128,577 research outputs found

    A theory of contracts for web services

    Get PDF
    <p>Contracts are behavioural descriptions of Web services. We devise a theory of contracts that formalises the compatibility of a client to a service, and the safe replacement of a service with another service. The use of contracts statically ensures the successful completion of every possible interaction between compatible clients and services.</p> <p>The technical device that underlies the theory is the definition of filters, which are explicit coercions that prevent some possible behaviours of services and, in doing so, they make services compatible with different usage scenarios. We show that filters can be seen as proofs of a sound and complete subcontracting deduction system which simultaneously refines and extends Hennessy's classical axiomatisation of the must testing preorder. The relation is decidable and the decision algorithm is obtained via a cut-elimination process that proves the coherence of subcontracting as a logical system.</p> <p>Despite the richness of the technical development, the resulting approach is based on simple ideas and basic intuitions. Remarkably, its application is mostly independent of the language used to program the services or the clients. We also outline the possible practical impact of such a work and the perspectives of future research it opens.</p&gt

    BlogForever: D2.5 Weblog Spam Filtering Report and Associated Methodology

    Get PDF
    This report is written as a first attempt to define the BlogForever spam detection strategy. It comprises a survey of weblog spam technology and approaches to their detection. While the report was written to help identify possible approaches to spam detection as a component within the BlogForver software, the discussion has been extended to include observations related to the historical, social and practical value of spam, and proposals of other ways of dealing with spam within the repository without necessarily removing them. It contains a general overview of spam types, ready-made anti-spam APIs available for weblogs, possible methods that have been suggested for preventing the introduction of spam into a blog, and research related to spam focusing on those that appear in the weblog context, concluding in a proposal for a spam detection workflow that might form the basis for the spam detection component of the BlogForever software

    Arlis/ANZ 2.0

    Get PDF
    We've all been hearing about Web 2.0 and Library 2.0 lately. But just what are they all about, and is there anything there that Arlis/ANZ can take advantage of in order to better go about its business? Can there, should there, be an Arlis/ANZ 2.0? Arlis/ANZ, the Arts Libraries Society of Australia and New Zealand, is preparing to review it's online prescence. The Arlis/ANZ website is now three years old, and has been well maintained during that time. However it has not yet been systematically reviewed in terms of content, functionality, and strategic direction. The Arlis/ANZ Website version 'One' will be redeveloped into Arlis/ANZ Website version 'Two'. Although much of that review will concentrate on the structure, look and feel of the site, the review process offers an opportunity to incorporate Web 2.0 developments. By incorporating that 'best' of Web 2.0 in a strategic manner, Arlis/ANZ 2.0 - the website - has powerful potential to contribute toward the strength, cohesion and ongoing development of Arlis/ANZ 2.0 - the Society

    On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    Get PDF
    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible

    Reparable Harm: Assessing and Addressing Disparities Faced by Boys and Men of Color in California

    Get PDF
    The California Endowment commissioned this report to highlight the most glaring inequities in socioeconomics, health, safety, and education faced by African-American and Latino men and boys in the state. In addition to presenting the statistics on these indicators, the authors outline a framework for addressing the disparities at the individual, community, and macro levels

    A teacher’s voice: Embracing change to make a difference

    Get PDF
    The challenge to understand the impact and demands of new forms of literacy for teachers with considerable expertise is intensified when making sense of multiple forms of texts. This paper examines how an experienced teacher made changes to her literacy pedagogy when faced with a class problem for which she felt unprepared. The story is told predominantly through the voice of the teacher using her reflective journal. An example of Web 2.0 technology, specifically the construction of a wiki, is planned and implemented to reflect the teacher’s changing views of literacy. The key focus is how this teacher will transition her practice to meet the new demands of literacy teaching, what critical moves are required of her in order to do this and how does she shift from the traditional role of facilitator to designer of online learning. Through such analysis it is proposed that it is possible for an experienced teacher to theorise, implement and adopt a stance that encompasses a broader view of literacy and literacy instruction

    Towards Governing in the Digital Age

    Get PDF

    Social Media and the Public Sector

    Get PDF
    {Excerpt} Social media is revolutionizing the way we live, learn, work, and play. Elements of the private sector have begun to thrive on opportunities to forge, build, and deepen relationships. Some are transforming their organizational structures and opening their corporate ecosystems in consequence. The public sector is a relative newcomer. It too can drive stakeholder involvement and satisfaction. Global conversations, especially among Generation Y, were born circa 2004. Beginning 1995 until then, the internet had hosted static, one-way websites. These were places to visit passively, retrieve information from, and perhaps post comments about by electronic mail. Sixteen years later, Web 2.0 enables many-to-many connections in numerous domains of interest and practice, powered by the increasing use of blogs, image and video sharing, mashups, podcasts, ratings, Really Simple Syndication, social bookmarking, tweets, widgets, and wikis, among others. Today, people expect the internet to be user-centric

    Scientists’ blogs – glimpses behind the scenes

    Get PDF
    corecore