Percorrer por autor "Santos, Leonel"
A mostrar 1 - 6 de 6
Resultados por página
Opções de ordenação
- O curriculum DeGóis : um e-Portefólio científicoPublication . Tenreiro De Magalhaes, Sérgio; Santos, Leonel; Amaral, LuísA plataforma DeGóis, plataforma nacional de ciência e tecnologia, é uma estrutura sistémica que permite ao utilizador uma gestão eficiente da informação constante no seu Curriculum Vitae (CV). Devido aos esforços no sentido de assegurar a interoperabilidade com outros sistemas e a integração com os repositórios digitais, o CV transformou-se naturalmente num portal para a descrição dos trabalhos efectuados e daí para os próprios trabalhos. Assim, o DeGóis representa também uma plataforma de e-portefólios científicos e, portanto, este artigo apresenta a sua arquitectura e os seus princípios, por forma a demonstrar que, pela sua natureza, o currículo de actividade científica tal como ele é implementado nesta plataforma, incluindo não só uma listagem do histórico do investigador mas também ligações às próprias produções científicas e técnicas disponíveis numa rede de partilha de conhecimento, é um e-Portefólio, já que se enquadra no conceito aceite pelo consórcio EIfEL (European Institute for E-Learning) ao representar uma colecção autêntica e diversa de indicadores de parte do conhecimento e capacidades adquiridos ao longo do tempo pelo investigador e sobre os quais houve reflexão de uma comunidade (graças ao peer review e aos processos de partilha de conhecimento científico) destinando-se à consulta pelo próprio, pela comunidade de utilizadores que partilhem os mesmos interesses científicos e pelas empresas.
- Keystroke Dynamic and Graphical Authentication SystemsPublication . Tenreiro De Magalhaes, Sérgio; Santos, Leonel; Revett, Kenneth; Santos, HenriqueIn information systems, authentication involves, traditionally, sharing a secret with the authenticating entity and presenting it whenever a confirmation of the user’s identity is needed. In the digital era, that secret is commonly a user name and password pair and/or, sometimes, a biometric feature. Both present difficulties of different kinds once the traditional user name and password are no longer enough to protect these infrastructures, the privacy of those who use it, and the confidentiality of the information, having known vulnerabilities, and the second has many issues related to ethical and social implications of its use. This chapter discusses two behavior biometric technologies.
- Proceedings of the 9th International Workshop on Information Retrieval on Current Research Information SystemsPublication . Tenreiro De Magalhaes, Sérgio; Santos, Leonel; Stempfhuber, Maximilian; Fugl, Liv; Alroe, BoThe recognition of entities and their relationships in document collections is an important step towards the discovery of latent knowledge as well as to support knowledge management applications. The challenge lies on how to extract and correlate entities, aiming to answer key knowledge management questions, such as; who works with whom, on which projects, with which customers and on what research areas. The present work proposes a knowledge mining approach supported by information retrieval and text mining tasks in which its core is based on the correlation of textual elements through the LRD (Latent Relation Discovery) method. Our experiments show that LRD outperform better than other correlation methods. Also, we present an application in order to demonstrate the approach over knowledge management scenarios.
- The Georgia’s CyberwarPublication . Rios, Maria José; Tenreiro De Magalhaes, Sérgio; Santos, Leonel; Jahankhani, HamidThe evolution of the technology and the changes in the organization and control of the critical infrastructures of the nations are creating a new combat front. The case studied in this paper refers to the attack to the information systems of the Georgian organizations that occurred at the same time as the conventional military operation executed by the Russian army in the South Ossetia in August 2008. The data collected and presented in this paper showed the existence of a poorly organized network, related to Russian criminal organizations, raising the possibility of this case being an instance of the Maoist concept of the “People’s war”. This paper will also show that, despite the unsophisticated resources used in the attacks and to promote them, the damages in the selected targets were considerable.
- The People’s Republic of China: the emerging cyberpowerPublication . Tenreiro De Magalhaes, Sérgio; Rios, Maria José; Santos, Leonel; Jahankhani, HamidThe People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20 th century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military capability or even to create casualties. This paper presents an overview on the known facts on this issue, concluding on an urgent need to improve the security technologies and policies of the digital systems used by the governments, namely in what concerns to authentication processes and the need for occidental countries to prepare personnel with knowledge on the culture, on the language and on the thought of the PRC, so that they can be ready for the next steps of this (re)emerging nation.
- Using technology to overcome the password's contradictionPublication . Tenreiro De Magalhaes, Sérgio; Revett, Kenneth; Santos, Henrique; Santos, Leonel; Oliveira, André; Ariza, CésarThe traditional approach to security has been the use of passwords. They provide the system with a barrier to access what was quite safe in the analogical world. The digital era provided the means to easily try thousands of passwords in a short period of time and now the password schema is no longer safe. Now it suffers of the password’s contradiction: the fact that it requires both simplicity and complexity to be usable and safe. Being so, new technologies are required that can preserve the easiness of use, but can provide stronger authentication processes. This chapter presents the latest advances in three technologies that can be used, unaided or together, to improve the safety of user/password schemas without significant changes in the protected information system architecture, despite the human factors that traditionally reduce the security of those systems. The presented technologies are Keystroke Dynamics, Graphical Authentication and Pointer Dynamic.
