Academic literature on the topic 'OpenID Connect'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'OpenID Connect.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "OpenID Connect"

1

Navas, Jorge, and Marta Beltrán. "Understanding and mitigating OpenID Connect threats." Computers & Security 84 (July 2019): 1–16. http://dx.doi.org/10.1016/j.cose.2019.03.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Deeptha, R., and Rajeswari Mukesh. "Extending OpenID Connect Towards Mission Critical Applications." Cybernetics and Information Technologies 18, no. 3 (September 1, 2018): 93–110. http://dx.doi.org/10.2478/cait-2018-0041.

Full text
Abstract:
Abstract Single Sign-On (SSO) decreases the complexity and eases the burden of managing many accounts with a single authentication mechanism. Mission critical application such as banking demands highly trusted identity provider to authenticate its users. The existing SSO protocol such as OpenID Connect protocol provides secure SSO but it is applicable only in the consumer-to-social-network scenarios. Owing to stringent security requirements, the SSO for banking service necessitates a highly trusted identity provider and a secured private channel for user access. The banking system depends on a dedicated central banking authority which controls the monetary policy and it must assume the role of the identity provider. This paper proposes an extension of OpenID Connect protocol that establishes a central identity provider for bank users, which facilitates the users to access different accounts using single login information. The proposed Enhanced OpenID Connect (EOIDC) modifies the authorization code flow of OpenID Connect to build a secure channel from a single trusted identity provider that supports multiple banking services. Moreover, the EOIDC tightens the security mechanism with the help of SAT to avoid impersonation attack using replay and redirect. The formal security analysis and validation demonstrate the strength of the EOIDC against possible attacks such as impersonation, eavesdropping, and a brute force login. The experimental results reveal that the proposed EOIDC system is efficient in providing secured SSO protocol for banking services.
APA, Harvard, Vancouver, ISO, and other styles
3

Alsadeh, Ahmad, Nasri Yatim, and Yousef Hassouneh. "A Dynamic Federated Identity Management Using OpenID Connect." Future Internet 14, no. 11 (November 21, 2022): 339. http://dx.doi.org/10.3390/fi14110339.

Full text
Abstract:
Identity federation allows one to link a user’s digital identities across several identity management systems. Federated identity management (FIM) ensures that users have easy access to the available resources. However, scaling FIM to numerous partners is a challenging process due to the interoperability issue between different federation architectures. This study proposes a dynamic identity federation model to eliminate the manual configuration steps needed to establish an organizational identity federation by utilizing the OpenID Connect (OIDC) framework. The proposed model consists of three major steps to establish dynamic FIM: first, the discovery of the OpenID service provider, which indicates the location of the partner organization; second, the registration of the OpenID relying party, which allows the organization and its partner to negotiate information for establishing the federation; finally, establishing the dynamic trust federation. The proposed dynamic FIM model allows applications to provide services to end-users coming from various domains while maintaining a trust between clients and service providers. Through our proposed dynamic identity federation model, organizations can save hundreds of hours by achieving dynamic federation in runtime and serving a large number of end-users.
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Weina, Kamran Sartipi, Hassan Sharghigoorabi, David Koff, and Peter Bak. "OpenID Connect as a security service in cloud-based medical imaging systems." Journal of Medical Imaging 3, no. 2 (June 16, 2016): 026501. http://dx.doi.org/10.1117/1.jmi.3.2.026501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sujanani, Tarun, and Smitha Vinod. "Implementation of OpenIdconnect and OAuth 2.0 to create SSO for educational institutes." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.6.10142.

Full text
Abstract:
Increase in the number of users is directly proportional to the need of verifying them. This means that any user using any website or application has to be authenticated first; this leads to the creation of multiple credentials of one user. Now if these different websites or applications are connected or belong to one single organization like a college or school, a lot of redundancy of data is there. Along with this, each user has to remember a wide range of credentials for different applications/websites. So in this paper, we address the issue of redundancy and user related problems by introducing SSO using OpenId Connect in educational institutes. We aim to mark the difference between the traditional system and proposed login by testing it on a group of users.
APA, Harvard, Vancouver, ISO, and other styles
6

Villarán, Carlos, and Marta Beltrán. "User-Centric Privacy for Identity Federations Based on a Recommendation System." Electronics 11, no. 8 (April 14, 2022): 1238. http://dx.doi.org/10.3390/electronics11081238.

Full text
Abstract:
Specifications such as SAML, OAuth, OpenID Connect and Mobile Connect are essential for solving identification, authentication and authorisation in contexts such as mobile apps, social networks, e-commerce, cloud computing or the Internet of Things. However, end-users relying on identity providers to access resources, applications or services lose control over the Personally Identifiable Information (PII) they share with the different providers composing identity federations. This work proposes a user-centric approach based on a recommendation system to support users in making privacy decisions such as selecting service providers or choosing their privacy settings. The proposed Privacy Advisor gives end-users privacy protection by providing personalised recommendations without compromising the identity federations’ functionalities or requiring any changes in their underlying specifications. A proof of concept of the proposed recommendation system is presented to validate and evaluate its utility and feasibility.
APA, Harvard, Vancouver, ISO, and other styles
7

Corre, Kevin, Olivier Barais, Gerson Sunyé, Vincent Frey, and Jean-Michel Crom. "Why can’t users choose their identity providers on the web?" Proceedings on Privacy Enhancing Technologies 2017, no. 3 (July 1, 2017): 75–89. http://dx.doi.org/10.1515/popets-2017-0029.

Full text
Abstract:
Abstract Authentication delegation is a major function of the modern web. Identity Providers (IdP) acquired a central role by providing this function to other web services. By knowing which web services or web applications access its service, an IdP can violate the enduser privacy by discovering information that the user did not want to share with its IdP. For instance, WebRTC introduces a new field of usage as authentication delegation happens during the call session establishment, between two users. As a result, an IdP can easily discover that Bob has a meeting with Alice. A second issue that increases the privacy violation is the lack of choice for the end-user to select its own IdP. Indeed, on many web-applications, the end-user can only select between a subset of IdPs, in most cases Facebook or Google. In this paper, we analyze this phenomena, in particular why the end-user cannot easily select its preferred IdP, though there exists standards in this field such as OpenID Connect and OAuth 2? To lead this analysis, we conduct three investigations. The first one is a field survey on OAuth 2 and OpenID Connect scope usage by web sites to understand if scopes requested by websites could allow for user defined IdPs. The second one tries to understand whether the problem comes from the OAuth 2 protocol or its implementations by IdP. The last one tries to understand if trust relations between websites and IdP could prevent the end user to select its own IdP. Finally, we sketch possible architecture for web browser based identity management, and report on the implementation of a prototype.
APA, Harvard, Vancouver, ISO, and other styles
8

Karavakis, Edward, Andrea Manzi, Maria Arsuaga Rios, Oliver Keeble, Carles Garcia Cabot, Michal Simon, Mihai Patrascoiu, and Aris Angelogiannopoulos. "FTS improvements for LHC Run-3 and beyond." EPJ Web of Conferences 245 (2020): 04016. http://dx.doi.org/10.1051/epjconf/202024504016.

Full text
Abstract:
The File Transfer Service (FTS) developed at CERN and in production since 2014, has become a fundamental component for the LHC experiments and is tightly integrated with experiment frameworks. Starting from the beginning of 2018 with the participation to the European Commission funded project eXtreme Data Cloud (XDC) and the activities carried out in the context of the WLCG DOMA TPC and QoS working groups, a series of new developments and improvements have been planned and performed taking also into account the requirements from the experiments in preparation for the LHC Run-3. This paper provides a detailed overview of these developments; more specifically, the integration with OpenID Connect (OIDC), the QoS integration, the service scalability enhancements, the support for XRootD and HTTP Third Party Copy (TPC) transfers along with the integration with the new CERN Tape Archive (CTA) system.
APA, Harvard, Vancouver, ISO, and other styles
9

Primbs, Jonas, Winfried Ilg, Annika Thierfelder, Björn Severitt, Carolin Sarah Hohnecker, Annika Kristin Alt, Anja Pascher, et al. "The SSTeP-KiZ System—Secure Real-Time Communication Based on Open Web Standards for Multimodal Sensor-Assisted Tele-Psychotherapy." Sensors 22, no. 24 (December 7, 2022): 9589. http://dx.doi.org/10.3390/s22249589.

Full text
Abstract:
In this manuscript, we describe the soft- and hardware architecture as well as the implementation of a modern Internet of Medical Things (IoMT) system for sensor-assisted telepsychotherapy. It enables telepsychotherapy sessions in which the patient exercises therapy-relevant behaviors in their home environment under the remote supervision of the therapist. Wearable sensor information (electrocardiogram (ECG), movement sensors, and eye tracking) is streamed in real time to the therapist to deliver objective information about specific behavior-triggering situations and the stress level of the patients. We describe the IT infrastructure of the system which uses open standards such as WebRTC and OpenID Connect (OIDC). We also describe the system’s security concept, its container-based deployment, and demonstrate performance analyses. The system is used in the ongoing study SSTeP-KiZ (smart sensor technology in telepsychotherapy for children and adolescents with obsessive-compulsive disorder) and shows sufficient technical performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Tharun Sai, Vaddi, D. Kalyan, U. Chaitanya, and Dr D. Vijaya Lakshmi. "VACCINE REGISTRATION SYSTEM INTEGRATED WITH KEYCLOAK." International Journal Of Trendy Research In Engineering And Technology 06, no. 05 (2022): 01–05. http://dx.doi.org/10.54473/ijtret.2022.6501.

Full text
Abstract:
The objective of this paper is to provide an online registration system for covid-19 vaccination. In this crisis, it will be difficult to register in person and get vaccinated after waiting in a queue for a long period; thus, registering online is the safest and most convenient way to schedule slots on a convenient date and get vaccinated. We built this application using spring boot, which allows developers to directly get into coding without wasting time in setting up and configuring the environment. For authentication and authorization, we integrated it with keycloak, a third-party service, which is a simple way to make our webbased apps more secure and Keycloak provides distinctive features to the application like single Single-Sign On, OpenID Connect Support, Social Logins and many more. So, this is a web-based service where any individual can conveniently schedule their slots from anywhere according to the availability in their desired locations.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "OpenID Connect"

1

Johansson, Tom. "Electronic Identification Based on OpenID Connect : A Design Proposal." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210575.

Full text
Abstract:
Electronic identification is used by an individual to prove who he or she is by electronic means and is normally used for logging in to various services. In Sweden there are a number of different solutions that are developed and provided by different parties. In order to promote and coordinate electronic identification for public services, the Swedish E-identification Board was founded in 2011. The Board has developed a technical framework for integration between the Relying Party and the Identity Provider based on the Security Assertion Markup Language V2.0 (SAML) standard. SAML is a quite old standard that has some limitations complicating an electronic identification solution based on it. A newer competing standard is OpenID Connect, which could be a possible candidate as an alternative to SAML. The objective of this thesis is to determine to what extent it is possible to ensure confidentiality, integrity, and accountability in an electronic identification based on OpenID Connect. To achieve this, a number of requirements for electronic identifications were identified and a design proposal based on OpenID Connect was developed together with a proof-of-concept implementation. The design proposal was evaluated against the requirements, with the final result that an electronic identification based on OpenID Connect could meet the requirements.
E-legitimation används av en individ för visa vem han eller hon är på elektronisk väg och används vanligtvis för att logga in på olika tjänster. I Sverige finns ett antal olika lösningar som utvecklas och tillhandahålls av olika parter. För att främja och samordna elektronisk identifiering för offentliga tjänster grundades E-legitimationsnämnden 2011. Nämnden har tagit fram ett tekniskt ramverk för integrationen mellan Förlitande Part och Legitimeringstjänst baserad på Security Assertion Markup Language V2.0 (SAML) standarden. SAML är en relativt gammal standard med vissa begränsningar som komplicerar en e-legitimationslösning baserad på den. En nyare konkurrerande standard är OpenID Connect, vilket kan vara en möjlig kandidat som ett alternativ till SAML. Syftet med detta examensarbete är att undersöka i vilken utsträckning det är möjligt att säkerställa sekretess, integritet och ansvarsskyldighet för en e-legitimation baserad på OpenID Connect. För att uppnå detta, identifierades ett antal krav för e-legitimationer och ett designförslag baserat på OpenID Connect utvecklades tillsammans med en proof-of-concept implementation. Designförslaget utvärderades mot kraven, med det slutliga resultatet att en e-legitimation baserad på OpenID Connect kan uppfylla kraven.
APA, Harvard, Vancouver, ISO, and other styles
2

Sjöholm, Markus. "Analysis of the Use of OpenID Connect for Electronic Signatures." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-452756.

Full text
Abstract:
The use of digital services has never been as important as it is today.It is possible to do everything from researching family history to banktransactions on the Internet. This creates a demand for secure servicesto ensure secure authentication of users. Electronic signatures havebecome an important part of e-identification over the last year due tothe the COVID-19 pandemic forcing many people to work remotely.OpenID Connect, or OIDC, is a framework that supports secureauthentication and authorization. But, it does not support electronicsignatures. The work done in this project has shown that an extensionof the OIDC framework is feasible for electronic signatures.A proof of concept has been built to analyse if an extension tothe OIDC framework was possible. The signature flow implementedis structured according to a proposal developed by an experiencedgroup of people working with e-identification. It extends the OIDCauthentication request with additional information to enable supportfor electronic signatures. The signature is done using BankID as an IDP.This work shows that it is possible to perform an electronic sig-nature, with an OpenID Connect authentication flow with signatureextension. The work has focuses on one model using an IDP thatperforms signing. An approach with a stand-alone signature service ispossible, but would be more complex for a limited proof of concept.
APA, Harvard, Vancouver, ISO, and other styles
3

Rasiwasia, Akshay. "A Framework To Implement OpenID Connect Protocol For Federated Identity Management In Enterprises." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64848.

Full text
Abstract:
Federated Identity Management (FIM) and Single-Sign-On (SSO) concepts improve both productivity andsecurity for organizations by assigning the responsibility of user data management and authentication toone single central entity called identity provider, and consequently, the users have to maintain only oneset of credential to access resources at multiple service provider. The implementation of any FIM and SSOprotocol is complex due to the involvement of multiple organizations, sensitive user data, and myriadsecurity issues. There are many instances of faulty implementations that compromised on security forease of implementation due to lack of proper guidance. OpenID Connect (OIDC) is the latest protocolwhich is an open standard, lightweight and platform independent to implement Federated IdentityManagement; it offers several advantages over the legacy protocols and is expected to have widespreaduse. An implementation framework that addresses all the important aspects of the FIM lifecycle isrequired to ensure the proper application of the OIDC protocol at the enterprise level. In this researchwork, an implementation framework was designed for OIDC protocol by incorporating all the importantrequirements from a managerial, technical and security perspective of an enterprise level federatedidentity management. The research work closely follows the design science research process, and theframework was evaluated for its completeness, efficiency, and usability.
APA, Harvard, Vancouver, ISO, and other styles
4

Pezzulli, Francesco. "Analisi ed implementazione di un sistema Single Sign-On basato su Shibboleth e OpenID Connect." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Il lavoro raccolto in questa tesi comprende sia lo studio delle soluzioni Single Sign-On e del loro impiego in contesti reali, sia il lavoro di implementazione di un sistema di Identity Provider nella realtà CINECA. Lo studio parte dal concetto di identità digitale e di come essa viene gestita nei sistemi di autenticazione. In questo lavoro è rappresentata l'analisi della figura di Identity Provider che va dallo studio delle componenti e dei workflow di processo del caso d'uso SPID all'esame del sistema Shibboleth nella sua interezza. La piattaforma Shibboleth è una soluzione di Single Sign-On molto ricca e funzionale e per questo motivo è quella adottata dal CINECA nell'erogazione dei propri servizi. Il lavoro implementativo compreso in questa tesi è nato dall'esigenza CINECA di evolvere i propri sistemi Shibboleth in una soluzione unica e trasversale alle diverse esigenze applicative aziendali. Lo studio e la realizzazione di questo progetto ha portato all'individuazione di un prototipo di piattaforma che verrà sviluppato appieno nei prossimi mesi e che verrà adottato dal CINECA in futuro.
APA, Harvard, Vancouver, ISO, and other styles
5

Fedi, Alessandro. "Servizi Web Integrati con Applicazioni di Social Networking tramite Framework Spring Social." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Find full text
Abstract:
Il lavoro effettuato in questa tesi prevede la creazione di un sistema configurabile da installare su un’applicazione web che sia in grado di offrire l’interazione con i Social Network più diffusi. Attraverso questo lavoro è stato approfondito lo studio di Spring Social, strumento in grado di gestire la connessione ai Social Network che utilizzano OAuth per concedere l'autorizzazione. Inoltre è stato realizzato un prototipo sviluppato con AngularJS che soddisfacesse i requisiti dati.
APA, Harvard, Vancouver, ISO, and other styles
6

Hedmark, Alice. "Undersökning av webbsidors säkerhet vid användning avFacebook Login : Vidareutveckling och analys av OAuthGuard." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36859.

Full text
Abstract:
Single Sign-On (SSO) är en autentiseringsprocess som tillåter en utvecklare att delegera autentiseringsansvaret till en dedikerad tjänst. OAuth 2.0 är ett auktoriseringsramverk som ofta står som grund för ett autentiseringslager som i sin tur möjliggör SSO. En identitetsleverantör är tjänsten som står för hantering av användaruppgifterna och autentiseringen, två vanliga identitetsleverantörer är Google och Facebook som i sin tur implementerar SSO med hjälp utav autentiseringslagren OpenID Connect respektive Facebooks egna autentiseringslager. Det har visat sig att många klienter som ska utnyttja SSO med OAuth 2.0 implementerar det fel så att säkerhetsbrister uppstår, studier har utförts med förslag till lösningar men många bristande implementationer fortsätter produceras och existera. Att skapa diverse verktyg för att främja säkerhet i dessa sammanhang är en metod där OAuthGuard utvecklats med visionen att även kunna skydda användaren, direkt från en webbläsare. OAuthGuard har även tidigare använts för att analysera säkerheten med Google SSO och visat att 50% av undersökta klienter har brister, men motsvarande studie eller verktyg saknas för Facebook SSO. Denna studie gjorde en motsvarande undersökning för Facebook SSO-klienter med en vidareutvecklad version av OAuthGuard och fann att de lider av brister med liknande trend som tidigare studies resultat mot Google-SSO-klienter, men att färre Facebook- SSO-klienter har brister i jämförelse. Vid vidareutvecklingen av OAuthGuard upptäcktes ett antal svårigheter och framtiden för denna typ av verktyg behöver vidare analyseras. Vidare analys behöver även göras för att bedöma om Facebook-SSO kan vara att föredra över Google-SSO ur säkerhetsperspektiv samt vidare utforskande av nya säkerhetsfrämjande metoder behöver utföras.
Single Sign-On (SSO) is an authentication process that allows a developer to delegate the authentication responsibility to a dedicated service. OAuth 2.0 is an authorization framework that often serves as a base for authentication layers to be built upon that in turn allows for SSO. An identity provider is the service that is responsible for handling user credentials and the authentication, two common identity providers are Google and Facebook that implement SSO with the authentication layers OpenID Connect respectively Facebooks own authentication layer. It has been shown that many clients using OAuth 2.0 as base for SSO make faulty implementations leading to security issues, a number of studies has proposed solutions to these issues but faulty implementations are continually being made. To create various tools to promote security in these contexts is a method where OAuthGuard has been developed with the vision to also directly protect the common website user directly from the browser. OAuthGuard has been used in an earlier study to analyze the security of clients using Google SSO and discovered that 50% of the analyzed clients had flaws, no comparable study has been done for clients using Facebook SSO, which is the second largest third party log in variant. This study made a comparable investigation for Facebook SSO clients with a further developed version of OAuthGuard and found that these clients suffer from flaws with a similar trend as the previous study with Google-SSO clients, although fewer Facebook-SSO clients suffer from these flaws. When further developing OAuthGuard a dumber of difficulties was discovered and the future of these kind of tools needs to be investigated. Further analysis needs to be done to assess if Facebook-SSO should be recommended over Google-SSO from a security perspective and also further exploration of new methods to promote security needs to be done.
APA, Harvard, Vancouver, ISO, and other styles
7

SHARIF, AMIR. "Analysis of Best Current Practices to Assist Native App Developers with Secure OAuth/OIDC Implementations." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1050122.

Full text
Abstract:
OAuth 2.0 and OpenID Connect are two of the most widely used protocols to support secure and frictionless access delegation and single sign-on login solutions, which have been extensively integrated within web and mobile native applications. While securing the OAuth and OpenID Connect implementations within the web applications is widely investigated, this is not true for mobile native applications due to their peculiarities compared to web applications. Given that, we investigate the availability of necessary information to mobile native application developers. Our investigation reveals that mobile native application developers need to access many sparse documents and understand technical security writing, when they are not necessarily security experts that leads to insecure integration of OAuth and OpenID Connect solutions due to various implementation flaws. Thus, to assist mobile native application developers in the understanding of OAuth and OpenID Connect documentations, we demystify the OAuth and OpenID Connect core documentations and two of the most security-critical profiles for governmental and financial domains, namely “International Government Assurance” and “Financial Grade API” to extract the wealth information and summarize them in plain English. To secure the integration of OAuth and OpenID Connect solutions, the OAuth working group and the OpenID foundation have produced many security-related documents to provide general guidelines and best current practices. These documents explain the features that OAuth and OpenID Connect providers must support and how web and mobile native application developers should implement these solutions for the different use case scenarios. In addition, due to the peculiarities of mobile native applications, the OAuth working group has published the “OAuth 2.0 for Na- tive Apps” documentation dedicated to assist mobile native application developers. Recently, the OAuth working group released AppAuth SDK to support mobile native application developers in the secure implementation of access delegation and single sign-on login solutions within mobile native applications. It enables mobile native applications to authorize and authenticate users by communicating with OAuth and OpenID Connect providers, beside embedding the security and usability best current practices described in [DB17]. We thus perform a comprehensive analysis to investigate the compliance with the best current practices of the main OAuth and OpenID Connect providers and top-ranked Google Play Store applications. Our analysis shows that 7 out of 14 providers, and 5 out of 87 top-ranked Google Play Store applications are fully compliant with the best current practices and none of the Google Play Store applications use AppAuth SDK. We conjecture that the root-causes of the non-compliant solutions are different for OAuth and OpenID Connect providers and Google Play Store applications. Concerning providers, they might be aware of these best current practices violations and their non-compliant solutions can be due to legacy reasons. Concerning Google Play Store applications, their non-compliant solutions can be due to the following: (i) the best current practices documents for OAuth and OpenID Connect are sparse, and mobile native application developers may be either unaware of them or misinterpret them as they are not (necessarily) security expert, (ii) lack of the best current practices adoption by OAuth and OpenID Connect providers that leads to the difficulty in integration of AppAuth SDK within mobile native applications. In addition, even in the case of compliant OAuth and OpenID Connect providers, the mobile native application developers still need to properly configure the AppAuth SDK and write the secure code to invoke the SDK properly within their mobile native applications, which is not a daunting task, and (iii) the pressure on mobile native application developers to provide new functionalities for the mobile native applications may result in prioritizing the functionality over the security—as performing a risk as- assessment procedure is a complex task in the context of OAuth and OpenID Connect solutions—they could not have the resources to perform a risk assessment procedure. The above-mentioned problems motivate us to propose methodologies to assist mobile native application developers with the secure implementation of OAuth and OpenID Connect solutions within their mobile native applications. To this aim, we provide a reference model for OAuth and OpenID Connect solutions by utilizing the extracted information from various documents that can be used within a risk as- assessment approach to enable mobile native application developers with an informed decision w.r.t. their implementation choices. In addition, we design a wizard-based approach and implement it within an Android Studio plugin called mIDAssistant that assists mobile native application developers with automatic integration of the core functionalities and ensures the enforcement of the best current practices by leveraging AppAuth SDK. The effectiveness of our approach has been verified in several real-world scenarios (e.g., pull printing), research and innovation projects (e.g., the EIT Digital activity API Assistant), and in the context of industrial collaborations (Poste Italiane, IPZS). Furthermore, we had the opportunity to present our work to the OAuth working group experts (during the OAuth Security Workshop), and they have shown interest in our approach.
APA, Harvard, Vancouver, ISO, and other styles
8

Josefsson, Ågren Fredrik, and Oscar Järpehult. "Characterizing the Third-Party Authentication Landscape : A Longitudinal Study of how Identity Providers are Used in Modern Websites." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178035.

Full text
Abstract:
Third-party authentication services are becoming more common since it eases the login procedure by not forcing users to create a new login for every website thatuses authentication. Even though it simplifies the login procedure the users still have to be conscious about what data is being shared between the identity provider (IDP) and the relying party (RP). This thesis presents a tool for collecting data about third-party authentication that outperforms previously made tools with regards to accuracy, precision and recall. The developed tool was used to collect information about third-party authentication on a set of websites. The collected data revealed that third-party login services offered by Facebook and Google are most common and that Twitters login service is significantly less common. Twitter's login service shares the most data about the users to the RPs and often gives the RPs permissions to perform write actions on the users Twitter account.  In addition to our large-scale automatic data collection, three manual data collections were performed and compared to previously made manual data collections from a nine-year period. The longitudinal comparison showed that over the nine-year period the login services offered by Facebook and Google have been dominant.It is clear that less information about the users are being shared today compared to earlier years for Apple, Facebook and Google. The Twitter login service is the only IDP that have not changed their permission policies. This could be the reason why the usage of the Twitter login service on websites have decreased.  The results presented in this thesis helps provide a better understanding of what personal information is exchanged by IDPs which can guide users to make well educated decisions on the web.
APA, Harvard, Vancouver, ISO, and other styles
9

Toresson, Gabriel. "Documenting and Improving the Design of a Large-scale System." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157733.

Full text
Abstract:
As software systems become increasingly larger and more complex, the need to make them easily maintained increases, as large systems are expected to last for many years. It has been estimated that system maintenance is a large part of many IT-departments’ software develop­ment costs. In order to design a complex system to be maintainable it is necessary to introduce structure, often as models in the form of a system architecture and a system design. As development of complex large-scale systems progresses over time, the models may need to be reconstructed. Perhaps because development may have diverted from the initial plan, or because changes had to be made during implementation. This thesis presents a reconstructed documentation of a complex large-scale system, as well as suggestions for how to improve the existing design based on identified needs and insufficiencies. The work was performed primarily using a qualitative manual code review approach of the source code, and the proposal was generated iteratively. The proposed design was evaluated and it was concluded that it does address the needs and insufficiencies, and that it can be realistically implemented.
APA, Harvard, Vancouver, ISO, and other styles
10

Weber, Bruno. "Optimisation de code Galerkin discontinu sur ordinateur hybride : application à la simulation numérique en électromagnétisme." Thesis, Strasbourg, 2018. http://www.theses.fr/2018STRAD046/document.

Full text
Abstract:
Nous présentons dans cette thèse les évolutions apportées au solveur Galerkin Discontinu Teta-CLAC, issu de la collaboration IRMA-AxesSim, au cours du projet HOROCH (2015-2018). Ce solveur permet de résoudre les équations de Maxwell en 3D, en parallèle sur un grand nombre d'accélérateurs OpenCL. L'objectif du projet HOROCH était d'effectuer des simulations de grande envergure sur un modèle numérique complet de corps humain. Ce modèle comporte 24 millions de mailles hexaédriques pour des calculs dans la bande de fréquences des objets connectés allant de 1 à 3 GHz (Bluetooth). Les applications sont nombreuses : téléphonie et accessoires, sport (maillots connectés), médecine (sondes : gélules, patchs), etc. Les évolutions ainsi apportées comprennent, entre autres : l'optimisation des kernels OpenCL à destination des CPU dans le but d'utiliser au mieux les architectures hybrides ; l'expérimentation du runtime StarPU ; le design d'un schéma d'intégration à pas de temps local ; et bon nombre d'optimisations permettant au solveur de traiter des simulations de plusieurs millions de mailles
In this thesis, we present the evolutions made to the Discontinuous Galerkin solver Teta-CLAC – resulting from the IRMA-AxesSim collaboration – during the HOROCH project (2015-2018). This solver allows to solve the Maxwell equations in 3D and in parallel on a large amount of OpenCL accelerators. The goal of the HOROCH project was to perform large-scale simulations on a complete digital human body model. This model is composed of 24 million hexahedral cells in order to perform calculations in the frequency band of connected objects going from 1 to 3 GHz (Bluetooth). The applications are numerous: telephony and accessories, sport (connected shirts), medicine (probes: capsules, patches), etc. The changes thus made include, among others: optimization of OpenCL kernels for CPUs in order to make the best use of hybrid architectures; StarPU runtime experimentation; the design of an integration scheme using local time steps; and many optimizations allowing the solver to process simulations of several millions of cells
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "OpenID Connect"

1

R, Packer Duane, ed. Opening to channel: How to connect with your guide. Tiburon, Calif: H.J. Kramer, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hedi, Argent, and British Agencies for Adoption and Fostering., eds. Staying connected: Managing contact in adoption. London: British Agencies for Adoption & Fostering, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Woodacre, Margo E. Bane. I'll miss you too: A parent and student guide to opening doors and staying connected during the college years. Naperville, Ill: Sourcebooks, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Twilight at Conner Prairie: The creation, betrayal, and rescue of a museum. Lanham, MD: AltaMira Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, ebrary, ed. Pentaho Reporting 3.5 for Java developers: Create advanced reports, including cross tabs, sub-reports, and charts that connect to practically any data source using open source Pentaho Reporting. Birmingham, UK: Packt Publishing, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tang, Man-Chung. The Story of the Koror Bridge. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2014. http://dx.doi.org/10.2749/cs001.

Full text
Abstract:
<p>Koror Babeldaob Bridge, also called Koror Babelthuap Bridge or simply Koror Bridge, connects the islands of Koror and Babeldaob in the Republic of Palau. The design of the bridge began in 1974 and was based on the prevailing AASHO Standard Specifications at that time and was supplemented by ACI and CEB-FIP design recommendations on an as-needed basis. When the Koror Bridge was opened to traffic in April 1977, it was the world's longest concrete girder span. A few years later, the bridge began to deflect more than had been anticipated. The owner commissioned a Japanese engineering firm in 1985 and then a US engineering firm in 1993 to conduct in-depth investigations of the structure. Both firms came to the same conclusion that the bridge was structurally safe and that the excessive deflection was an unexplainable phenomenon. Nevertheless, in order to improve the driving quality of the bridge deck, the owner decided to repair the bridge. The repair scheme made changes to the structural system and added a large amount of post-tensioning force to the bridge. Unfortunately, less than three months after the repair, late in the afternoon on 26 September, 1996,nineteen and a half years after it was opened to traffic, the bridge collapsed. Thereafter, most of the documents were sealed as a result of litigation between the various parties and the debris was cleared. For a long time, it was impossible to study the facts surrounding the bridge's collapse. Only recently, through continuous probing by a group of engineers, were these documents made accessible to researchers.</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Fantaccini, Fiorenzo, and Raffaella Leproni, eds. “Still Blundering into Sense”. Maria Edgeworth, her context, her legacy. Florence: Firenze University Press, 2019. http://dx.doi.org/10.36253/978-88-6453-971-3.

Full text
Abstract:
“Still Blundering into Sense”. Maria Edgeworth, her context, her legacy. This collection of international contributions, as well as celebrating Maria Edgeworth’s 250th anniversary, proposes some further investigation on two fundamental aspects of her thought and legacy, still little examined in depth: her interest in the education of the young (and of the adults supposed to educate them) in an empirical perspective, explicitly scientific, open to different religious confessions and addressed to all social classes; and the urge for a wider and shared tolerance for alterity. The various essays in the collection offer some insight on the multi-layered relationships between the universe of education and its relationship with the development of knowledge, literature – particularly children’s literature – and pedagogy, as well as between women’s emancipation and the development of both individual and social identity. Their common ground is a dialogic perspective aiming to connect areas of scholarship, which the academia generally classifies into separate research fields.
APA, Harvard, Vancouver, ISO, and other styles
8

Papini, Massimo, ed. L'ultima cura. Florence: Firenze University Press, 2010. http://dx.doi.org/10.36253/978-88-8453-457-6.

Full text
Abstract:
This book is the outcome of a new method of investigating the life experiences of health personnel engaged in paediatric oncology. It brings together the results of individual interviews with each member of the medical, nursing and technical staff in the Paediatric Oncology Department of the University Polyclinic of Padua and the Giannina Gaslini Institute of Genoa. The interviews, prepared using an open questionnaire format, were carried out by qualified personnel, after which the results were analysed and illustrated to the group of health care professionals involved. The two experiences, which are extremely significant in view of the distinction of the two centres of excellence involved, are compared and discussed with a view to making an interesting contribution to the debate on the delicate issues of bioethics implicated in problems connected with the end of life during the developmental stage.
APA, Harvard, Vancouver, ISO, and other styles
9

Fasora, Lukáš, Jan Čermin, Jana Čerminová, Jiří Hanuš, and Michaela Máliková. Sto tváří, sto příběhů. Brno: Masaryk University Press, 2020. http://dx.doi.org/10.5817/cz.muni.m210-9605-2020.

Full text
Abstract:
The book commemorating the centenary of the establishment of the Faculty of Arts is also a contribution to the anniversary of the whole Masaryk University. Its aim is to walk through the history of the faculty by means of a biographical method, i.e., using short biographies that introduce representative, prominent or interesting personalities whose fates and work were connected with the faculty. There was certainly no lack of biographical views in the research of the faculty history, still, such a complex set of biograms has not been collected so far. And the publication offers much more: the authors use a large set of biographical data to interpret the history of the faculty from the perspective of alternating academic generations and contemplate the formative generation experience as well as the phenomena that affected the lives of academics and students over the past 100 years. These include, as a matter of fact, both positive and negative phenomena, therefore, the publication is not just an overview of deserving personalities, respected scientists and charismatic teachers, but it also openly discusses the lives of controversial scholars. Thus, the collection of biograms provides a credible testimony to the one-hundred-year work of the faculty, continually blending studies, science and politics.
APA, Harvard, Vancouver, ISO, and other styles
10

Siriwardena, Prabath. OpenID Connect in Action. Manning Publications Co. LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "OpenID Connect"

1

Wilson, Yvonne, and Abhishek Hingnikar. "OpenID Connect." In Solving Identity Management in Modern Applications, 77–97. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5095-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Siriwardena, Prabath. "OpenID Connect." In Advanced API Security, 181–200. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schwartz, Michael, and Maciej Machulak. "OpenID Connect." In Securing the Perimeter, 151–203. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-2601-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wilson, Yvonne, and Abhishek Hingnikar. "OpenID Connect." In Solving Identity Management in Modern Applications, 103–26. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8261-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Siriwardena, Prabath. "OpenID Connect (OIDC)." In Advanced API Security, 129–55. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-2050-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Himschoot, Peter. "Security with OpenId Connect." In Microsoft Blazor, 547–603. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7845-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mayank, Manas, and Mohit Garg. "OAuth Flows and OpenID Connect." In Developing Applications with Azure Active Directory, 17–46. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5040-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Giretti, Anthony. "Secure Your Application with OpenId Connect." In Beginning gRPC with ASP.NET Core 6, 459–79. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8008-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Iacono, Luigi Lo, Nils Gruschka, and Peter Nehren. "Mobile Personal Identity Provider Based on OpenID Connect." In Trust, Privacy and Security in Digital Business, 19–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64483-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Wanpeng, and Chris J. Mitchell. "Analysing the Security of Google’s Implementation of OpenID Connect." In Detection of Intrusions and Malware, and Vulnerability Assessment, 357–76. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "OpenID Connect"

1

Hammann, Sven, Ralf Sasse, and David Basin. "Privacy-Preserving OpenID Connect." In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3320269.3384724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weingartner, Rafael, Pedro Henrique Pereira Martins, Ivan Luiz Salvadori, Carla Merkle Westphall, and Frank Siqueira. "Improving OpenID Connect Federation’s Interoperability with Web Semantics." In 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2017. http://dx.doi.org/10.1109/aiccsa.2017.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Wanpeng, and Chris J. Mitchell. "User Access Privacy in OAuth 2.0 and OpenID Connect." In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dodanduwa, Kavindu, and Ishara Kaluthanthri. "Role of Trust in OAuth 2.0 and OpenID Connect." In 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS). IEEE, 2018. http://dx.doi.org/10.1109/iciafs.2018.8913384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blazquez, Alberto, Vlasios Tsiatsis, and Konstantinos Vandikas. "Performance Evaluation of OpenID Connect for an IoT Information Marketplace." In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring). IEEE, 2015. http://dx.doi.org/10.1109/vtcspring.2015.7146004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mainka, Christian, Vladislav Mladenov, Jorg Schwenk, and Tobias Wich. "SoK: Single Sign-On Security — An Evaluation of OpenID Connect." In 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2017. http://dx.doi.org/10.1109/eurosp.2017.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

KOSE, Busra OZDENIZCI, Onur BUK, Haci Ali MANTAR, and Vedat COSKUN. "TrustedID: An Identity Management System based on OpenID Connect Protocol." In 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT). IEEE, 2020. http://dx.doi.org/10.1109/ismsit50672.2020.9254886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Batista, Glauber C., Charles C. Miers, Guilherme P. Koslovski, Mauricio A. Pillon, Nelson Mimura Gonzalez, and Marcos A. Simplicio. "Using Externals IdPs on OpenStack: A Security Analysis of OpenID Connect, Facebook Connect, and OpenStack Authentication." In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2018. http://dx.doi.org/10.1109/aina.2018.00135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Weina, Kamran Sartipi, Hassan Sharghi, David Koff, and Peter Bak. "OpenID connect as a security service in Cloud-based diagnostic imaging systems." In SPIE Medical Imaging, edited by Tessa S. Cook and Jianguo Zhang. SPIE, 2015. http://dx.doi.org/10.1117/12.2082519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bucalo, Bojan, Jovana Samardžija, and Saša Adamović. "ISAM integracija sa Facebook platformom kao provajderom identiteta preko OpenID Connect protokola." In Sinteza 2019. Novi Sad, Serbia: Singidunum University, 2019. http://dx.doi.org/10.15308/sinteza-2019-250-255.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "OpenID Connect"

1

Dukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, September 2021. http://dx.doi.org/10.4271/epr2021019.

Full text
Abstract:
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used? What are the regulatory regimes that impact vehicular data use? Is the US close to harmonizing with other nations in the automotive data privacy? And will the risks of hackers lead to the “zombie car apocalypse” or to another avenue for ransomware? This report explores a number of these legal challenges and the unsettled aspects that arise in the world of automotive data
APA, Harvard, Vancouver, ISO, and other styles
2

Razdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.

Full text
Abstract:
As automobiles morph from stand-alone mechanical objects to highly connected, autonomous systems with increasing amounts of electronic components. To manage these complex systems, some semblance of in-car decision-making is also being built and networked to a cloud architecture. This cloud can also enable even deeper capabilities within the broader automotive ecosystem. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software introduces the impact of software in advanced automotive applications, the role of open-source communities in accelerating innovation, and the important topic of safety and cybersecurity. As electronic functionality is captured in software and a bigger percentage of that software is open-source code, some critical challenges arise concerning security and validation.
APA, Harvard, Vancouver, ISO, and other styles
3

Peña, Ignacio, Tomás Gutiérrez, and Milagros Gutiérrez. A Bridge to the Future: How the Rise of the Miami Startup Ecosystem can Become a Platform to Transform the Americas. Inter-American Development Bank, October 2021. http://dx.doi.org/10.18235/0003724.

Full text
Abstract:
This study analyzes the rise of the Miami startup ecosystem and the opportunities for mutual benefit engendered by a strong connection with Latin America and the Caribbean (LAC). The exponential technology revolution and the boom of the LAC startup ecosystem creates a massive opportunity to build a talent-driven network of startup and knowledge ecosystems that could generate trillions of dollars in value and millions of employment, while igniting the industries of the future across the Hemisphere. The recent rise of the Greater Miami area's innovation ecosystem opens the possibility to unleash value and growth through building a bridge that connects ecosystems across the Americas.
APA, Harvard, Vancouver, ISO, and other styles
4

Megersa, Kelbesa. Financial Inclusion in a Refugee Response. Institute of Development Studies, August 2021. http://dx.doi.org/10.19088/k4d.2021.122.

Full text
Abstract:
The growing scope, frequency, and complexity of forced displacement, both inside and outside of countries, has pushed donors and other development groups to rethink their approaches to humanitarian crises, particularly on refugee response. Financial inclusion is widely regarded as a particularly critical tool that development organisations can employ to mitigate the catastrophic impact of humanitarian crises on refugees. Financial inclusion would provide a wide range of financial products – such as savings, remittances, loans, and insurance – to both refugees and citizens of host countries, which are critical for disadvantaged populations seeking to mitigate shocks, acquire assets, and support local economic development. Changes in how humanitarian aid is distributed are opening the path for greater financial inclusion. Donors and humanitarian organisations are shifting away from emergency cash transfers and toward digital payments via electronic cards. This opens new opportunities to connect refugees and displaced people to a bigger pool of financial services. This rapid literature review summarises the available evidence on toolkits that assist the response by humanitarian and development agencies to financial inclusion of refugees. In addition to the documents defined explicitly as “toolkits”, it also includes reports and online articles which contain useful guidance, since there were few “toolkits” available. Generally, there is lack of resources that directly address the query, i.e., “financial inclusion” in a “refugee response” context. Although there is a growing literature and evidence on the financial inclusion theme, much of it does not directly relate to refugees. Furthermore, most guidance notes and toolkits prepared for refugee response by humanitarian/development agencies do not directly and explicitly deal with financial inclusion, but rather focus on operational and programming issues of wider relief responses. The review is presented as an annotated bibliography format and includes toolkits, guidance notes, technical reports, and online articles by humanitarian and international development agencies.
APA, Harvard, Vancouver, ISO, and other styles
5

Бакум, З. П., and В. В. Ткачук. Open Education Space: Computer-Aided Training of the Future Engineer-Teacher. Криворізький державний педагогічний університет, 2015. http://dx.doi.org/10.31812/0564/426.

Full text
Abstract:
One of the challenges facing higher education is training of graduates for professional activity in the information society. The solution of this problem is connected with students’ competence formation in the field of computer science, computer engineering and information and communication technology. Activation of the formation process of "engineer-teacher" profession requires solving the problem of computer-aided training of specialists in the field of engineering and pedagogy, taking into account global experience, as well as issues of training specialists, that are common to the national higher school. In the article the computer-based disciplines for the field of training 6.010104 "Vocational Education (according to specialty) have been analyzed as professional. The attention is focused on the open education space as one of the means of optimization of these subjects teaching in view of modern popularization of continuous open access to the educational process.
APA, Harvard, Vancouver, ISO, and other styles
6

Teixeira, Mariana. Vulnerability: A Critical Tool for Conviviality-Inequality Studies. Maria Sibylla Merian Centre Conviviality-Inequality in Latin America, May 2022. http://dx.doi.org/10.46877/teixeira.2022.44.

Full text
Abstract:
The aim of this working paper is to foster the concept of “vulnerability” as a critical tool for social theory in general and conviviality-inequality studies in particular. First, to clarify the concept, an analytical distinction is established between vulnerability as either an experiential structure shared by all persons (constitutive vulnerability) or as historical social injustice that detrimentally impacts some more than others (contingent vulnerability). The paper then explores the contrast between approaches to epistemic injustice theory and standpoint epistemology as two opposing views with regard to the political and epistemic potential of vulnerability. From this contrast, finally, a critique of one-sided conceptions shows us that, for vulnerability to have a productive and critical use, it must be grasped as fraught with ambiguity, implying both a contingent risk of subjection and a constitutive opening to otherness. It is this ambiguity that makes vulnerability a useful conceptual tool for grasping conviviality as inextricably connected to inequality
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Jijo K., Howell Li, and Darcy M. Bullock. Populating SAE J2735 Message Confidence Values for Traffic Signal Transitions Along a Signalized Corridor. Purdue University, 2019. http://dx.doi.org/10.5703/1288284317322.

Full text
Abstract:
The communication between connected vehicles and traffic signal controllers is defined in SAE Surface Vehicle Standard J2735. SAE J2735 defines traffic signal status messages and a series of 16 confidence levels for traffic signal transitions. This paper discusses a statistical method for tabulating traffic signal data by phase and time of day and populating the SAE J2735 messages. Graphical representation of the red-green and green-yellow transitions are presented from six intersections along a 4-mile corridor for five different time of day timing plans. The case study provided illustrates the importance of characterizing the stochastic variation of traffic signals to understand locations, phases, and time of day when traffic indications operate with high predictability, and periods when there are large variations in traffic signal change times. Specific cases, such as low vehicle demand and occasional actuation of pedestrian phases are highlighted as situations that may reduce the predictability of traffic signal change intervals. The results from this study also opens up discussion among transportation professionals on the importance of consistent tabulation of confidence values for both beginning and end of green signal states. We believe this paper will initiate dialog on how to consistently tabulate important data elements transmitted in SAE J2735 and perhaps refine those definitions. The paper concludes by highlighting the importance of traffic engineers and connected vehicle developers to work together to develop shared visions on traffic signal change characteristics so that the in-vehicle use cases and human-machine interface (HMI) meet user expectations.
APA, Harvard, Vancouver, ISO, and other styles
8

Campi, Mercedes, Marco Dueñas, and Tommaso Ciarli. Open configuration options Do Creative Industries Enhance Employment Growth? Regional Evidence from Colombia. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0003993.

Full text
Abstract:
Creative industries are considered highly innovative and productive, constituting an important driver of economic change. For high-income countries, several studies discuss the positive spillovers of creative industries for the local economy, for instance by attracting creative workers, which can benet entrepreneurs and workers in other industries. Like many other activities, creative industries are likely to dier in low- and middle-income countries compared to high-income countries. Moreover, the existing evidence is based on correlations between variables likely to be endogenous. This paper contributes to the literature on the role of creative industries in driving economic change in two main ways. First, we make a rst attempt to control for endogeneity and identify the impact of creative industries on local economies. Second, we report evidence for a middle-income country. Using granular employment data, we study the agglomeration patterns of creative industries across Colombian cities between 2008 and 2017. Exploiting the co-location of creative industries with other industries, we estimate the relation between employment growth in creative and non-creative industries in the same city. Using a shift-share instrumental variable approach, we estimate the multiplier eect of employment growth in creative industries on the employment growth in the rest of the economy. Creative industries represented between 2.7 and 3.3 percent of Colombian employment in 2008 and 2017. We nd that creative industries agglomerate mainly in three large cities (Bogota, Medelln, and Cartagena) and in a few smaller cities. Such agglomeration is positively related to an increase in the employment of non-creative services industries. For a positive causal relation to materialize, creative industries should have a larger size or be more connected to other economic sectors. However, after controlling for endogeneity, we nd no signicant impact of an increase of creative industries employment on employment growth in other industries.
APA, Harvard, Vancouver, ISO, and other styles
9

Tare, Medha, Alison R. Shell, and Jessica Jackson. Shifting Mindsets: Designing Lessons for Learner Variability. Digital Promise, June 2022. http://dx.doi.org/10.51388/20.500.12265/157.

Full text
Abstract:
Classrooms nationwide welcome a diverse group of learners. A goal, and an achievable one, is to recognize this unique diversity on a whole child spectrum and to strive to customize learning to meet individual needs. Critical to this process is for teachers to have at hand research that connects factors of learning in a holistic way. It is equally important to provide research-based strategies that teachers can use to embrace differences and provide pathways to robust learning for each student. With these considerations in mind, the Learner Variability Project (LVP) engaged in a partnership with the national nonprofit DonorsChoose to discover if teachers across the country could use the Learner Variability Navigator (LVN) to find and put in place research-based strategies that address the whole learner. The LVN is a free and open-source web app that curates research to provide factors of learning and affiliated strategies on a whole child framework. The pilot study found that even brief use of LVN encouraged teachers to reflect on the research-based strategies they already use and explore new strategies that support their students’ diverse experiences and needs.
APA, Harvard, Vancouver, ISO, and other styles
10

Mohammadian, Abolfazl, Amir Bahador Parsa, Homa Taghipour, Amir Davatgari, and Motahare Mohammadi. Best Practice Operation of Reversible Express Lanes for the Kennedy Expressway. Illinois Center for Transportation, September 2021. http://dx.doi.org/10.36501/0197-9191/21-033.

Full text
Abstract:
Reversible lanes in Chicago’s Kennedy Expressway are an available infrastructure that can significantly improve traffic performance; however, a special focus on congestion management is required to improve their operation. This research project aims to evaluate and improve the operation of reversible lanes in the Kennedy Expressway. The Kennedy Expressway is a nearly 18-mile-long freeway in Chicago, Illinois, that connects in the southeast to northwest direction between the West Loop and O’Hare International Airport. There are two approximately 8-mile reversible lanes in the Kennedy Expressway’s median, where I-94 merges into I-90, and there are three entrance gates in each direction of this corridor. The purpose of the reversible lanes is to help the congested direction of the Kennedy Expressway increase its traffic flow and decrease the delay in the whole corridor. Currently, experts in a control location switch the direction of the reversible lanes two to three times per day by observing real-time traffic conditions captured by a traffic surveillance camera. In general, inbound gates are opened and outbound gates are closed around midnight because morning traffic is usually heavier toward the central city neighborhoods. In contrast, evening peak-hour traffic is usually heavier toward the outbound direction, so the direction of the reversible lanes is switched from inbound to outbound around noon. This study evaluates the Kennedy Expressway’s current reversing operation. Different indices are generated for the corridor to measure the reversible lanes’ performance, and a data-driven approach is selected to find the best time to start the operation. Subsequently, real-time and offline instruction for the operation of the reversible lanes is provided through employing deep learning and statistical techniques. In addition, an offline timetable is also provided through an optimization technique. Eventually, integration of the data-driven and optimization techniques results in the best practice operation of the reversible lanes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography