6,813 research outputs found

    Context-Based Access for Infrequent Requests in Tanzania\u27s Health Care System

    Get PDF
    Access control is an important aspect of any information system. It is a way of ensuring that users can only access what they are authorised to and no more. This can be achieved by granting users access to resources based on pre-defined organisational and legislative rules. Although access control has been extensively studied, and as a result, a wide range of access control models, mechanisms and systems have been proposed, specific access control requirements for healthcare systems that needs to support the continuity of care in an accountable manner have not been addressed. This results in a gap between what is required by the application domain and what is actually practised, and thus access control solutions implemented for the domain become too restrictive. The continuity of care is defined as the delivery of seamless health care services to patients through integration, coordination and sharing of information between providers. This thesis, therefore, designs a context-based access control model that allows healthcare professionals to bypass access rules in an accountable manner in case of an infrequent access request involving an emergency situation. This research uses the Tanzania\u27s healthcare system as a case study domain

    Determinants and Uses of Remittances to Southern and Eastern Mediterranean Countries: Insights from a New Survey

    Get PDF
    In this paper, we analyze the determinants and the final use of remittances of migrants settled in France sending remittances to the southern Mediterranean and Sub-Saharan African countries. Research using microdata is very scarce in this region; we rely on a specially designed survey (2MO) we conducted in 2007-2008 of 1,000 people who remit to the three Maghreb countries, to Turkey and to the countries of Sub-Saharan Africa. We also use a second survey conducted by the French Ministry of Social Affairs and Health (DREES) which includes a sample of 3,500 people from the regions we are interested in. DREES microdata set enables us to understand who is more likely to remit (extensive margin). 2MO microdata allows an analysis of remittance behavior amongst those who remit (intensive margin) including sum and reported final use of remittances (housing, investment, current expenditures). Using these two microdatasets, we examine the likelihood to remit across the different waves of immigrants, the motivations to remit and the intended final use of remittances to highlight behavior differences between the different waves of immigration on the one hand, and on the other hand, the importance of looking beyond classical variables to better understand remittance behavior and its changing nature. Our first result shows that, after controlling for all the variables linked to income, education, age or nationality, subjective variables such as attachment to the home country, history and the institutional context of emigration play a determinant role in explaining remittance behavior. Our second result shows that migrants, who are in France for a long time and who have low education levels, also send remittances in order to invest in their home country. The degree of the migrant’s attachment to his home country thus appears as a discriminating subjective variable. By contrast, the migrants from Sub-Saharan Africa send money for current In this paper, we analyze the determinants and the final use of remittances of migrants settled in France sending remittances to the southern Mediterranean and Sub-Saharan African countries. Research using microdata is very scarce in this region; we rely on a specially designed survey (2MO) we conducted in 2007-2008 of 1,000 people who remit to the three Maghreb countries, to Turkey and to the countries of Sub-Saharan Africa. We also use a second survey conducted by the French Ministry of Social Affairs and Health (DREES) which includes a sample of 3,500 people from the regions we are interested in. DREES microdata set enables us to understand who is more likely to remit (extensive margin). 2MO microdata allows an analysis of remittance behavior amongst those who remit (intensive margin) including sum and reported final use of remittances (housing, investment, current expenditures). Using these two microdatasets, we examine the likelihood to remit across the different waves of immigrants, the motivations to remit and the intended final use of remittances to highlight behavior differences between the different waves of immigration on the one hand, and on the other hand, the importance of looking beyond classical variables to better understand remittance behavior and its changing nature. Our first result shows that, after controlling for all the variables linked to income, education, age or nationality, subjective variables such as attachment to the home country, history and the institutional context of emigration play a determinant role in explaining remittance behavior. Our second result shows that migrants, who are in France for a long time and who have low education levels, also send remittances in order to invest in their home country. The degree of the migrant’s attachment to his home country thus appears as a discriminating subjective variable. By contrast, the migrants from Sub-Saharan Africa send money for current expenditures rather than for investment. The obligation feeling seems to be the important motivation for remit.

    An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

    No full text
    International audienceThis paper is about generating security tests from the Common Criteria expression of a security policy, in addition to functional tests previously generated by a model-based testing approach. The method that we present re-uses the functional model and the concretization layer developed for the functional testing, and relies on an additional security policy model. We discuss how to produce the security policy model from a Common Criteria security target. We propose to compute the tests by using some test purposes as guides for the tests to be extracted from the models. We see a test purpose as the combination of a security property and a test need issued from the know-how of a security engineer. We propose a language based on regular expressions for the expression of such test purposes. We illustrate our approach by means of the IAS case study, a smart card application dedicated to the operations of Identification, Authentication and electronic Signature

    Projecting Behavioral Responses to the Next Generation of Retirement Policies

    Get PDF
    This paper examines retirement and related behavioral responses to policies that on average are actuarially neutral. Many conventional models predict that actuarially neutral policies will not affect retirement behavior. In contrast, our model allows those with high time preference rates to find that the promise of an actuarially fair increase in future rewards does not balance the loss from foregone current benefits. Using data from the Health and Retirement Study, we find that from age 62 through full retirement age, the earnings test reduces full-time work by married men by about four percentage points, or by about ten percent of married men at full-time work. Abolishing the requirements on many jobs that an individual work full-time or not at all, what we term a minimum hours constraint on employment, would induce more than twice as many people to enter partial retirement as would leave full-time work, so that total full-time equivalent (FTE) employment would increase, although by a modest amount. If all benefits from personal accounts could be taken as a lump sum, the fraction not retired at age 62 would fall by about 5 percentage points compared to a system where there is mandatory annuitization of benefits.

    Mutation Analysis for Security Tests Qualification

    Get PDF

    An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

    No full text
    International audienceThis paper is about generating security tests from the Common Criteria expression of a security policy, in addition to functional tests previously generated by a model-based testing approach. The method that we present re-uses the functional model and the concretization layer developed for the functional testing, and relies on an additional security policy model. We discuss how to produce the security policy model from a Common Criteria security target. We propose to compute the tests by using some test purposes as guides for the tests to be extracted from the models. We see a test purpose as the combination of a security property and a test need issued from the know-how of a security engineer. We propose a language based on regular expressions for the expression of such test purposes. We illustrate our approach by means of the IAS case study, a smart card application dedicated to the operations of Identification, Authentication and electronic Signature

    Projecting Behavioral Responses to the Next Generation of Retirement Policies

    Get PDF
    This paper examines retirement and related behavioral responses to policies that on average are actuarially neutral. Many conventional models predict that actuarially neutral policies will not affect retirement behavior. In contrast, our model allows those with high time preference rates to find that the promise of an actuarially fair increase in future rewards does not balance the loss from foregone current benefits. Using data from the Health and Retirement Study, we find that from age 62 through full retirement age, the earnings test reduces full-time work by married men by about four percentage points, or by about ten percent of married men at full-time work. Abolishing the requirements on many jobs that an individual work full-time or not at all, what we term a minimum hours constraint on employment, would induce more than twice as many people to enter partial retirement as would leave full-time work, so that total full-time equivalent (FTE) employment would increase, although by a modest amount. If all benefits from personal accounts could be taken as a lump sum, the fraction not retired at age 62 would fall by about 5 percentage points compared to a system where there is mandatory annuitization of benefits.

    Aggregating and Deploying Network Access Control Policies

    Full text link
    The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies -- potentially easy to be evaded by unauthorized parties. We present in this paper a proposal to create, manage, and deploy consistent policies in those components in an efficient way. To do so, we combine two main approaches. The first approach is the use of an aggregation mechanism that yields consistent configurations or signals inconsistencies. Through this mechanism we can fold existing policies of a given system and create a consistent and global set of access control rules -- easy to maintain and manage by using a single syntax. The second approach is the use of a refinement mechanism that guarantees the proper deployment of such a global set of rules into the system, yet free of inconsistencies.Comment: 9 page

    Cellular mechanisms underlying burst firing in substantia nigra dopamine neurons

    Get PDF
    Burst firing of substantia nigra dopamine (SN DA) neurons is believed to represent an important teaching signal that instructs synaptic plasticity and associative learning. However, the mechanisms through which synaptic excitation overcomes the limiting effects of somatic Ca2+-dependent K+ current to generate burst firing are controversial. Modeling studies suggest that synaptic excitation sufficiently amplifies oscillatory dendritic Ca2+ and Na+ channel currents to lead to the initiation of high-frequency firing in SN DA neuron dendrites. To test this model, visually guided compartment-specific patch-clamp recording and ion channel manipulation were applied to rodent SN DA neurons in vitro. As suggested previously, the axon of SN DA neurons was typically found to originate from a large-diameter dendrite that was proximal to the soma. However, in contrast to the predictions of the model, (1) somatic current injection generated firing that was similar in frequency and form to burst firing in vivo, (2) the efficacy of glutamatergic excitation was inversely related to the distance of excitation from the axon, (3) pharmacological blockade or genetic deletion of Ca2+ channels did not prevent high-frequency firing, (4) action potential bursts were invariably detected first at sites that were proximal to the axon, and (5) pharmacological blockade of Na+ channels in the vicinity of the axon/soma but not dendritic excitation impaired burst firing. Together, these data suggest that SN DA neurons integrate their synaptic input in a more conventional manner than was hypothesized previously
    • 

    corecore