal and clan self-identification on the political processes in the country is considered. There are factors that led to differences in the self-identification of urban and rural strata, as well as the Kyrgyz "North" and "South" of the country. The processes of ethno-cultural sovereignization of the titular ethnos, as well as other national groups of Kyrgyzstan are considered. The evolution of the state policy regarding the formation of a common civil identity in Kyrgyzstan, which provided for the implementation of the local version of multiculturalism, involving the protection of the ethno-cultural identity of national minorities, is shown.


2021 ◽  
Author(s):  
giovanni bartolomeo

<p>We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a common web token exchange flow plus a HTTP basic authentication. As such, it may easily map to Cloud computing SaaS paradigms, enabling services integration into a single authorization-centric ecosystem even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.</p>


2021 ◽  
Vol 51 (3) ◽  
pp. 397-429
Author(s):  
Marla Carlson

In 1425, Parisians under Anglo-Burgundian rule during the Hundred Years War enjoyed the spectacle of blind men in armor attempting to club a pig to death, in the process clubbing one another. Marginal images in Oxford, Bodleian Library, MS Bodley 264, a Flemish Romance of Alexander copied and illuminated roughly eighty years earlier, closely resemble this so-called game, and a dozen cities recorded iterations beginning in the thirteenth century and continuing into the fifteenth. The repetition suggests the workings of a scenario, which performance studies theorist Diana Taylor defines as a condensation of embodied practice and knowledge reactivated in multiple times and places to transmit culture from person to living person. Reading through the Bodley 264 Romance of Alexander in order to clarify the scenario's specific function in its Parisian context, this article argues that the strategic battering of marginal beings served to transmit a hierarchically ordered culture while forcefully expelling the Armagnac faction from the hierarchy's highest rank. Within this stark example of public violence that performatively materialized political division, the bodies of pigs and blind men resonated with multiple identity categories, and the dominant group whose power and cohesion the entertainment reinforced both ignored and enjoyed their trauma.


2021 ◽  
Author(s):  
giovanni bartolomeo

We introduce a distributed, fine-granuled, policy-based resource access control protocol leveraging on Attribute-Based Encryption. The protocol secures the whole access control procedure from the authorization issuer to the resource server providing grant confidentiality, proof of possession, antiforgery and may be implemented through a developer familiar web token exchange flow plus a HTTP basic authentication flow. As such, it may map to Cloud computing SaaS paradigm, enabling microservices integration into a single, authorization-centric digital ecosystem, even across multiple identity domains. We also present the results of a performance evaluation on a first prototype implementation.


Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1421
Author(s):  
Susmit Bagchi

The interactions between topological covering spaces, homotopy and group structures in a fibered space exhibit an array of interesting properties. This paper proposes the formulation of finite covering space components of compact Lindelof variety in topological (C, R) spaces. The covering spaces form a Noetherian structure under topological injective embeddings. The locally path-connected components of covering spaces establish a set of finite topological groups, maintaining group homomorphism. The homeomorphic topological embedding of covering spaces and base space into a fibered non-compact topological (C, R) space generates two classes of fibers based on the location of identity elements of homomorphic groups. A compact general fiber gives rise to the discrete variety of fundamental groups in the embedded covering subspace. The path-homotopy equivalence is admitted by multiple identity fibers if, and only if, the group homomorphism is preserved in homeomorphic topological embeddings. A single identity fiber maintains the path-homotopy equivalence in the discrete fundamental group. If the fiber is an identity-rigid variety, then the fiber-restricted finite and symmetric translations within the embedded covering space successfully admits path-homotopy equivalence involving kernel. The topological projections on a component and formation of 2-simplex in fibered compact covering space embeddings generate a prime order cyclic group. Interestingly, the finite translations of the 2-simplexes in a dense covering subspace assist in determining the simple connectedness of the covering space components, and preserves cyclic group structure.


Sign in / Sign up

Export Citation Format

Share Document