2,122 research outputs found

    Tutorial: Identity Management Systems and Secured Access Control

    Get PDF
    Identity Management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today’s computing environment involves a variety of user and machine centric forms of digital identities and fuzzy organizational boundaries. With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and social challenges. The first part of the tutorial describes the history and conceptualization of IdMS, current trends and proposed paradigms, identity lifecycle, implementation challenges and social issues. The second part addresses standards, industry initia-tives, and vendor solutions. We conclude that there is disconnect between the need for a universal, seamless, trans-parent IdMS and current proposed standards and vendor solutions

    An extended ontology-based context model and manipulation calculus for dynamic web service processes

    Get PDF
    Services are oered in an execution context that is determined by how a provider provisions the service and how the user consumes it. The need for more exibility requires the provisioning and consumption aspects to be addressed at runtime. We propose an ontology-based context model providing a framework for service provisioning and consumption aspects and techniques for managing context constraints for Web service processes where dynamic context concerns can be monitored and validated at service process run-time. We discuss the contextualization of dynamically relevant aspects of Web service processes as our main goal, i.e. capture aspects in an extended context model. The technical contributions of this paper are a context model ontology for dynamic service contexts and an operator calculus for integrated and coherent context manipulation, composition and reasoning. The context model ontology formalizes dynamic aspects of Web services and facilitates reasoning. We present the context ontology in terms of four core dimensions - functional, QoS, domain and platform - which are internally interconnected

    Manifesting Anti-Expansionist Anxiety at New York’s American Art-Union: A Sociopolitical Interpretation of George Caleb Bingham’s 1845 Paintings, The Concealed Enemy and Fur Traders Descending the Missouri

    Get PDF
    George Caleb Bingham was one of the few artists with a political career as well, serving in the Missouri legislature. In this article, Joan Stack interrogates a body of Bingham’s work in the context of the social and political atmosphere of antebellum Missouri

    Vol. 12, no. 2: Full Issue

    Get PDF

    Ghosts of 1932: The Lost History of Estate and Gift Taxation

    Get PDF
    In 1932, the United States confronted a bleak economic landscape. Amid the financial carnage caused by the 1929 stock market crash and the ensuing Great Depression, economic activity had ground to a halt, tax revenues had plunged, and the nation’s debt had soared. The declining government revenues and soaring debt threatened both the viability of American industry and the stability of the nation’s credit rating. Congress took bold action that year, enacting a massive tax bill (“the Revenue Act of 1932”) designed to balance the federal budget without further stifling economic growth. As has been true through nearly a century of tax legislation, Congress included estate and gift taxes as a component of the Revenue Act of 1932. The architects of the 1932 estate and gift tax provisions made a number of crucial legislative choices that fateful year, implicating issues of tax policy that remain as relevant today as they were some eighty years ago. Yet, histories of American taxation typically devote frustratingly little analysis to the specific estate and gift tax provisions included in the Revenue Act of 1932. As a result, despite their continued relevance, the details of key decisions, and the motivations of those who made them, effectively have been lost to history. In this paper, I seek to reclaim this lost history of estate and gift taxation. While the ensuing analysis certainly will enable us to more fully appreciate the events of 1932 and evaluate the actions Congress took in that fateful year, my inquiry is not of mere historical interest. Rather, the choices made in 1932 have helped shape the fundamental structure of U.S. estate and gift taxation for nearly eight decades, including our modern estate and gift tax code. Accordingly, understanding the events of 1932 can help us to understand why our estate and gift taxes operate the way they do as well as help inform future debate about the optimal structure of our wealth transfer tax system

    Canines in the Classroom: Service Animals in Primary and Secondary Educational Institutions

    Get PDF
    This Article focuses on the issue of whether a child with a disability has the legal right to attend a primary or secondary school with a service animal. It begins by setting forth basic information regarding the children who are currently receiving special education services and discussing the increasing number of animals placed into service with individuals under the age of eighteen, focusing on the recent trend of utilizing service animals to assist children with an autism spectrum disorder. Studies relating to the common argument against allowing service animals in schools – the impact of service animals on others with allergies to animal dander – are then examined. The Article continues with a brief summary of the federal law to provide a platform for analysis of the major cases in this area. As state laws that expand the rights of students appear to be an effective tool in litigation in this area, several of these laws are evaluated along with descriptions of language likely to be found in school district policies. State laws providing for trainers of service animals to have access to public accommodations, including schools, are then analyzed. The Article concludes by arguing that school districts need to be prepared with policies that provide for compliance with the law while still considering the impact of such animals on the school environment generally, given the legislative trends in this area

    The Law and Economics of Disability Accommodations

    Get PDF
    The Americans with Disabilities Act provides a clear mandate that disabled workers be provided with reasonable accommodations, but does not meaningfully articulate the standards by which reasonableness ought to be measured. Until now, neither courts nor commentators have provided a systematic model for analyzing accommodation claims. This Article articulates an initial law and economics framework for analyzing disability-related accommodations. In doing so, it demonstrates how accommodations span a cost continuum that can be divided into areas of Wholly Efficient and Semi-Efficient Accommodations to be funded by private employers, Social Benefit Gain Efficient Accommodations where the costs should be borne by the public fisc, and Wholly Inefficient Accommodations that ought not be provided. It also delineates the boundaries between each category, and explains why the entities designated should bear the accommodation costs assigned to them. The analysis of disability accommodations uses, questions, and at times goes beyond the neoclassical economic model of the labor market, and also engages arguments from the jurisprudence of social justice. By utilizing both these fields, this Article stakes out a unique perspective on disability accommodations, and provides an avenue for continued discussion and debate over how disability accommodations ought to be measured

    WSACT : a model for Web Services access control incorporating trust

    Get PDF
    Today, organisations that seek a competitive advantage are adopting virtual infrastructures that share and manage computing resources. The trend is towards implementing collaborating applications that are supported by web services technology. Even though web services technology is rapidly becoming a fundamental development paradigm, adequate security constitutes the main concern and obstacle to its adoption as an industry solution. An important issue to address is the development of suitable access control models that are able to not only restrict access to unauthorised users, but also to discriminate between users that originate from different collaborating parties. In web services environments, access control is required to cross the borders of security domains, in order to be implemented between heterogeneous systems. Traditional access control systems that are identity-based do not provide a solution, as web services providers have to deal with unknown users, manage a large user population, collaborate with others and at the same time be autonomous of nature. Previous research has pointed towards the adoption of attribute-based access control as a means to address some of these problems. This approach is still not adequate, as the trustworthiness of web services requestors cannot be determined. Trust in web services requestors is thus an important requirement to address. For this reason, the thesis investigated trust, as to promote the inclusion of trust in the web services access control model. A cognitive approach to trust computation was followed that addressed uncertain and imprecise information by means of fuzzy logic techniques. A web services trust formation framework was defined that aims to populate trust concepts by means of automated, machine-based trust assessments. The structure between trust concepts was made explicit by means of a trust taxonomy. This thesis presents the WSACT – or the Web Services Access Control incorporating Trust –model. The model incorporates traditional role-based access control, the trust levels of web services requestors and the attributes of users into one model. This allows web services providers to grant advanced access to the users of trusted web services requestors, in contrast to the limited access that is given to users who make requests through web services requestors with whom a minimal level of trust has been established. Such flexibility gives a web services provider the ability to foster meaningful business relationships with others, which portrays humanistic forms of trust. The WSACT architecture describes the interacting roles of an authorisation interface, authorisation manager and trust manager. A prototype finally illustrates that the incorporation of trust is a viable solution to the problem of web services access control when decisions of an autonomous nature are to be made.Thesis (PhD (Computer Science))--University of Pretoria, 2008.Computer Scienceunrestricte
    corecore