Cruz et al. - Google Patents
Federation technology and Virtual Worlds for LearningCruz et al.
View PDF- Document ID
- 5472984816227455312
- Author
- Cruz G
- Costa A
- Martins P
- Gonçalves R
- Barroso J
External Links
Snippet
Currently, Virtual Worlds technology is used for educational purposes in a cross-disciplinary way. However, particularly in formal learning institutions, its widespread adoption is far from being a reality due a broad range of technological challenges. This paper addresses identity …
- 238000005516 engineering process 0 title abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cavoukian | Privacy in the clouds | |
| US8424065B2 (en) | Apparatus and method of identity and virtual object management and sharing among virtual worlds | |
| CN105830389B (en) | A single set of certificates for accessing multiple computing resource services | |
| French et al. | The interaction of virtual reality, blockchain, and 5G new radio: disrupting business and society | |
| Cruz et al. | Toward educational virtual worlds: should identity federation be a concern? | |
| Patwe et al. | Blockchain enabled architecture for secure authentication in the metaverse environment | |
| Fineman et al. | Securing your reality: Addressing security and privacy in virtual and augmented reality applications | |
| Pierucci et al. | Data subjectivation-self-sovereign identity and digital self-determination | |
| US9237140B1 (en) | Acceptance of policies for cross-company online sessions | |
| Hovav et al. | Tutorial: identity management systems and secured access control | |
| Domanski | Who governs the Internet?: A political architecture | |
| Cruz et al. | Federation technology and virtual worlds for learning: Research trends and opportunities towards identity federation | |
| Cruz et al. | Federation technology and Virtual Worlds for Learning | |
| Borcea-Pfitzmann et al. | What user-controlled identity management should learn from communities | |
| Priyambodo et al. | Information security on eGovernment as information-centric networks | |
| Liagkou et al. | Handling privacy and concurrency in an online educational evaluation system | |
| Kavassalis | Designing an academic electronic identity management system for student mobility using eidas eid and self-sovereign identity technologies | |
| Kim et al. | Security and access control for a human-centric collaborative commerce system | |
| Ahuja et al. | A Conceptual Framework for Secure Cloud Migration | |
| Ahmed et al. | Enhancing Educational Paradigms: A Comprehensive Review of Virtual Desktop Infrastructure (VDI) Applications in Learning Environments | |
| Gupta et al. | Dimensions of identity federation: a case study in financial services | |
| Teng et al. | Hierarchical role-based access control for multi-user collaborative cad environment | |
| Heupel et al. | Enhancing the security and usability of DUI based collaboration with proof based access control | |
| Zrelli et al. | Improving kerberos security system for cross-realm collaborative interactions: An innovative example of knowledge technology for evolving & verifiable e-society | |
| de Sousa Ribeiro et al. | An implementation of the oauth 2.0 for an enterprise service bus |