|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
University of Cambridge > Talks.cam > Computer Laboratory Digital Technology Group (DTG) Meetings > (Research) Bluetooth Tracking without Discoverability / (Skills) Deploying web user authentication with Shibboleth
(Research) Bluetooth Tracking without Discoverability / (Skills) Deploying web user authentication with Shibboleth
If you have a question about this talk, please contact Andrew Rice.
Research: Bluetooth Tracking without Discoverability, Simon Hay
Outdoor location-based services are now prevalent due to advances in mobile technology and GPS . Indoors, however, even coarse location remains unavailable. Bluetooth has been identified as a potential location technology that mobile consumer devices already support,easing deployment and maintenance. However, Bluetooth tracking systems to date have relied on the Bluetooth inquiry mode to constantly scan for devices. This process is very slow and can be a security and privacy risk. In this paper we investigate an alternative: connection-based tracking. This permits tracking of a previously identified handset within a field of fixed base stations. Proximity is determined by creating and monitoring low-level Bluetooth connections that do not require authorisation. We investigate the properties of the low-level connections both theoretically and in practice, and show how to construct a building-wide tracking system based on this technique. We conclude that the technique is a viable alternative to inquiry-based Bluetooth tracking.
Skills: Deploying web user authentication with Shibboleth, Sören Preibusch
Shibboleth is a set of policies and protocols providing an access control system for web-based resources. It is similar to that currently provided by Raven, but extended and standardised to allow users from multiple organisations to access resources provided by other independent organisations. Compared to Raven, Shibboleth involves a higher implementation effort, yet supports a broader range of platforms for deployment. Service providers can define more fine-grained rules for access control and the identity of authenticated users need not be disclosed (privacy-preserving single-sign on).
This talk is intended for Web authors and developers envisioning to set up user authorisation and authentication. I will briefly review the architecture and underlying Web service infrastructure for Shibboleth and sketch typical deployment scenarios. More prominently, I will share my own experiences in becoming the owner of the first Shibboleth-protected web site in the University.
This talk is part of the Computer Laboratory Digital Technology Group (DTG) Meetings series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsTheoretical, Modelling and Informatics - Chemistry Research Interest Group Cancer Biology 2016 Featured lists
Other talksThe art of sex: genetic exchange in Trypanosoma brucei within the tsetse fly Unlocking the potential of synthetic biology to enhance human health Title TBC On-line estimation of an optimal treatment allocation strategy for the control of white-nose syndrome in ba The focusing neutral helium beam microscope NEMI Wake effects in the ocean - from dolphins to CTDs via western boundary currents