Tinker Bell - Academia.edu (original) (raw)

Tinker Bell

Uploads

Papers by Tinker Bell

Research paper thumbnail of Examination of Relationship Between Leisure Boredom and Leisure Constraints

NWSA Academic Journals, 2017

Research paper thumbnail of Identity Management, Aadhar and Replicated State Machines

Authentication, authorisation and audit are three traditional concerns in building a privilege ma... more Authentication, authorisation and audit are three traditional concerns in building a privilege management infrastructure. Traditionally, authentication is strong and is based on fixed credentials linked to long term stable identity; and audit is linked to authorization via the same fixed credential. Security literature, traditionally has the good principals Alice and Bob with Carol as a system and/or service owner. The conventional approach by Alice or Bob to authenticate Carol using fixed credentials linked to long term stable identity led to compulsive trust relationships between the legitimate users and large parts of the system infrastructure. Trust became a substitute rather a way out or a cover for certain knowledge, which is difficult to gather or share, thus forcing participants involved in any such interaction (with an unknown) to a compulsive relationship called Trust relationship.

Research paper thumbnail of Examination of Relationship Between Leisure Boredom and Leisure Constraints

NWSA Academic Journals, 2017

Research paper thumbnail of Identity Management, Aadhar and Replicated State Machines

Authentication, authorisation and audit are three traditional concerns in building a privilege ma... more Authentication, authorisation and audit are three traditional concerns in building a privilege management infrastructure. Traditionally, authentication is strong and is based on fixed credentials linked to long term stable identity; and audit is linked to authorization via the same fixed credential. Security literature, traditionally has the good principals Alice and Bob with Carol as a system and/or service owner. The conventional approach by Alice or Bob to authenticate Carol using fixed credentials linked to long term stable identity led to compulsive trust relationships between the legitimate users and large parts of the system infrastructure. Trust became a substitute rather a way out or a cover for certain knowledge, which is difficult to gather or share, thus forcing participants involved in any such interaction (with an unknown) to a compulsive relationship called Trust relationship.

Log In