232,561 research outputs found

    A Safety Management Model for FAR 141 Approved Flight Schools

    Get PDF
    The Safety Management Annex (Annex 19), which became applicable in November 2013, consolidates safety management provisions previously contained in six other International Civil Aviation Organization (ICAO) Annexes, and will serve as a resource for overarching state safety management responsibilities. Through Annex 19, ICAO has required that its member states develop and implement safety management systems (SMS) to improve safety. This mandate includes an approved training organization that is exposed to aviation safety risks. In 2015, the FAA published AC 120-92B to provide guidance material for certificate holders operating under FAR 121, to implement and maintain an SMS. This AC may also be used by other aviation service providers interested in voluntarily developing an SMS based on the requirements in 14 Code of Federal Regulations Part 5 (14 CFR Part 5). There are numerous reasons for SMS implementation going beyond simple compliance with international or national guidelines. The most important of these is safety enhancement, because it is an intrinsic requirement of the aviation system. There is a vast body of literature regarding SMS, but none of it suggests a model to a specific service provider. The implementation of an SMS model tailored to FAR 141 approved flight schools has the strong potential to yield safety enhancement, through a structured management system to control risks in operation. The purpose of this study is to develop a safety management model for FAR 141 operators, based on the ICAO SMS outlined in Annex 19, and current FAA requirements and safety protocols, as outlined in AC 120-92B

    Delaware Public Benefit Corporations 90 Days Out: Who\u27s Opting In?

    Get PDF
    The Delaware legislature recently shocked the sustainable business and social enterprise sector. On August 1, 2013, amendments to the Delaware General Corporation Law became effective, allowing entities to incorporate as a public benefit corporation, a new hybrid corporate form that requires managers to balance shareholders’ financial interests with the besat interests of stakeholders materially affected by the corporation’s conduct, and produce a public benefit. For a state that has long ruled U.S. corporate law and whose judiciary has frequently invoked shareholder primacy, the adoption of the public benefit corporation form has been hailed as a victory by sustainable business and social enterprise proponents. And yet, the significance of this victory in Delaware is premature. Information about the number and types of companies opting into the public benefit corporation form has been preliminary and speculative. This article fills that gap. In this article, I present original descriptive research on the 53 public benefit corporations that incorporated or converted in Delaware within the first three months of the amended corporate statute’s effectiveness. Based on publicly available documents and information, I analyze these first public benefit corporations with respect to the following characteristics: (1) year of incorporation as a proxy for corporate age, (2) industry, (3) charitable activities, (4) identified specific public benefit, and (5) adoption of model legislation options not required by the Delaware statute. My analysis returns the following results: 75% of public benefit corporations are likely new corporations in their early stages of operation; 32% of public benefit corporations provide professional services (e.g., consulting, legal, financial, architectural design), the technology, healthcare, and education sectors each represent 11% of public benefit corporations, 10% of public benefit corporations produce consumer retail products; approximately 40% of public benefit corporations could have alternatively incorporated as a charitable nonprofit exempt from federal income taxes. This article discusses these and other findings to assist in understanding the public benefit corporation and how it has been employed within the first three months of its adoption

    Deploying Virtual Machines on Shared Platforms

    Get PDF
    In this report, we describe mechanisms for secure deployment of virtual machines on shared platforms looking into a telecommunication cloud use case, which is also presented in this report. The architecture we present focuses on the security requirements of the major stakeholders’ part of the scenario we present. This report comprehensively covers all major security aspects including different security mechanisms and protocols, leveraging existing standards and state-of-the art wherever applicable. In particular, our architecture uses TCG technologies for trust establishment in the deployment of operator virtual machines on shared resource platforms. We also propose a novel procedure for securely launching and cryptographically binding a virtual machine to a target platform thereby protecting the operator virtual machine and its related credentials

    Beyond the Hype: On Using Blockchains in Trust Management for Authentication

    Full text link
    Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.Comment: A version of this paper was published in IEEE Trustcom. http://ieeexplore.ieee.org/document/8029486

    Fit for eLearning? Trainings for eLearning competencies

    Get PDF
    In: conference proceedings, edulearn 2010, Barcelona 5.-7.7.2010. In order to design and tutor online and blended learning courses, trainers and teachers need to obtain appropriate qualification. In this paper different competency models for online teaching which developed in Germany 2005 – 2008 will be addressed as well as different settings to qualify teachers and trainers appropriately. Finally the results of an evaluation of two different training settings will be presented in order to compare an in house versus a transorganisational training program

    Using security patterns for modelling security capabilities in a Grid OS

    Get PDF
    • …
    corecore