65,236 research outputs found

    PENGELOLAAN SEKOLAH INKLUSI: STUDI MULTI SITUS PADA SEKOLAH ISLAM DI JAWA TIMUR

    Get PDF
    Ā An inclusive school is a school concept that consciously strives to guarantee children's rights and protection for children with special needs to get adequate and responsible access to education. Therefore, in practice, it refers to the principles of good management. The learning process is based on children's needs, a conducive learning climate, a supportive classroom atmosphere, and the priority of fulfilling children's learning rights. This paper examines the management of inclusive schools in Islamic schools in East Java. The aims of this research are: (1). explore forms of inclusive school policies in Islamic schools in East Java; (2). Describe the implementation of the management of inclusive children's schools in Islamic schools in East Java. Researchers used a qualitative approach with a multi-site research type. Data collection techniques consist of observation, interviews, and documentation. Data analysis with three stages; the first stage is data reduction, data presentation, and triangulation. The results of the study show: (1.) The form of policies implemented in the process of managing inclusive children's schools in Islamic schools in East Java is based on the four pillars of the principles of inclusive children's schools, namely non-discrimination, the best interest for children's growth, respect for children and values beliefs originating from religious teachings; (2.) The implementation of the management of inclusive children's schools begins with the stages of situation analysis, equalization of perceptions, organization and formation of a program implementation team.

    Access-rights Analysis in the Presence of Subjects

    Get PDF
    Modern software development and run-time environments, such as Java and the Microsoft .NET Common Language Runtime (CLR), have adopted a declarative form of access control. Permissions are granted to code providers, and during execution, the platform verifies compatibility between the permissions required by a security-sensitive operation and those granted to the executing code. While convenient, configuring the access-control policy of a program is not easy. If a code component is not granted sufficient permissions, authorization failures may occur. Thus, security administrators tend to define overly permissive policies, which violate the Principle of Least Privilege (PLP). A considerable body of research has been devoted to building program-analysis tools for computing the optimal policy for a program. However, Java and the CLR also allow executing code under the authority of a subject (user or service), and no program-analysis solution has addressed the challenges of determining the policy of a program in the presence of subjects. This paper introduces Subject Access Rights Analysis (SARA), a novel analysis algorithm for statically computing the permissions required by subjects at run time. We have applied SARA to 348 libraries in IBM WebSphere Application Server - a commercial enterprise application server written in Java that consists of >2 million lines of code and is required to support the Java permission- and subject-based security model. SARA detected 263 PLP violations, 219 cases of policies with missing permissions, and 29 bugs that led code to be unnecessarily executed under the authority of a subject. SARA corrected all these vulnerabilities automatically, and additionally synthesized fresh policies for all the libraries, with a false-positive rate of 5% and an average running time of 103 seconds per library. SARA also implements mechanisms for mitigating the risk of false negatives due to reflection and native code; according to a thorough result evaluation based on testing, no false negative was detected. SARA enabled IBM WebSphere Application Server to receive the Common Criteria for Information Technology Security Evaluation Assurance Level 4 certification

    Contraceptive Services Available to Unmarried Sexually Active Adolescents

    Full text link
    Background: Low contraceptive use amongst unmarried sexually active young men and women presents an ethical dilemma in Indonesia, particularly in realising reproductive rights as a fundamental human right. This study aims to address the difficulties in extending access to family planning for unmarried sexually active youths. Methods: A review of the laws relating to the provision of family planning was combined with a secondary data analysis of the 2012 Indonesian Demographic Health Survey throughout 6 provinces on the island of Java. The sample population included 5,150 unmarried adolescents, aged 15 to 24 years. The 2012 Indonesian Demographic Health Survey was the first and only survey that included unmarried young women in Indonesia. The association between subjects who had \u27ever had sex\u27 and three groups of predictors (demographic characteristics, peer influences, and knowledge of contraceptive methods) were examined using multivariate logistic regressions. Results:Results of the study found that subjects who were unmarried but had engaged in sexual activity were more likely to be those aged 19 to 21 years (OR = 2.36) and 22 to 24 years (OR = 6.81), of low education status (OR = 2.1), with a boyfriend or girlfriend (OR = 2.38), and those who approved of pre-marital sex (OR = 8.5). Conclusions: Results from this research suggest that new interpretations of the Law 52/2009 regarding family planning and Law 36/2009 that prohibits health services to unmarried sexually active youths are required in order to address the issues faced by Indonesia\u27s yout

    Towards Model-Driven Development of Access Control Policies for Web Applications

    Get PDF
    We introduce a UML-based notation for graphically modeling systemsā€™ security aspects in a simple and intuitive way and a model-driven process that transforms graphical specifications of access control policies in XACML. These XACML policies are then translated in FACPL, a policy language with a formal semantics, and the resulting policies are evaluated by means of a Java-based software tool

    Tracking decision-making during architectural design

    Get PDF
    There is a powerful cocktail of circumstances governing the way decisions are made during the architectural design process of a building project. There is considerable potential for misunderstandings, inappropriate changes, change which give rise to unforeseen difficulties, decisions which are not notified to all interested parties, and many other similar problems. The paper presents research conducted within the frame of the EPSRC funded ADS project aiming at addressing the problems linked with the evolution and changing environment of project information to support better decision-making. The paper presents the conceptual framework as well as the software environment that has been developed to support decision-making during building projects, and reports on work carried out on the application of the approach to the architectural design stage. This decision-tracking environment has been evaluated and validated by professionals and practitioners from industry using several instruments as described in the paper

    Static Enforcement of Role-Based Access Control

    Full text link
    We propose a new static approach to Role-Based Access Control (RBAC) policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system's architecture. We apply this new approach to policies restricting calls to methods in Java applications. We present a language to express RBAC policies on calls to methods in Java, a set of design patterns which Java programs must adhere to for the policy to be enforced statically, and a description of the checks made by our static verifier for static enforcement.Comment: In Proceedings WWV 2014, arXiv:1409.229

    KLAIM: A Kernel Language for Agents Interaction and Mobility

    Get PDF
    We investigate the issue of designing a kernel programming language for mobile computing and describe KLAIM, a language that supports a programming paradigm where processes, like data, can be moved from one computing environment to another. The language consists of a core Linda with multiple tuple spaces and of a set of operators for building processes. KLAIM naturally supports programming with explicit localities. Localities are first-class data (they can be manipulated like any other data), but the language provides coordination mechanisms to control the interaction protocols among located processes. The formal operational semantics is useful for discussing the design of the language and provides guidelines for implementations. KLAIM is equipped with a type system that statically checks access rights violations of mobile agents. Types are used to describe the intentions (read, write, execute, etc.) of processes in relation to the various localities. The type system is used to determine the operations that processes want to perform at each locality, and to check whether they comply with the declared intentions and whether they have the necessary rights to perform the intended operations at the specific localities. Via a series of examples, we show that many mobile code programming paradigms can be naturally implemented in our kernel language. We also present a prototype implementaton of KLAIM in Java
    • ā€¦
    corecore