[go: up one dir, main page]

Cruz et al. - Google Patents

Federation technology and Virtual Worlds for Learning

Cruz et al.

View PDF
Document ID
5472984816227455312
Author
Cruz G
Costa A
Martins P
Gonçalves R
Barroso J

External Links

Snippet

Currently, Virtual Worlds technology is used for educational purposes in a cross-disciplinary way. However, particularly in formal learning institutions, its widespread adoption is far from being a reality due a broad range of technological challenges. This paper addresses identity …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Similar Documents

Publication Publication Date Title
Cavoukian Privacy in the clouds
US8424065B2 (en) Apparatus and method of identity and virtual object management and sharing among virtual worlds
CN105830389B (en) A single set of certificates for accessing multiple computing resource services
French et al. The interaction of virtual reality, blockchain, and 5G new radio: disrupting business and society
Cruz et al. Toward educational virtual worlds: should identity federation be a concern?
Patwe et al. Blockchain enabled architecture for secure authentication in the metaverse environment
Fineman et al. Securing your reality: Addressing security and privacy in virtual and augmented reality applications
Pierucci et al. Data subjectivation-self-sovereign identity and digital self-determination
US9237140B1 (en) Acceptance of policies for cross-company online sessions
Hovav et al. Tutorial: identity management systems and secured access control
Domanski Who governs the Internet?: A political architecture
Cruz et al. Federation technology and virtual worlds for learning: Research trends and opportunities towards identity federation
Cruz et al. Federation technology and Virtual Worlds for Learning
Borcea-Pfitzmann et al. What user-controlled identity management should learn from communities
Priyambodo et al. Information security on eGovernment as information-centric networks
Liagkou et al. Handling privacy and concurrency in an online educational evaluation system
Kavassalis Designing an academic electronic identity management system for student mobility using eidas eid and self-sovereign identity technologies
Kim et al. Security and access control for a human-centric collaborative commerce system
Ahuja et al. A Conceptual Framework for Secure Cloud Migration
Ahmed et al. Enhancing Educational Paradigms: A Comprehensive Review of Virtual Desktop Infrastructure (VDI) Applications in Learning Environments
Gupta et al. Dimensions of identity federation: a case study in financial services
Teng et al. Hierarchical role-based access control for multi-user collaborative cad environment
Heupel et al. Enhancing the security and usability of DUI based collaboration with proof based access control
Zrelli et al. Improving kerberos security system for cross-realm collaborative interactions: An innovative example of knowledge technology for evolving & verifiable e-society
de Sousa Ribeiro et al. An implementation of the oauth 2.0 for an enterprise service bus