Search results for "Authentic"
showing 10 items of 203 documents
Autenticità
2019
The article intends to synthetically reconstruct a line of development of the Italian narrative contemporary, from the nineties onwards, based on the concept of authenticity, vast and rich in applications in the most disparate fields (juridical, philosophical, artistic). After a brief review of four emblematic cases for the use of authenticity rhetoric (Siti, Moresco, Mozzi, non-fiction), the article offers a brief overview of the narrative of last twenty years. It therefore ends with a reflection on a possible passage from one demystification of authenticity (with autofiction) to its internal amplification contradictory (with non-fiction). Cet article se propose de retracer une histoire de…
Family Matters : Abusing Family Refresh Tokens to Gain Unauthorised Access to Microsoft Cloud Services Exploratory Study of Azure Active Directory Fa…
2022
Azure Active Directory (Azure AD) is an identity and access management service used by Microsoft 365 and Azure services and thousands of third-party service providers. Azure AD uses OIDC and OAuth protocols for authentication and authorisation, respectively. OAuth authorisation involves four parties: client, resource owner, resource server, and authorisation server. The resource owner can access the resource server using the specific client after the authorisation server has authorised the access. The authorisation is presented using a cryptographically signed Access Token, which includes the identity of the resource owner, client, and resource. During the authorisation, Azure AD assigns Ac…
A multimodal retina-iris biometric system using the Levenshtein distance for spatial feature comparison
2020
Abstract The recent developments of information technologies, and the consequent need for access to distributed services and resources, require robust and reliable authentication systems. Biometric systems can guarantee high levels of security and multimodal techniques, which combine two or more biometric traits, warranting constraints that are more stringent during the access phases. This work proposes a novel multimodal biometric system based on iris and retina combination in the spatial domain. The proposed solution follows the alignment and recognition approach commonly adopted in computational linguistics and bioinformatics; in particular, features are extracted separately for iris and…
Well-being and tourist experiences : a state of the art review of positive psychology studies
2017
Currently, well-being concerns individuals but also businesses and even countries. This article thus provides a synthesis of psychological researches on well-being and of those bringing closer well-being and tourism, this activity maintaining obvious links with well-being. The aim is to better understand their relationships and to offer, in particular to tourist operators, marketing recommendations suggested by the reviewed studies.
I ‘vasi di Centuripe’: per un approccio integrato
2017
Il contributo intende evidenziare le prospettive di un approccio interdisciplinare integrato allo studio della ceramica policroma “di Centuripe”. Dagli inizi del XX secolo, tale classe ha riscosso ampio apprezzamento per le sue delicate pitture e la ricchezza di ornamenti a rilievo applicati (dipinti e dorati) che abbelliscono i vasi, rendendoli pressoché inutilizzabili nella pratica per scopi funzionali, ma altamente efficaci come doni funerari in antico, e oggi come pezzi di grande impatto per commercianti di antichità e collezionisti moderni. Data la piaga, diffusa fino a tempi recenti, degli scavi clandestini, dei “restauri” arbitrari e delle falsificazioni, i vasi di Centuripe necessit…
Mutual entity authentication for LTE
2011
In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.
An improvement of NFC-SEC with signed exchanges for an e-prescription-based application
2013
International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…
An Enhanced Authentication System for the JADE-S Platform
2004
Multi-agent systems require a set of security mechanism threats such as confidentiality, privacy, authentication, data integrity, access control. Authentication is the process of deducing which user has made a specific request in a multi-agent system. The goal of authentication is to allow legitimate system entities to process while denying illegitimate ones. The JADE-S platform requires that users must be authenticated, providing a username and password, in order to be able to perform actions on the platform. In this paper an enhanced user authentication system for the JADE-S platform, requiring user fingerprint in addition to the standard items, is outlined. Due to their uniqueness and im…
Transactions in Mobile Electronic Commerce
2000
With the development of global networking, invention of WWW, and proliferation of Internet-enabled computer hardware and software into homes and pockets, a huge customer base has been created for electronic commerce. It is rapidly expanding in USA and Europe and Japan are following the trend. So far, the development of E-commerce has happened in a rather unregulated way especially in USA, whereas in Europe the European Commission has been developing a regulatory basis mainly in form of directives. Currently (12/1999) they have not yet all been accepted and a major restructuring of the regulatory framework has also been planned. Another technological development is the rapid growth of mobile…
The authenticity of Platonic Critias
2020
The article discusses the thesis of Rashed and Auffret, who believe that the Critias, which has until now been considered Platonic by almost all scholars, is spurious, due to some inconsistencies that seem to emerge from a comparison between the prologues of the Critias and the 77-maeus. These contradictions do not seem decisive and can be explained through a different interpretation of the two texts. In addition to the arguments concerning the contents of the work, some linguistic and lexical observations can be added that also confirm the authenticity of the dialogue.