Designing Digitally Responsible System, Software and Services Engineering
Permanent URI for this collection
Browse
Recent Submissions
1 - 4 of 4
-
ItemCirrus, A Digtially Responsible Global FIlesystem( 2020-01-07)Cirrus is a distributed filesystem that uses an overlay network that extends the service domain of file servers to global scale without diminishing the quality of service. Cirrus, developed over many years, is operational today and is ready for testing and bench marking. Cirrus’ distributed shared memory implementation provides a fast and secure method of transporting all network traffic within the overlay network.
-
ItemImplementation of High-Speed Pseudo-Random-Number Generator with Chaotic and Random Neural Networks( 2020-01-07)Chaotic and random time series generated from improved chaotic and random neural network (CRNN) afford statistically appropriate pseudo-random number series for information security. Randomness of outputs of CRNN is empirically validated in detail, and control methods of an appropriate ratio of chaotic character and randomness in the time series for PRNG is reported. The rate of random number generation has reached 2.8530×10^12 b/s. In future, the generator may play an important role on implementing applications for protecting personal information on the Internet.
-
ItemThe Review of Non-Technical Assumptions in Digital Identity Architectures( 2020-01-07)The literature on digital identity management systems (IdM) is abundant and solutions vary by technology components and non-technical requirements. In the long run, however, there is a need for exchanging identities across domains or even borders, which requires interoperable solutions and flexible architectures. This article aims to give an overview of the current research on digital identity management. We conduct a systematic literature review of digital identity solution architectures and extract their inherent non-technical assumptions. The findings show that solution designs can be based on organizational, business and trust assumptions as well as human-user assumptions. Namely, establishing the trust relationships and collaborations among participating organizations; human-users capability for maintaining private cryptographic material or the assumptions that win-win business models could be easily identified. By reviewing the key findings of solutions proposed and looking at the differences and commonalities of their technical, organizational and social requirements, we discuss their potential real-life inhibitors and identify opportunities for future research in IdM.
-
Item