1,404 research outputs found

    Privacy in an Ambient World

    Get PDF
    Privacy is a prime concern in today's information society. To protect\ud the privacy of individuals, enterprises must follow certain privacy practices, while\ud collecting or processing personal data. In this chapter we look at the setting where an\ud enterprise collects private data on its website, processes it inside the enterprise and\ud shares it with partner enterprises. In particular, we analyse three different privacy\ud systems that can be used in the different stages of this lifecycle. One of them is the\ud Audit Logic, recently introduced, which can be used to keep data private when it\ud travels across enterprise boundaries. We conclude with an analysis of the features\ud and shortcomings of these systems

    Design and Analysis of RT-Ring: A Protocol for Supporting Real-Time Communications

    Get PDF
    Distributed applications with quality of service (QoS) requirements are more and more used in several areas (e.g., automated factory networks, embedded systems, conferencing systems). These applications produce a type of traffic with hard timing requirements, i.e., transmissions must be completed within specified deadlines. To handle these transmissions, the communication system must use real-time protocols to provide a communication service that is able to satisfy the QoS requirements of the distributed applications. In this paper, we propose a new real-time protocol, called RT-Ring, able to support transmissions of both real-time and generic traffic over a ring network. RT-Ring provides both network guarantees and high network resource utilization, while ensuring the compatibility with the emerging differentiated service architectures. Network guarantees are fully proved and high network utilization is highlighted by a comparative study with the FDDI protocol. This comparison shows that RT-Ring network capacities are greater than the corresponding FDDI capacities. In fact, by assuming the FDDI frames with a length equal to the RT-Ring slot size and by using the same traffic load we show that the capacities of FDDI are equal to the lower bound capacities of RT-Ring. Index Terms Real-time protocol, quality of service (QoS) traffic, worst case analysis

    Oracle R12 EBusiness Suite Role Based Access Control and Roles Lifecycle Management

    Full text link
    Oracle E-Business Suite R12 is a widely used ERP solution that provides integrated view of information across multiple functions and sources. It allows for simplified business process tools for Shared service model e.g. Centralized Operation where multiple operating units can be supported. Security considerations are vital for such operations in large enterprises. R12 introduced Role Based Access Control security based on ANSI RBAC standard. R12 RBAC implementation is challenged with lack of Roles Lifecycle Management (RLM) process which also contributes to challenges such as Segregation of duty (SOD), and controlling access to PII for multi-country operation for common functional areas. The paper will propose a possible Roles Lifecycle Management process.Comment: 8 pages, 14 figure

    Promoting innovation in developing countries: a conceptual framework

    Get PDF
    The author provides a conceptual framework for approaching the promotion of technological innovation and its diffusion in developing countries. Innovation climates in developing countries are, by nature, problematic, characterized by poor business and governance conditions, low educational levels, and mediocre infrastructure. This raises particular challenges for the promotion of innovation. The latter should be understood as the diffusion of technologies-and related practices-which are new to a given context (not in absolute terms). What matters first is to provide the necessary package of support-technical, financial, commercial, legal, and so on-with flexible, autonomous agencies adapting their support and operations to the different types of concerned enterprises. Facilitating and responding to the emergence of grass-root needs at the local level is also essential. Support to entrepreneurs and local communities should be primarily provided in matching grant forms to facilitate the mobilization of local resources and ownership. It is of primary importance to pay the greatest attention to country specificities, not only in terms of development level, size, and specialization, but also in terms of administrative and cultural traditions. At the global level, major issues need also to be considered and dealt with by appropriate incentives and regulations: the role of foreign direct investment in developing countries'technological development, conditions of technologies'patenting and licensing, the North-South research asymmetry, and brain drain trends.Innovation,Environmental Economics&Policies,Agricultural Research,Poverty Assessment,Health Monitoring&Evaluation

    Defining security requirements through misuse actions

    Get PDF
    An important aspect of security requirements is the understanding and listing of the possible threats to the system. Only then can we decide what specific defense mechanisms to use. We show here an approach to list all threats by considering each action in each use case and analyzing how it can be subverted by an internal or external attacker. From this list we can deduce what policies are necessary to prevent or mitigate the threats. These policies can then be used as guidelines for design. The proposed method can include formal design notations for validation and verification.1st International Workshop on Advanced Software Engineering: Expanding the Frontiers of Software Technology - Session 3: Software Development ProcessRed de Universidades con Carreras en Informática (RedUNCI

    The Role of the President in National Security Policies in Parliamentary Republics - The Case of Albania -

    Get PDF
    Albania is one of the former communist countries, which has managed to survive in the wildest form of the totalitarian regime and transform itself into a democratic state. Throughout the process of political and constitutional evolution, the role of the head of state has been irreplaceable, especially in national security matters. The constitutional reform has repeatedly affected the position of the head of state, strengthening it by diminishing its role in the direction of the country. Nevertheless, its constitutional and political authority in the establishment and implementation of national security policies has remained unchanged. Namely, he is also the head of state, but also the General Commander of the Armed Forces. It is precisely these attributes as well as its constitutional role and powers in relation to national security that will be the subject of this research. We will see if the head of state possesses a sufficient mechanism to play a role both in peace and in the war. We will also see its possibilities of influence on national security policies, beyond the exclusive competences of this character. The research method will be the description method and the political analysis method for a case study. &nbsp

    The Mediterranean Legacy in the Concept of Sovereignty: A Case of Legal and Philosophical Hybridity

    Get PDF
    The ideas of centralized political power and monarchy that emerged from the Mediterranean world are among the most important philosophical bases for the concept of sovereignty. My thesis is that the normative idea of an absolute, independent, and exclusive center of power originates in a complex case of philosophical hybridity. It is the outcome of the alternation between the conception of the Sovereign as representing the supreme power (the indirect theory) and the conception of the Sovereign as directly containing that power (the direct theory). The former conception is usually associated with the history of Western political culture and the passage from Greek to Roman ideas of public authority. The latter conception is typically associated with the understanding of supreme political power found in Eastern culture, as exemplified in Persian kingship and the Byzantine theocracy. My intention is to show how the modern concept of sovereignty has emerged from a mixture of these two conceptions. In fact, the early philosophical structure of sovereignty in both its monarchical and its democratic versions can be summed up in the notion of secularized transcendence. The sovereign benefits simultaneously from both the conceptual model of subjectivity (the indirect theory) as a mask that represents a center of attribution (le Roi est mort, vive le Roi), and the conceptual model of a material supreme subject (the direct theory) who embodies the primacy of an authority that is beyond actual social relationships (l’État c’est moi)

    English Universities: Managerial Movement from Academic Collegial Administration to Corporate Managerialism (1960-2013)

    Get PDF
    The aim of the research in this MA by Research thesis has been to shed light on the development of the notion of “management” and its associated “sociometrics” at UK universities. The research looked at the transformation of university operating strategies in England and Wales, with the objective of capturing the various managerial movements from a traditional collegial administrative operating system to a more diverse entrepreneurial model more aligned with contemporary corporate management beliefs. 8 diverse universities were selected for the case-study to provide “colour and contrast” – namely, Oxford and Cambridge as “Ancient” universities, Cardiff and Royal Holloway as “19th Century-Founded” universities, Birmingham to cover the “Red Brick” category, Lancaster to spotlight the so-called “Plate-Glass” universities, Hertfordshire to embrace the “Post-Polytechnic” universities and Open University to include the “E-University” category. The methodology utilized was a triangulated middle-ground approach to examine qualitatively and quantitatively the universities websites, strategic documents, government committee reports, regulations and financial performance information that reflected surplus/deficit results as outcomes for the targeted group. The lessons learned from this investigation showed that these universities modus operandi and performance reflected an ongoing trend of transformation imposed by continuous government regulatory change requirements on the one hand, and most likely also, the changing sector climate in the higher education community in England and Wales. The findings from the research indicate that scholastic writings and the literature have extensively chronicled the movement from ‘collegial’ administration to academic entrepreneurialism. However, it appears to be an open question as to whether a common corporate strategic wording language had emerged by 2002: though it had basically, by 2012. In both 2002 and 2012 a recognizable core of sociometric wording language was discernible. And finally some slender evidence was uncovered that indicates where substantial effort was put out by the universities in strategic planning, better financial results accrued. Significant contributions to overall knowledge have been uncovered as a result of this thesis research. The movement by UK universities from ‘academic collegial administration’ to academic entrepreneurialism’ has been verified by multiple academic writings. UK universities have developed a measurable increase in the use of common ‘strategic sociometric wording’ and a greatly increased the use of strategic management and corporatised-wording in their published literature. And lastly, some modest evidence supports a finding that better financial results do appear to have emanated where considerable strategic planning effort was put out

    Integration of Legacy and Heterogeneous Databases

    Get PDF
    corecore