180,275 research outputs found

    Reliable method for Authorized Deduplication by Using Hybrid Cloud Environment

    Get PDF
    Information deduplication is one of vital data compression procedures for eliminating duplicate copies of repeating information and has been broadly utilized as a part of cloud storage to diminish the measure of storage room and spare transmission capacity .To ensure secrecy of delicate information while supporting deduplication, united encryption system has been proposed to scramble the information before out sourcing. For better assurance of information security , primary endeavor is to formally address the issue of approved information deduplication .Unique in relation to conventional deduplication frameworks ,the proposed security display bolsters differential benefits of clients in copy check other than information itself. A few new deduplication developments are displayed supporting approved copy check in a hybrid cloud environments. Security investigation shows that this plan is secure as far as definitions determined in proposed security demonstrate. As a proof of idea, the usage of a model of the proposed approved copy check conspire and additionally the lead testbed tests utilizing the model causes negligible overhead contrasted with ordinary operations

    THE QUALITY ASSURANCE MANAGEMENT OF GRADUATES IN MA’ARIF NU VOCATIONAL HIGH SCHOOL BOBOTSARI AND MUHAMMADIYAH 2 VOCATIONAL HIGH SCHOOL PURBALINGGA

    Get PDF
    A research entitled Quality Assurance Management of Graduates in Ma’aarif NU Vocational High School Bobotsari and Muhammadiyah 2 Vocational High School Purbalingga, has done to find out the formulation of the quality assurance management of graduates, to find out the implementation of the model quality assurance management of graduates, and to find out the evaluation and controlling system the model of the quality assurance management of graduates in Ma’arif NU Vocational High School Bobotsari and Muhammadiyah 2 Vocational High School Purbalingga. The benefits of the research are theoritically expected to contribute ideas for the development of quality assurance management of graduates in vocational high schools. In other words, this study is expected to be a source of discussion and a source of inspiration, and practically, for principals of vocational high school institutions in taking decisions related to the development of vocational high school education institution he leads, as an effort to improve the quality of school management to ensuring the quality of education esspecially quality of the graduates, add knowledge of quality assurance management of graduates. This research was qualitative descriptive research and the subject of the research are principal, vice principal such as curriculum affairs, student affairs, public relations affair, equipments affairs, quality management representative team, teachers, employees and others who can provide information related to the research. This research was conducted using data collection methods such us observation, documentation and interview. The result of research show that Quality assurance management of graduates in Ma'arif NU Vocational High School Bobotsari and muhammadiyah 2 Vocational hig school Purbalingga using the form QMS ISO 9001: 2008, both of using steps according Deming’s 14 Theories to reach quality assurance management of graduates, The assesment of quality assurance management of graduates in Ma’arif NU Vocational High School is through self assesment and external audit. While in Muhammadiyah 2 Vocational High School Purbalingga is through self assesment, fulfillment customer satisfaction, monitoring & measurement, and external audit

    On-line quality assurance of study programmes: EQUASP approach

    Get PDF
    The description of the EQUASP model for quality assurance of study programmes, developed in framework of a TEMPUS project, is introduced. The introduction section contains brief information on the concept of quality and quality assurance of study programmes along with the Tuning approach to the design of study programmes and the standards and guidelines for quality assurance in the European Higher Education Area. The fourth section describes the EQUASP approach to quality assurance and pinpoints the necessary documentation for the quality assurance of study programmes. More specifically, the EQUASP standards for the quality assurance of study programmes are defined, followed with the identification of the fundamental processes for a quality management of study programmes together with the associated quality requirements and expected activities for their accomplishment. The information and data which study programmes need to document in order to provide evidence of the quality of the educational service offered and therefore, to assure their quality, are established. The standards and guidelines constitute the ‘EQUASP Model’ for the quality assurance of study programmes. The fifth section introduces the EQUASP approach for monitoring of quality of study programmes perceived by interested parties (students, graduates, employed graduates and employers).Finally, the sixth section summarizes the objectives already achieved and introduces the activities in progress for the completion of the project according to the established work plan, while the conclusions summarize the benefits of the EQUASP system.Postprint (published version

    Information assurance within supply chains’ structures and processes.

    Get PDF
    Doctoral degree. University of KwaZulu-Natal, Durban.Organisations are challenging the traditional linear-based market model which is characterised by a straight line movement of goods and services. As a result, they are increasingly forming and moving towards a value web of supply chain network that connects a whole ecosystem of trading partners. These networks, which are mostly complex and dynamic, are creating a global market environment in which organisations no longer focus only on their immediate suppliers and customers, but also on the optimization and the smooth flow of information, funds and materials, within their respective direct and remote trading networks. The large number of participants within most supply chain networks has necessitated that these networks be agile and resilient. For supply chain networks to be agile and resilient, and for supply chains’ structures, processes and resources to be synchronized and integrated, the organisations within the supply chain must share information. Hence, in today’s supply chains, interests are moving towards obtaining the most benefits from information. In order to obtain these benefits from information, organisations are making use of information systems and their related technologies to acquire, process and adequately share information. These systems are making it possible for organisations to form strategic partnerships within the supply chain networks. The global market environment is causing supply chains to expand, and the expansion is exposing information to various security vulnerabilities and risks. The exposure of information to different vulnerabilities and risks is forcing trading partners to seek assurance that the information within their supply chain network is adequately protected and also performs as advertised. To understand how the assurance sought by trading partners can be provided, this study investigated information and information systems’ security within supply chains’ structures and processes. The study also investigated how information assurance objectives (i.e. confidentiality, integrity, availability, authentication and non-repudiation) can be achieved optimally within supply chains. Finally, the study proposes an information assurance model, which if adopted by decision makers, could enable them sustain their respective functions and processes within the supply chain network. In order to achieve the objectives of this study, the exploratory design and the case study approach were adopted in this study. The study also adopted the qualitative research method, and hence, semi-structured interviews were conducted, and served as the primary means of data collection. Participants in this study were drawn from two categories of organisations, which are supply chain and logistics organisations, and Information Technology (IT) consulting organisations. Therefore, the purposive sampling method was adopted in this study. An inductive approach was adopted in the analysis of data, and as a result, thematic analysis was adopted as the analysis method. The main outcome of the study is the proposed information assurance model that can enable decision makers sustain their respective functions and processes within the supply chain network
    • …
    corecore