13 research outputs found

    Property Rights, Municipal Corporations and Judicial Review

    Get PDF
    Cet article étudie l'évolution récente du rôle joué par la Cour supérieure pour assurer la protection des droits individuels dans le secteur du droit de l'aménagement et celui du droit municipal. L'étude porte sur deux champs d'intervention publique sur les droits individuels, en particulier le droit de propriété, et illustre les modes divers d'intervention utilisés par la Cour supérieure dans son rôle de surveillance. D'une part, la Loi sur la protection du territoire agricole sert à illustrer un modèle d'aménagement sectoriel fondé sur l'usage de la discrétion administrative comme méthode de protection. L'intervention des tribunaux se révèle sous trois aspects. D'abord la Cour supérieure se préoccupe d'imposer un minimum de discipline aux procédures devant la Commission de protection du territoire agricole, surtout dans les cas où il peut en résulter des injustices. Ensuite, le droit d'accès aux tribunaux ordinaires est protégé par la Cour grâce en particulier à une interprétation restrictive de la juridiction de la Commission. Enfin, le droit de propriété lui-même est protégé par la Cour supérieure qui restreint les pouvoirs d'intervention de la Commission mais favorise une interprétation libérale des droits acquis. A l'opposé, les interventions des collectivités locales en matière d'aménagement et d'urbanisme sont fondées sur le pouvoir réglementaire plutôt que sur la discrétion administrative. Même si le contrôle judiciaire sur le pouvoir réglementaire est un domaine déjà riche de tradition au Canada et au Québec, la jurisprudence récente tout en rappelant des principes déjà connus illustre également de nouvelles tendances. En effet, alors que les tribunaux continuent à préserver l'élément de certitude et de sécurité que le règlement fournit aux citoyens, ils sont prêts à protéger les citoyens contre les interventions publiques abusives et ils ont à cette fin revitalisé le critère de la rationalité comme mode de contrôle du pouvoir réglementaire. De plus, au besoin, ils vont être prêts à intervenir dans l'allocation même des usages et des affectations du sol lorsqu'ils doivent se prononcer sur des questions de discrimination et d'intérêt public

    Multiple security domain nondeducibility in cyber-physical systems

    Get PDF
    Cyber-physical Systems (CPS) present special problems for security. This dissertation examines the cyber security problem, the physical security problem, the security problems presented when cyber systems and physical systems are intertwined, and problems presented by the fact that CPS leak information simply by being observed. The issues presented by applying traditional cyber security to CPS are explored and some of the shortcomings of these models are noted. Specific models of a drive-by-wire\u27\u27 automobile connected to a road side assistance network, a Stuxnet type\u27\u27 attack, the smart grid, and others are presented in detail. The lack of good tools for CPS security is addressed in part by the introduction of a new model, Multiple Security Domains Nondeducibility over an Event System, or MSDND(ES). The drive-by-wire automobile is studied to show how MSDND(ES) is applied to a system that traditional security models do not describe well. The issue of human trust in inherently vulnerable CPS with embedded cyber monitors, is also explored. A Stuxnet type attack on a CPS is examined using both MSDND(ES) and Belief, Information acquisition, and Trust (BIT) logic to provide a clear and precise method to discuss issues of trust and belief in monitors and electronic reports. To show these techniques, the electrical smart grid as envisioned by the Future Renewable Electric Energy Delivery and Management Systems Center (FREEDM) project is also modeled. Areas that may lead to the development of additional tools are presented as possible future work to address the fact: CPS are different and require different models and tools to understand. --Abstract, page iii

    Bronx Community College of the City University of New York Catalog No.4 1967-1968

    Full text link
    Course catalog for Bronx Community College for 1967-68

    A Data Protection Architecture for Derived Data Control in Partially Disconnected Networks

    No full text
    Every organisation needs to exchange and disseminate data constantly amongst its employees, members, customers and partners. Disseminated data is often sensitive or confidential and access to it should be restricted to authorised recipients. Several enterprise rights management (ERM) systems and data protection solutions have been proposed by both academia and industry to enable usage control on disseminated data, i.e. to allow data originators to retain control over whom accesses their information, under which circumstances, and how it is used. This is often obtained by means of cryptographic techniques and thus by disseminating encrypted data that only trustworthy recipients can decrypt. Most of these solutions assume data recipients are connected to the network and able to contact remote policy evaluation authorities that can evaluate usage control policies and issue decryption keys. This assumption oversimplifies the problem by neglecting situations where connectivity is not available, as often happens in crisis management scenarios. In such situations, recipients may not be able to access the information they have received. Also, while using data, recipients and their applications can create new derived information, either by aggregating data from several sources or transforming the original data’s content or format. Existing solutions mostly neglect this problem and do not allow originators to retain control over this derived data despite the fact that it may be more sensitive or valuable than the data originally disseminated. In this thesis we propose an ERM architecture that caters for both derived data control and usage control in partially disconnected networks. We propose the use of a novel policy lattice model based on information flow and mandatory access control. Sets of policies controlling the usage of data can be specified and ordered in a lattice according to the level of protection they provide. At the same time, their association with specific data objects is mandated by rules (content verification procedures) defined in a data sharing agreement (DSA) stipulated amongst the organisations sharing information. When data is transformed, the new policies associated with it are automatically determined depending on the transformation used and the policies currently associated with the input data. The solution we propose takes into account transformations that can both increase or reduce the sensitivity of information, thus giving originators a flexible means to control their data and its derivations. When data must be disseminated in disconnected environments, the movement of users and the ad hoc connections they establish can be exploited to distribute information. To allow users to decrypt disseminated data without contacting remote evaluation authorities, we integrate our architecture with a mechanism for authority devolution, so that users moving in the disconnected area can be granted the right to evaluate policies and issue decryption keys. This allows recipients to contact any nearby user that is also a policy evaluation authority to obtain decryption keys. The mechanism has been shown to be efficient so that timely access to data is possible despite the lack of connectivity. Prototypes of the proposed solutions that protect XML documents have been developed. A realistic crisis management scenario has been used to show both the flexibility of the presented approach for derived data control and the efficiency of the authority devolution solution when handling data dissemination in simulated partially disconnected networks. While existing systems do not offer any means to control derived data and only offer partial solutions to the problem of lack of connectivity (e.g. by caching decryption keys), we have defined a set of solutions that help data originators faced with the shortcomings of current proposals to control their data in innovative, problem-oriented ways

    PLACE: Post LANDSAT D Advanced Concept Evaluation

    Get PDF
    There are no author-identified significant results in this report

    The concept of cost of production in Australian agricultural policy with specific application to the wheat industry

    No full text
    One feature of Australian agricultural policy in the post World War II era has been the introduction of cost-based price stabilization schemes for certain of our rural industries. Currently there are four such stabilization schemes under which the price of the industry’s product is related to costs of production. The products involved are wheat, butterfat (for butter and cheese production), sugar and dried vine fruits

    Vol. 62, no. 1: Full Issue

    Get PDF

    The impact of transport on regional development in Indonesia : a case study of Province of North Sumatra.

    Get PDF
    Experiences from many countries show that transport can have conflicting results on development. This is a question as to whether the provision of roads can stimulate the centres to generate ripple and trickle down effects or whether they drain raw material, capital, labour and entrepreneurial talent from surrounding areas. There is also a hypothesis that if there is a relationship between capital formation and economic growth, there must be a relationship between transport and the growth. This study explore this phenonmenon in depth in the context of a case study of North Sumatera in Indonesia. Economic growth factors and traffic volume data were collated from different sources covering the whole province of North Sumatera and were subjected to standard statistical tests. Despite the deficiencies in the data base, the findings suggest that the positive impact of roads on private investments, government activities and interregional trade is significant although roads may stimulate the concentration of investment and at the same time encourage interregional trade in the ports surrounding the primate city. It is also found that roads do not have a significant influence on the expansion of land use. The findings also show that in this case, the provision of roads has an impact on regional income but the speculation that the long term impact of roads leads to a backwash effect from the less developed subregions appears to be true. Regional inequalities may be reduced in some measure when all settlements in the region can be accessed by vehicles in all weathers. A simple model is . constructed to examine the relationship between the volume of ~raffic and economic growth factors. This model is based on the gravity model. The /findings show that agricultural land use and population have significant contribution to the generation of the volume of trucks and buses, respectively. Capital investment influences significantly on the generation of the volume of cars and trucks. Despite the level of significance, population makes the the smallest contributor to the volume of traffic. Due to data problems, the conclusions from this study must be drawn carefully. The findings of this study therefore are more indicative than conclusive. Even though they may indicate and permit an anticipation of the future role of transport, they should be interpreted more as trends and tendencies than an absolute predictions

    Responsibility Accounting in China: Towards an Exploratory Framework

    Get PDF
    One of the economic reforms started in the People's Republic of China since 1979 is to enhance the productivity and profitability of the State-Owned Enterprises (SOEs) which still accounted for over 40% of the National Industrial Output and over 60% of the working population in 1996. However, over one-third of all the SOEs in China have incurred financial losses since the early 1990s and how to revive their efficiency and profitability has become one of the most important work plans for the Chinese government in recent years. In July 1992, the State Council of China implemented the "Regulations for State-Owned Industrial Enterprises Operation Mechanisms Transformation" whose major aim is to delegate more autonomy to the SOEs to ensure that they are self-financed, self-managed, self-regulated and selfdeveloped. In addition, the promulgation of the "Socialist Market Economy" by the 14th People's Congress held in October 1992 would make the SOEs more market driven in planning, operation and control. Furthermore, in the same year more SOEs on a selective basis were allowed by the central government to be transformed into "Shareholding Enterprises" where boards of directors have been empowered by the authorities to manage their own businesses. The focus of this doctoral research is to study the actual impact of the above legislation, economic and ownership changes on "Responsibility Accounting" which is the most widely used management accounting technique employed by the large- and medium-sized SOEs in China since 1987 The non-existence of systematic empirical research on this management accounting aspect in China justifies the use of an "Exploratory Case Study" approach to investigate a sample of 20 SOEs through repeated interviews over a period from 1991 to 1995. This type of longitudinal field study has verified that there have been significant changes in the responsibility accounting styles and the associated planning and control systems in these 20 SOEs before and after 1992. Further minor variables or factors have also been identified to explain these changes. This research provides observations, findings and comparisons with the literature which can generate ideas and hypotheses on many aspects related to the responsibility (management) accounting development in China which can be subject to rigorous empirical testing by the researcher and other academics or practitioners in the future
    corecore