CINXE.COM
Search results for: identity and access management
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: identity and access management</title> <meta name="description" content="Search results for: identity and access management"> <meta name="keywords" content="identity and access management"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="identity and access management" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="identity and access management"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 13809</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: identity and access management</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13809</span> A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rupan%20Preet%20Kaur">Rupan Preet Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20access%20review" title=" user access review"> user access review</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20approval" title=" access approval"> access approval</a> </p> <a href="https://publications.waset.org/abstracts/174501/a-review-artificial-intelligence-ai-driven-user-access-management-and-identity-governance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13808</span> Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Koyangbo%20Guere%20Monguia%20Michel%20Alex%20Emmanuel">Koyangbo Guere Monguia Michel Alex Emmanuel </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing%20network" title="cloud computing network">cloud computing network</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20management%20systems" title=" identity management systems"> identity management systems</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20key%20encryption" title=" public key encryption"> public key encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20and%20authorization" title=" access control and authorization"> access control and authorization</a> </p> <a href="https://publications.waset.org/abstracts/50648/central-african-republic-government-recruitment-agency-based-on-identity-management-and-public-key-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13807</span> Identity Management in Virtual Worlds Based on Biometrics Watermarking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Bader">S. Bader</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Essoukri%20Ben%20Amara"> N. Essoukri Ben Amara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20management" title="identity management">identity management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=biometrics%20authentication%20and%20authorization" title=" biometrics authentication and authorization"> biometrics authentication and authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=avatar" title=" avatar"> avatar</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20world" title=" virtual world"> virtual world</a> </p> <a href="https://publications.waset.org/abstracts/50268/identity-management-in-virtual-worlds-based-on-biometrics-watermarking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13806</span> Design and Application of NFC-Based Identity and Access Management in Cloud Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shin-Jer%20Yang">Shin-Jer Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai-Tai%20Yang"> Kai-Tai Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20service" title="cloud service">cloud service</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-tenancy" title=" multi-tenancy"> multi-tenancy</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC" title=" NFC"> NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=IAM" title=" IAM"> IAM</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20device" title=" mobile device"> mobile device</a> </p> <a href="https://publications.waset.org/abstracts/58826/design-and-application-of-nfc-based-identity-and-access-management-in-cloud-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58826.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">435</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13805</span> Survey of Access Controls in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monirah%20Alkathiry">Monirah Alkathiry</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20Aljarwan"> Hanan Aljarwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20controls" title="access controls">access controls</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management" title=" identity and access management"> identity and access management</a> </p> <a href="https://publications.waset.org/abstracts/125048/survey-of-access-controls-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125048.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13804</span> The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazli%20W.%20Hardy">Nazli W. Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20relation%20management" title="identity relation management">identity relation management</a>, <a href="https://publications.waset.org/abstracts/search?q=multifactor%20authentication" title=" multifactor authentication"> multifactor authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=protocols" title=" protocols"> protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=survey%20of%20internet%20of%20things%20ecosystem" title=" survey of internet of things ecosystem"> survey of internet of things ecosystem</a> </p> <a href="https://publications.waset.org/abstracts/50501/the-internet-of-things-ecosystem-survey-of-the-current-landscape-identity-relationship-management-multifactor-authentication-mechanisms-and-underlying-protocols" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13803</span> Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandesh%20Achar">Sandesh Achar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multi-cloud%20service" title="multi-cloud service">multi-cloud service</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20organization%20control" title=" system organization control"> system organization control</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20loss%20prevention" title=" data loss prevention"> data loss prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management" title=" identity and access management"> identity and access management</a> </p> <a href="https://publications.waset.org/abstracts/154986/cloud-computing-security-for-multi-cloud-service-providers-controls-and-techniques-in-our-modern-threat-landscape" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154986.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13802</span> Who Am I at Work: Work Identity Formation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carol%20Belle-Hallsworth">Carol Belle-Hallsworth</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Human interaction at work evolves over time and, with it, work identity. The social identity is built upon the development of its underpinning and preceding stages. Work identity can be viewed in the same way and will shift based on changes in the work environment and challenges to the work identity (threats to the four stages). This paper provides an analysis of how the stages of trust, autonomy, industry and initiative are related to the employee identity at work. Describing how they are related to each other and the development of identity. It has become common to notice changes in employee behavior during and after major operational changes in an organization. Previous studies suggest that there are emotional triggers that result in the new behaviors displayed. This study seeks to test a theoretical model by testing the relationship between the first four Erikson stages as constructs. A randomized sample of participants undertook a self-administered survey to capture information on trust, autonomy, initiative, and industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=work%20identity" title="work identity">work identity</a>, <a href="https://publications.waset.org/abstracts/search?q=change%20management" title=" change management"> change management</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20management" title=" organizational management"> organizational management</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20implementation" title=" technology implementation"> technology implementation</a> </p> <a href="https://publications.waset.org/abstracts/180165/who-am-i-at-work-work-identity-formation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/180165.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">306</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13801</span> Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrei%20Bogdan%20Stanescu">Andrei Bogdan Stanescu</a>, <a href="https://publications.waset.org/abstracts/search?q=Laura%20Diaconescu"> Laura Diaconescu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management" title="identity and access management">identity and access management</a>, <a href="https://publications.waset.org/abstracts/search?q=passwordless%20authentication" title=" passwordless authentication"> passwordless authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=zero-trust%20security" title=" zero-trust security"> zero-trust security</a> </p> <a href="https://publications.waset.org/abstracts/168929/implementing-zero-trust-security-with-passwordless-authentication-gateways-for-privacy-oriented-organizations-using-keycloak" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168929.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13800</span> Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Mwangi">Samuel Mwangi</a>, <a href="https://publications.waset.org/abstracts/search?q=Josephine%20K.%20Mule"> Josephine K. Mule</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=facial%20recognition" title="facial recognition">facial recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a> </p> <a href="https://publications.waset.org/abstracts/127591/facial-recognition-technology-in-institutions-of-higher-learning-exploring-the-use-in-kenya" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">125</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13799</span> Comparison of Blockchain Ecosystem for Identity Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20S.%20Suganya">K. S. Suganya</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Nedunchezhian"> R. Nedunchezhian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=consensus%20protocols" title=" consensus protocols"> consensus protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20theft" title=" identity theft"> identity theft</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20identity%20management" title=" digital identity management"> digital identity management</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=self-sovereign%20identity" title=" self-sovereign identity"> self-sovereign identity</a> </p> <a href="https://publications.waset.org/abstracts/152379/comparison-of-blockchain-ecosystem-for-identity-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152379.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13798</span> IAM Smart – A Sustainable Way to Reduce Plastics in Organizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Krithika%20Kumaragurubaran">Krithika Kumaragurubaran</a>, <a href="https://publications.waset.org/abstracts/search?q=Mannu%20Thareja"> Mannu Thareja</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Saving our planet Earth is the responsibility of every human being. Global warming and carbon emissions are killing our planet. We must adopt sustainable practices to give our future generations an equal opportunity to enjoy this planet Earth, our home. One of the most used unsustainable materials is plastic. Plastics are used everywhere. They are cheap, durable, strong, waterproof, non-corrosive with a long life. So longthat it makes plastic unsustainable. With this paper, we want to bring awareness on the usage of plastic in the organizations and how to reduce it by adopting sustainable practices powered by technology. We have taken a case study on the usage of photo ID cards, which are commonly used for authentication and authorization. These ID cards are used by employees or visitors to get access to the restricted areas inside the office buildings. The scale of these plastic cards can be in thousands for a bigger organization. This paper proposes smart alternatives to Identity and Access Management (IAM) which could replace the traditional method of using plastic ID cards. Further, the proposed solution is secure with multi-factor authentication (MFA), cost effective as there is no need to manage the supply chain of ID cards, provides instant IAM with self-service, and has the convenience of smart phone. Smart IAM is not only user friendly however also environment friendly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sustainability" title="sustainability">sustainability</a>, <a href="https://publications.waset.org/abstracts/search?q=reduce%20plastic" title=" reduce plastic"> reduce plastic</a>, <a href="https://publications.waset.org/abstracts/search?q=IAM%20%28Identity%20and%20Access%20Management%29" title=" IAM (Identity and Access Management)"> IAM (Identity and Access Management)</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-factor%20authentication" title=" multi-factor authentication"> multi-factor authentication</a> </p> <a href="https://publications.waset.org/abstracts/153407/iam-smart-a-sustainable-way-to-reduce-plastics-in-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153407.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13797</span> Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Meet%20Shah">Meet Shah</a>, <a href="https://publications.waset.org/abstracts/search?q=Ankita%20Aditya"> Ankita Aditya</a>, <a href="https://publications.waset.org/abstracts/search?q=Dhruv%20Bindra"> Dhruv Bindra</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20S.%20Omkar"> V. S. Omkar</a>, <a href="https://publications.waset.org/abstracts/search?q=Aashruti%20Seervi"> Aashruti Seervi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized%20system" title=" decentralized system"> decentralized system</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprint%20impression" title=" fingerprint impression"> fingerprint impression</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20management" title=" identity management"> identity management</a>, <a href="https://publications.waset.org/abstracts/search?q=iris%20scan" title=" iris scan"> iris scan</a> </p> <a href="https://publications.waset.org/abstracts/118996/providing-a-secure-reliable-and-decentralized-document-management-solution-using-blockchain-by-a-virtual-identity-card" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118996.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13796</span> Student Records Management System Using Smart Cards and Biometric Technology for Educational Institutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Patrick%20O.%20Bobbie">Patrick O. Bobbie</a>, <a href="https://publications.waset.org/abstracts/search?q=Prince%20S.%20Attrams"> Prince S. Attrams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent times, the rapid change in new technologies has spurred up the way and manner records are handled in educational institutions. Also, there is a need for reliable access and ease-of use to these records, resulting in increased productivity in organizations. In academic institutions, such benefits help in quality assessments, institutional performance, and assessments of teaching and evaluation methods. Students in educational institutions benefit the most when advanced technologies are deployed in accessing records. This research paper discusses the use of biometric technologies coupled with smartcard technologies to provide a unique way of identifying students and matching their data to financial records to grant them access to restricted areas such as examination halls. The system developed in this paper, has an identity verification component as part of its main functionalities. A systematic software development cycle of analysis, design, coding, testing and support was used. The system provides a secured way of verifying student’s identity and real time verification of financial records. An advanced prototype version of the system has been developed for testing purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biometrics" title="biometrics">biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=smartcards" title=" smartcards"> smartcards</a>, <a href="https://publications.waset.org/abstracts/search?q=identity-verification" title=" identity-verification"> identity-verification</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprints" title=" fingerprints"> fingerprints</a> </p> <a href="https://publications.waset.org/abstracts/17960/student-records-management-system-using-smart-cards-and-biometric-technology-for-educational-institutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17960.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13795</span> Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdulrahman%20Yarali">Abdulrahman Yarali</a>, <a href="https://publications.waset.org/abstracts/search?q=Machica%20McClain"> Machica McClain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CPS" title="CPS">CPS</a>, <a href="https://publications.waset.org/abstracts/search?q=IAM" title=" IAM"> IAM</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=AI" title=" AI"> AI</a>, <a href="https://publications.waset.org/abstracts/search?q=ML" title=" ML"> ML</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=models" title=" models"> models</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a> </p> <a href="https://publications.waset.org/abstracts/191247/identity-and-access-management-for-medical-cyber-physical-systems-new-technology-and-security-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191247.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13794</span> The Impact of Type Two Diabetes and Comorbid Conditions on Self-Identity and Self-Management Practices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Virginia%20Maskill">Virginia Maskill</a>, <a href="https://publications.waset.org/abstracts/search?q=Philippa%20Seaton"> Philippa Seaton</a>, <a href="https://publications.waset.org/abstracts/search?q=Marie%20Crowe"> Marie Crowe</a>, <a href="https://publications.waset.org/abstracts/search?q=Maree%20Inder"> Maree Inder</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A diagnosis of a chronic condition, including Type 2 diabetes can significantly impact an individual’s self-identity which in turn can have considerable implications on how they adapt to, and self-manage their condition. This paper reports on the findings from a qualitative PhD study of forty participants diagnosed with Type 2 diabetes mellitus and comorbid conditions. The primary objective of the study explored the impact conditions had on self-identity and the relationship with self-management practices. Participants were recruited from a larger study which explored the effectiveness of a therapeutic intervention on glycemic control. Interviews were audio-recorded, transcribed verbatim and analysed utilising a narrative thematic analysis methodological approach including a transitional conceptual framework. The majority of participants experienced a loss of their normal self and struggled to integrate diabetes and comorbid conditions into their self-identity. Acceptance, knowledge and integration of conditions were often found to directly influence self-management practices with individuals commonly experiencing four transitional phases from the onset of diagnosis. Successful negotiation of these four phases was influenced by a range of variables which also impacted on an individual’s self-identity and in turn their self-management practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comorbidity" title="comorbidity">comorbidity</a>, <a href="https://publications.waset.org/abstracts/search?q=type%20two%20diabetes" title=" type two diabetes"> type two diabetes</a>, <a href="https://publications.waset.org/abstracts/search?q=self-identity" title=" self-identity"> self-identity</a>, <a href="https://publications.waset.org/abstracts/search?q=self-management" title=" self-management "> self-management </a> </p> <a href="https://publications.waset.org/abstracts/63811/the-impact-of-type-two-diabetes-and-comorbid-conditions-on-self-identity-and-self-management-practices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13793</span> Legal Means for Access to Information Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sameut%20Bouhaik%20Mostafa">Sameut Bouhaik Mostafa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information Act is the Canadian law gives the right of access to information for the institution of government. It declares the availability of government information to the public, but that exceptions should be limited and the necessary right of access to be specific, and also states the need to constantly re-examine the decisions on the disclosure of any government information independently from the government. By 1982, it enacted a dozen countries, including France, Denmark, Finland, Sweden, the Netherlands and the United States (1966) newly legally to access the information. It entered access to Canadian information into force of the Act of 1983, under the government of Pierre Trudeau, allowing Canadians to recover information from government files, and the development of what can be accessed from the information, and the imposition of timetables to respond. It has been applied by the Information Commissioner in Canada. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=law" title="law">law</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=management" title=" management"> management</a>, <a href="https://publications.waset.org/abstracts/search?q=legal" title=" legal"> legal</a> </p> <a href="https://publications.waset.org/abstracts/41230/legal-means-for-access-to-information-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13792</span> Access to Education and Adopted Identity of the Rohingya Amid Government Restrictions in Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ishrat%20Zakia%20Sultana">Ishrat Zakia Sultana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The consistent persecution, ethnic cleansing, and genocide against the Rohingya in Burma resulted four major influxes of the Rohingya people to the neighboring country Bangladesh. After the latest influx of October 2016 and August 2017, the total number of Rohingya in Bangladesh stands somewhere between 900,000 to over one million, placing Bangladesh much ahead with the number of refugees compared to Dadaab and Kakuma in Kenya, Bidibidi in Uganda and Zaatari in Jordan. While Bangladesh received recognition and appreciation for receiving a huge number of the Rohingya, one of the fundamental human rights of the Rohingya – education – has never been fulfilled in Bangladesh. The Ministry of Disaster Management and Relief of the government of Bangladesh has been looking after the Rohingya and managing various programs for the Rohingya. On its website, the Ministry claims that it provides the basic supports/services to the Rohingya, including providing education. In practice, however, education for the Rohingya include only the provisions for registered Rohingya refugees – who are a very small number of populations among the entire Rohingya hosted in Bangladesh – and that is only up to grade 7 within the registered camps at Teknaf and Ukhia of Cox’s Bazar district of the country. There is no answer of the question, ‘What’s next’? Although refugees in Canada, Sudan, Turkey and other countries have been allowed to go to mainstream schools, Rohingya refugees in Bangladesh are not allowed to do so legally. Due to the lack of proof of nationality of the Rohingya, the government of Bangladesh imposes restrictions on their access to Bangladeshi schools. However, despite their vulnerability and statelessness, many Rohingyas are desperate to pursue education outside the camps and find their own way not only within Cox’s Bazar but also even in the capital city of the country. But they must hide their refugee identity to accomplish this. My research aims to explore how they manage to get admission amid government restrictions on their access to education in the mainstream institutions in Bangladesh. It will reveal how Rohingya people use adopted identity to get access to education in Bangladesh, and how they apply their own techniques to achieve their goals without having government approved identity. This research examined the strategies the Rohingya applied to manage documents related to their identity to ensure their admission to Bangladeshi education institutions – in schools, colleges, and universities. The research employed a qualitative approach. It used semi structured individual interviews and Focused Group Discussions (FGDs) with 20 male and female Rohingya refugees who are 18 years old and above, and have enrolled in Bangladeshi education institutions with adopted identity. Also I interviewed 5 local community members and policy makers to understand their perceptions and roles in this process. The findings of this research will allow the policy makers to rethink the outcomes of the restrictions on Rohingya’s education in Bangladesh, the ramifications of the denial of Rohingya’s access to education, and initiate policy dialogues on how to allow Rohingya refugees to pursue education in Bangladesh in legal way. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rohingya" title="Rohingya">Rohingya</a>, <a href="https://publications.waset.org/abstracts/search?q=Refugee" title=" Refugee"> Refugee</a>, <a href="https://publications.waset.org/abstracts/search?q=Bangladesh" title=" Bangladesh"> Bangladesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Education" title=" Education"> Education</a> </p> <a href="https://publications.waset.org/abstracts/175840/access-to-education-and-adopted-identity-of-the-rohingya-amid-government-restrictions-in-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175840.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13791</span> Visual Identity Components of Tourist Destination</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Petra%20Barisic">Petra Barisic</a>, <a href="https://publications.waset.org/abstracts/search?q=Zrinka%20Blazevic"> Zrinka Blazevic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the world of modern communications, visual identity has predominant influence on the overall success of tourist destinations, but despite of these, the problem of designing thriving tourist destination visual identity and their components are hardly addressed. This study highlights the importance of building and managing the visual identity of tourist destination, and based on the empirical study of well-known Mediterranean destination of Croatia analyses three main components of tourist destination visual identity; name, slogan, and logo. Moreover, the paper shows how respondents perceive each component of Croatia’s visual identity. According to study, logo is the most important, followed by the name and slogan. Research also reveals that Croatian economy lags behind developed countries in understanding the importance of visual identity, and its influence on marketing goal achievements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=components%20of%20visual%20identity" title="components of visual identity">components of visual identity</a>, <a href="https://publications.waset.org/abstracts/search?q=Croatia" title=" Croatia"> Croatia</a>, <a href="https://publications.waset.org/abstracts/search?q=tourist%20destination" title=" tourist destination"> tourist destination</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20identity" title=" visual identity "> visual identity </a> </p> <a href="https://publications.waset.org/abstracts/6602/visual-identity-components-of-tourist-destination" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6602.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1050</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13790</span> The Impact of Personal Identity on Self-Esteem among Muslim Adolescents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nadia%20Ayub">Nadia Ayub</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of the study was to explore the impact of personal identity on self-esteem among adolescents. Two hypotheses were tested in the study, i.e., personal identity effects on self-esteem; and gender difference in the variables of personal identity and self-esteem. The total of 300 (150 female; 150 male) adolescents participated in the study. Personal identity scale (Ayub, N., In Press), and self-esteem scale (Rosenberg, 1985) were administered. The findings of the study suggest that positive personal identity impact on self-esteem and gender difference was found on the variables of personal identity and self-esteem. In conclusion, the results of the study are beneficial for researchers, policymakers, psychologists. The strong positive personal identity and self-esteem help in healthy mental development not only in adolescence but throughout the life of individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20identity" title="personal identity">personal identity</a>, <a href="https://publications.waset.org/abstracts/search?q=self-esteem" title=" self-esteem"> self-esteem</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescents" title=" adolescents"> adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20psychology" title=" positive psychology"> positive psychology</a> </p> <a href="https://publications.waset.org/abstracts/103746/the-impact-of-personal-identity-on-self-esteem-among-muslim-adolescents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103746.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">401</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13789</span> The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lorna%20Goulden">Lorna Goulden</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai%20M.%20Hermsen"> Kai M. Hermsen</a>, <a href="https://publications.waset.org/abstracts/search?q=Jari%20Isohanni"> Jari Isohanni</a>, <a href="https://publications.waset.org/abstracts/search?q=Mirko%20Ross"> Mirko Ross</a>, <a href="https://publications.waset.org/abstracts/search?q=Jef%20Vanbockryck"> Jef Vanbockryck</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dentity" title="dentity">dentity</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=self-sovereign" title=" self-sovereign"> self-sovereign</a>, <a href="https://publications.waset.org/abstracts/search?q=disposable%20identity" title=" disposable identity"> disposable identity</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20toolkit" title=" privacy toolkit"> privacy toolkit</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralised%20identity" title=" decentralised identity"> decentralised identity</a>, <a href="https://publications.waset.org/abstracts/search?q=verifiable%20credential" title=" verifiable credential"> verifiable credential</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20driven%20business" title=" data driven business"> data driven business</a>, <a href="https://publications.waset.org/abstracts/search?q=PETs" title=" PETs"> PETs</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPRdentity" title=" GDPRdentity"> GDPRdentity</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=self-sovereign" title=" self-sovereign"> self-sovereign</a>, <a href="https://publications.waset.org/abstracts/search?q=disposable%20identity" title=" disposable identity"> disposable identity</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20toolkit" title=" privacy toolkit"> privacy toolkit</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralised%20identity" title=" decentralised identity"> decentralised identity</a>, <a href="https://publications.waset.org/abstracts/search?q=verifiable%20credential" title=" verifiable credential"> verifiable credential</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20driven%20business" title=" data driven business"> data driven business</a>, <a href="https://publications.waset.org/abstracts/search?q=PETs" title=" PETs"> PETs</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPRI" title=" GDPRI"> GDPRI</a> </p> <a href="https://publications.waset.org/abstracts/136294/the-disposable-identities-enabling-trust-by-design-to-build-sustainable-data-driven-value" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13788</span> Explore Customers' Perceptions of U.K. Fast Fashion Retailers' Identities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranis%20Cheng">Ranis Cheng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corporate identity is an asset of a company that is unique, valuable and provides a source of competitive advantage. This research taking a holistic view to explore all dimensions of corporate identity and influence of each on customers’ shopping experience in the fast fashion retail sector in the U.K. Unfortunately these issues have not been explored sufficiently in the extant literature, especially in the area of the identity gap. To date, there is still a lack of empirical research on corporate identity, especially in the retail sector despite the importance of the concept to all organisations. Furthermore, although customer group is one of the essential audiences of organisations and the importance of customers in corporate identity management cannot be ignored, to date limited studies have been conducted in order to understand how customers interpret and perceive corporate identity (perceived identity). Therefore, this research investigates customers’ perceptions of corporate identity in the fast fashion retail sector. 1) To explore customers’ perceptions of fast fashion retailers’ corporate identities; 2) To uncover the important constructs of corporate identity which contribute to the U.K. fast fashion retail sector. 40 semi-structured interviews with the fast fashion consumers have been carried out to identify their perceptions of fast fashion retailers' corporate identities. Secondary research on retailers' websites and press releases have been evaluated to identify their desired corporate identities. The findings have revealed that there are significant gaps between how fast fashion retailers present their identities and how their consumers perceive them. This has posed customers' negative perceptions towards the retailers and their shopping experience as a whole. This study has studied how the corporate identity constructs could be applied in the fashion context and has helped retailers to shed lights on how to minimise the gap between desired and perceived identity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corporate%20identity" title="corporate identity">corporate identity</a>, <a href="https://publications.waset.org/abstracts/search?q=fast%20fashion" title=" fast fashion"> fast fashion</a>, <a href="https://publications.waset.org/abstracts/search?q=fashion%20retailing" title=" fashion retailing"> fashion retailing</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20gap" title=" identity gap"> identity gap</a> </p> <a href="https://publications.waset.org/abstracts/83265/explore-customers-perceptions-of-uk-fast-fashion-retailers-identities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83265.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13787</span> Competitiveness and Pricing Policy Assessment for Resilience Surface Access System at Airports</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dimitrios%20J.%20Dimitriou">Dimitrios J. Dimitriou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Considering a worldwide tendency, air transports are growing very fast and many changes have taken place in planning, management and decision making process. Given the complexity of airport operation, the best use of existing capacity is the key driver of efficiency and productivity. This paper deals with the evaluation framework for the ground access at airports, by using a set of mode choice indicators providing key messages towards airport’s ground access performance. The application presents results for a sample of 12 European airports, illustrating recommendations to define policy and improve service for the air transport access chain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=airport%20ground%20access" title="airport ground access">airport ground access</a>, <a href="https://publications.waset.org/abstracts/search?q=air%20transport%20chain" title=" air transport chain"> air transport chain</a>, <a href="https://publications.waset.org/abstracts/search?q=airport%20access%20performance" title=" airport access performance"> airport access performance</a>, <a href="https://publications.waset.org/abstracts/search?q=airport%20policy" title=" airport policy"> airport policy</a> </p> <a href="https://publications.waset.org/abstracts/56760/competitiveness-and-pricing-policy-assessment-for-resilience-surface-access-system-at-airports" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">371</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13786</span> Analysis of Strategies to Reduce Patients’ Disposition Holding Time from Emergency Department to Ward</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kamonwat%20Suksumek">Kamonwat Suksumek</a>, <a href="https://publications.waset.org/abstracts/search?q=Seeronk%20Prichanont"> Seeronk Prichanont</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access block refers to the situation where Emergency Department (ED) patients requiring hospital admission spend an unreasonable holding time in an ED because their access to a ward is blocked by the full utilization of the ward’s beds. Not only it delays the proper treatments required by the patients, but access block is also the cause of ED’s overcrowding. Clearly, access block is an inter-departmental problem that needs to be brought to management’s attention. This paper focuses on the analysis of strategies to address the access block problem, both in the operational and intermediate levels. These strategies were analyzed through a simulation model with a real data set from a university hospital in Thailand. The paper suggests suitable variable levels for each strategy so that the management will make the final decisions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20block" title="access block">access block</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20department" title=" emergency department"> emergency department</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20system%20analysis" title=" health system analysis"> health system analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a> </p> <a href="https://publications.waset.org/abstracts/8655/analysis-of-strategies-to-reduce-patients-disposition-holding-time-from-emergency-department-to-ward" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">409</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13785</span> The Entrepreneurial Journey of Students: An Identity Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Marchand">J. Marchand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> While university dropout entrepreneurs are celebrated in the practitioner literature, students’ intentions of becoming entrepreneurs have increasingly been the focus of student entrepreneur studies. However, students who are already running a business have rarely been examined. The experience of these students is a phenomenon that requires further research. Entrepreneurial identity represents a gap in the organisational studies literature. This paper utilises studentpreneurs’ self-narratives of their entrepreneurial journey. More specifically, the aim is to answer the following question: what are the types of identity work that individuals go through to build their entrepreneurial identity during that journey? Through long interviews, this paper studies the lived experience of 14 studentpreneurs who have achieved $54,000 in income and who participated publicly in entrepreneurial competitions. A general inductive analysis is performed on their narrative. With its focus on the journey, this paper makes a contribution to the literature on identity work and the entrepreneurial journey. A key contribution is the study of identity work on the journey to becoming an (established) entrepreneur in contrast to routine identity work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=entrepreneurial%20identity" title="entrepreneurial identity">entrepreneurial identity</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20entrepreneur" title=" student entrepreneur"> student entrepreneur</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20work" title=" identity work"> identity work</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20entrepreneurship" title=" student entrepreneurship"> student entrepreneurship</a> </p> <a href="https://publications.waset.org/abstracts/79662/the-entrepreneurial-journey-of-students-an-identity-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">665</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13784</span> Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Nalini">N. Nalini</a>, <a href="https://publications.waset.org/abstracts/search?q=Bhanu%20Prakash%20Gopularam"> Bhanu Prakash Gopularam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20confidentiality" title="data confidentiality">data confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20based%20cryptography" title=" identity based cryptography"> identity based cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20communication" title=" secure communication"> secure communication</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20stack%20key%20stone" title=" open stack key stone"> open stack key stone</a>, <a href="https://publications.waset.org/abstracts/search?q=token%20scoping" title=" token scoping"> token scoping</a> </p> <a href="https://publications.waset.org/abstracts/8920/data-confidentiality-in-public-cloud-a-method-for-inclusion-of-id-pkc-schemes-in-openstack-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8920.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13783</span> The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shanshan%20Zhou">Shanshan Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=Massimo%20Battaglia"> Massimo Battaglia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20identity" title="community identity">community identity</a>, <a href="https://publications.waset.org/abstracts/search?q=disaster" title=" disaster"> disaster</a>, <a href="https://publications.waset.org/abstracts/search?q=identity" title=" identity"> identity</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20learning" title=" organizational learning"> organizational learning</a> </p> <a href="https://publications.waset.org/abstracts/87434/the-role-of-organizational-identity-in-disaster-response-recovery-and-prevention-a-case-study-of-an-italian-multi-utility-company" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87434.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">732</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13782</span> The Potential of Walkability in Evoking People’s Perception of Place Identity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Shinbira">Ibrahim Shinbira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In urban design, much has been discussed on the significance of the physical qualities in creating the place identity; however, the role of walkability as a physical quality that can evokes people's perception of place identity has not been adequately explored. This paper is based on the part findings of a doctoral research examining place identity in the city centre of Misurata, Libya. A number of 176 questionnaire and 23 face-to-face interviews were conducted with residents of the city to investigate physical qualities of place identity that evoked resident's perception. The finding demonstrates that walkability within the city centre is strong and it influences the users’ perception on the place identity. These were regarded as very important in sustaining the socio-cultural values, enjoyment, options, vitality and comfort. The paper concludes by establishing that walkability has a substantial contribution to the place identity, therefore should be considered in the design of urban places specifically the redevelopment one. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=perception" title="perception">perception</a>, <a href="https://publications.waset.org/abstracts/search?q=walkability" title=" walkability"> walkability</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20environment" title=" physical environment"> physical environment</a>, <a href="https://publications.waset.org/abstracts/search?q=place%20identity" title=" place identity"> place identity</a>, <a href="https://publications.waset.org/abstracts/search?q=residents" title=" residents"> residents</a> </p> <a href="https://publications.waset.org/abstracts/41167/the-potential-of-walkability-in-evoking-peoples-perception-of-place-identity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">626</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13781</span> A Robust Implementation of a Building Resources Access Rights Management System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eugen%20Neagoe">Eugen Neagoe</a>, <a href="https://publications.waset.org/abstracts/search?q=Victor%20Balanica"> Victor Balanica</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20building%20controller" title="smart building controller">smart building controller</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20security" title=" software security"> software security</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20rights" title=" access rights"> access rights</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20authorization" title=" access authorization"> access authorization</a> </p> <a href="https://publications.waset.org/abstracts/25907/a-robust-implementation-of-a-building-resources-access-rights-management-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25907.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13780</span> The Story of a Spoiled Identity: Blogging on Disability and Feminity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anna%20%C5%9Alebioda">Anna Ślebioda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper discusses intersections between disability and femininity. Their imbrication may impede negotiation of identity. The analysis of a blog of a women with disability aims to prove this hypothesis. It involves 724 entries written in the span of six years. The conceptual framework for the considerations constitute the concepts of stigma and spoiled identity, and overlapping elements of femininity and disability. The empirical part comprises content analysis. It allows to locate the narrative on femininity and disability within the dimensions of imbricated categories described in the theoretical part. The results demonstrate aspects to consider in further research on identity in women with disabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disability" title="disability">disability</a>, <a href="https://publications.waset.org/abstracts/search?q=femininity" title=" femininity"> femininity</a>, <a href="https://publications.waset.org/abstracts/search?q=spoiled%20identity" title=" spoiled identity"> spoiled identity</a>, <a href="https://publications.waset.org/abstracts/search?q=stigma" title=" stigma"> stigma</a> </p> <a href="https://publications.waset.org/abstracts/15031/the-story-of-a-spoiled-identity-blogging-on-disability-and-feminity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15031.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">665</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=460">460</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=461">461</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=identity%20and%20access%20management&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>