identity management
Recently Published Documents


TOTAL DOCUMENTS

1668
(FIVE YEARS 404)

H-INDEX

38
(FIVE YEARS 6)

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 591
Author(s):  
Yue Sun ◽  
Lu Leng ◽  
Zhe Jin ◽  
Byung-Gyu Kim

Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods.


2022 ◽  
Author(s):  
Maninderpal Singh ◽  
Gagangeet Singh Aujla ◽  
Rasmeet Singh Bali

AbstractInternet of Drones (IoD) facilitates the autonomous operations of drones into every application (warfare, surveillance, photography, etc) across the world. The transmission of data (to and fro) related to these applications occur between the drones and the other infrastructure over wireless channels that must abide to the stringent latency restrictions. However, relaying this data to the core cloud infrastructure may lead to a higher round trip delay. Thus, we utilize the cloud close to the ground, i.e., edge computing to realize an edge-envisioned IoD ecosystem. However, as this data is relayed over an open communication channel, it is often prone to different types of attacks due to it wider attack surface. Thus, we need to find a robust solution that can maintain the confidentiality, integrity, and authenticity of the data while providing desired services. Blockchain technology is capable to handle these challenges owing to the distributed ledger that store the data immutably. However, the conventional block architecture pose several challenges because of limited computational capabilities of drones. As the size of blockchain increases, the data flow also increases and so does the associated challenges. Hence, to overcome these challenges, in this work, we have proposed a derived blockchain architecture that decouples the data part (or block ledger) from the block header and shifts it to off-chain storage. In our approach, the registration of a new drone is performed to enable legitimate access control thus ensuring identity management and traceability. Further, the interactions happen in the form of transactions of the blockchain. We propose a lightweight consensus mechanism based on the stochastic selection followed by a transaction signing process to ensure that each drone is in control of its block. The proposed scheme also handles the expanding storage requirements with the help of data compression using a shrinking block mechanism. Lastly, the problem of additional delay anticipated due to drone mobility is handled using a multi-level caching mechanism. The proposed work has been validated in a simulated Gazebo environment and the results are promising in terms of different metrics. We have also provided numerical validations in context of complexity, communication overheads and computation costs.


2022 ◽  
pp. 0261927X2110678
Author(s):  
Vasiliki Kokkini ◽  
Eleftheria Tseliou ◽  
Georgios Abakoumkin ◽  
Nikos Bozatzis

Online excessive gaming has been associated with negative player identity constructions depicting an abnormal life-style. Up-to-date, there is limited insight into player identity management talk about excessive online gaming. To address this gap, drawing from discursive and rhetorical psychology, we investigated naturally occurring talk of 134 players of World of Warcraft (WoW) -a Massively Multiplayer Online Role-Playing Game (MMORPG)- from three publicly available websites and of five players from one focus group. The analysis illuminated participants’ dilemmatic and contradictory ways of constructing the player identity, while displaying immersion in the game. Participants invoke identity constructions like ‘nolifer’, ‘hardcore’ or ‘clean’ player, which they disavow or assign to themselves and to each other depending on the conversational context, while attending to concerns about (ab)normalcy. The study’s findings highlight a dynamic process of player identity construction in talk, occasioned by and exemplifying the contingencies of the discursive context.


2022 ◽  
Vol 71 (2) ◽  
pp. 3193-3209
Author(s):  
Wael Said ◽  
Elsayed Mostafa ◽  
M. M. Hassan ◽  
Ayman Mohamed Mostafa

2021 ◽  
Author(s):  
Xuetao Li ◽  
Jingjian Zhang ◽  
Xiaotong Niu ◽  
Jianfeng Guan

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Lubna Farhi ◽  
Hira Abbasi ◽  
Rija Rehman

Identity management system in most academic and office environments is presently achieved primarily by a manual method where the user has to input their attendance into the system. The manual method sometimes results in human error and makes the process less efficient and time-consuming. The proposed system highlights the implementation and design of a smart face identification-based management system while taking into account both the background luminosity and distance. This system detects and recognizes the person and marks their attendance with the timestamp. In this methodology, the face is initially resized to 3 different sizes of 256, 384, and 512 pixels for multiscale testing. The overall outcome size descriptor is the overall mean for these characteristic vectors, and the deep convolution neural network calculates 22 facial features in 128 distinct embeddings in 22-deep network layers. The pose of the 2D face from −15 to +15° provides identification with 98% accuracy in low computation time. Another feature of the proposed system is that it is able to accurately perform identification with an accuracy of 99.92% from a distance of 5 m under optimal light conditions. The accuracy is also dependent on the light intensity where it varies from 96% to 99% under 100 to 1000 lumen/m2, respectively. The presented model not only improves accuracy and identity under realistic conditions but also reduces computation time.


Ethnicities ◽  
2021 ◽  
pp. 146879682110605
Author(s):  
Nella Geurts ◽  
Marijn van Klingeren

This study investigates, using an experimental study, the consequences of negative and positive media messages on young Muslims by gaining insight into who, and under which circumstances, engages in certain collective or individual identity-management strategies. Based on Social Identity Theory (SIT) and previous literature, we expect that negative and more positive media messages moderate the relationship between the degree of identification with the religious group and the application of identity-management strategies. Factor analyses illustrate the presence of at least three types of strategies: collective-fight strategies (meaning one is willing to fight for the group), collective flight-strategies (that entail no change of the status quo) and individual strategies (strategies that solely benefit the individual). Contributions are made empirically and theoretically. Empirically, we measure and group all proposed identity-management strategies based on our findings among the same research population. Theoretically, we hypothesise about how both negative and positive media messages condition the role of religious saliency for Muslims’ identity-management strategies. Results from a survey-embedded experiment among Dutch Moroccan and Turkish Muslims show that high identifiers are more likely to apply fight strategies, and less likely to apply individual strategies (in line with SIT). Regardless of tone, exposure to messages mentioning Muslims make the application of fight strategies more likely among high identifiers. Meanwhile lower identifiers feel a reduced need for change when exposed to more positive messages. These insights in the (mutual) role of religious identification and media messages shed new light on how media messages can bring about group distances, intergroup conflicts and intragroup cohesion and provide a stepping-stone for future research to further insight in the systemic and long-term implications thereof.


2021 ◽  
Vol 1 (23) ◽  
pp. 59-87
Author(s):  
Jerzy Rossa ◽  
Lidia Nogal-Faber

The article pertain to a case study research of social assistance processes in a social policy system of G. city. A main method of investigation was opened, unstandardized systematic interviews with social workers, political figures and administrators of the system. Social services in experiences of our respondents we have interpreted as games for uncertainty control. The games in perspectives of social workers and administrators of the system we understand as pedagogical environments for customers which in the processes of these interactional games shape many of the social, adaptive skills. Such skills enable customers institutional identity management and effective winning spheres of freedom from control. Behavioural strategies of social workers in institutional and organizational environment in relation to customers we conceptualize as exchange models of a “gift for power” above customers spheres of uncertainty control. Inefficiency of social assistance comes from incapacity of such aid to effectively exchange gifts for uncertainty control in daily situations for customers. The Institution of social services has many functional substitutes in social, political and economic environments which are much more effective. Second goal of our investigation was a presentation and portrayal of the real pedagogical environment of social workers. Theory of social intervention and social pedagogy suffers from too many abstracts from reality foundations, premises und presumptions. So social pedagogy as practical science needs also careful and diligent investigation of real social practices in institutional and organizational environment of social policy systems.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Adriana Cristina Ferreira Caldana ◽  
Marina Lourenção ◽  
Caroline Krüger ◽  
Adriana Fiorani Pennabel ◽  
Neusa Maria Bastos Fernandes dos Santos

PurposeThis study aims to develop a sustainable brand identity model to help organizations align their managerial practices to sustainable development goals (SDGs) and examine its applicability for a Brazilian electrical sector company.Design/methodology/approachA systematic qualitative review of the literature was carried out to provide a theoretical basis for the attributes chosen to compose the sustainable brand identity management (SBIM) model. To apply the model, the authors collected the data from internal and public domain documents, semi-structured in-depth interviews and non-participant observation of the company's work environment.FindingsThe first SBIM model was developed. The Brazilian power sector company implemented sustainable actions related to most of the models' attributes, contributing to the SDGs. A research agenda was presented.Research limitations/implicationsThe theoretical contribution is provided toward brand identity and sustainability literature with the sustainable brand identity model development and the conceptual explanation regarding its attributes.Practical implicationsThe practical implications are provided from the model application to an electrical company leading to some managerial suggestions that might be used to companies willing to align their practices to sustainability.Originality/valueThe studies on SDG and brand identity models were analyzed in order to create the first SBIM model. This article extends the concept of the brand identity of marketing theory by linking its core to sustainability actions, so far not addressed in academic studies.


Sign in / Sign up

Export Citation Format

Share Document