889,097 research outputs found

    Digital technology and governance in transition: The case of the British Library

    Get PDF
    Comment on the organizational consequences of the new information and communications technologies (ICTs) is pervaded by a powerful imagery of disaggregation and a tendency for ?virtual? forms of production to be seen as synonymous with the ?end? of bureaucracy. This paper questions the underlying assumptions of the ?virtual organization?, highlighting the historically enduring, diversified character of the bureaucratic form. The paper then presents case study findings on the web-based access to information resources now being provided by the British Library (BL). The case study evidence produces two main findings. First, radically decentralised virtual forms of service delivery are heavily dependent on new forms of capacity-building and information aggregation. Second, digital technology is embedded in an inherently contested and contradictory context of institutional change. Current developments in the management and control of digital rights are consistent with the commodification of the public sphere. However, the evidence also suggests that scholarly access to information resources is being significantly influenced by the ?information society? objectives of the BL and other institutional players within the network of UK research libraries

    PENERAPAN WEB PROXY DAN MANAGEMENT BANDWIDTH MENGGUNAKAN MIKROTIK ROUTERBOARD PADA KANTOR POS PALEMBANG 30000

    Get PDF
    The Palembang 30000 POS office which is supported by information technology has a computer network that is directly connected to the ISP (Internet Service Provider) which has a bandwidth allocation of 20 Mbps. The problem at the Palembang 30000 POS Office is that there is no web proxy and Bandwidth Management application, so employees can access various sites that interfere with employee performance and employees who use the internet for free result in uneven bandwidth usage. The purpose of this study is to implement a web proxy and bandwidth management, so that the bandwidth is evenly distributed, therefore it is necessary to divide the bandwidth using a proxy routerboard, the method used for bandwidth distribution is using the simple queue method. By implementing a web proxy, it can control internet usage and block website sites that have the potential to interfere with employee performance, by making bandwidth management able to limit bandwidth usage and share bandwidth equally on each client, so internet access is now running more stable.The Palembang 30000 POS office which is supported by information technology has a computer network that is directly connected to the ISP (Internet Service Provider) which has a bandwidth allocation of 20 Mbps. The problem at the Palembang 30000 POS Office is that there is no web proxy and Bandwidth Management application, so employees can access various sites that interfere with employee performance and employees who use the internet for free result in uneven bandwidth usage. The purpose of this study is to implement a web proxy and bandwidth management, so that the bandwidth is evenly distributed, therefore it is necessary to divide the bandwidth using a proxy routerboard, the method used for bandwidth distribution is using the simple queue method. By implementing a web proxy, it can control internet usage and block website sites that have the potential to interfere with employee performance, by making bandwidth management able to limit bandwidth usage and share bandwidth equally on each client, so internet access is now running more stable

    Access Control of Web- and Java-Based Applications

    Get PDF
    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browser

    USER CENTRIC POLICY MANAGEMENT

    Get PDF
    Internet use, in general, and online social networking sites, in particular, are ex- periencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protect- ing this information is a challenge. Access control policy composition is complex, laborious and tedious for the average user. Usable access control frameworks have lagged. Acceptance / use of available frameworks is low. As a result, policies are only partially configured and maintained. Or, they may be all together ignored. This leads to privacy information and content not being properly protected and potentially unknowingly made available to unintended recipients. We overcome these limitations by introducing User Centric Policy Management – a new paradigm of semi-automated tools that aid users in building, recommending and maintaining their online access control policies. We introduce six user centric policy management assistance tools: Policy Manager is a supervised learning based mech- anism that leverages user provided example policy settings to build classifiers that are the basis for auto-generated policies. Assisted Friend Grouping leverages proven clustering techniques to assist users in grouping their friends for policy management purposes. Same-As Subject Management leverages a user’s memory and opinion of their friends to set policies for other similar friends. Example Friend Selection pro- vides different techniques for aiding users in selecting friends used in the development of access control policies. Same-As Object Management leverages a user’s memory and perception of their objects for setting policies for other similar objects. iLayer is a least privilege based access control model for web and social networking sites that builds, recommends and enforces access control policies for third party developed applications. To demonstrate the effectiveness of these policy management assistance tools, we implemented a suite of prototype applications, conducted numerous experiments and completed a number of extensive user studies. The results show that User Centric Pol- icy Management is a more usable access control framework that is effective, efficient and satisfying to the user, which ultimately improves online security and privacy

    Gestión de centros deportivos : Virtual Trainer Web Ed

    Get PDF
    Virtual Trainer Web Edition proporciona un sistema de gestión, planificación y control de un centro deportivo, ofreciendo interactividad entre técnicos, socios y personal de gerencia y facilitando todo el trabajo de un mantenimiento de información tradicional. A través de cualquier PC con conexión a Internet y sin instalación de software adicional, se accede a una completa aplicación con contenidos multimedia.Virtual Trainer Web Edition proporciona un sistema de gestió, planificació i control d'un centre esportiu, oferint interactivitat entre tècnics, socis i personal de gerència i facilitant tot el treball que comporta un manteniment de la informació tradicional. Mitjançant qualsevol PC amb connexió a Internet i sense haver d'instal·lar software addicional, s'accedeix a una completa aplicació amb continguts multimèdia.Virtual Trainer Web Edition provides a sports club management, planification and control system, giving interactivity among supervisors, members and management staff and making information handling easy. Through any PC with Internet connection and without having to install additional software, you can access to a complete multimedia application

    Bernstein's inequality for algebraic polynomials on circular arcs

    Get PDF
    Today information is managed within increasingly complicated Web applications which often rely on similar information models. Finding a reusable and sufficiently generic information model for managing resources and their metadata would greatly simplify development of Web applications. This article presents such an information model, namely the Resource and Metadata Management Model (ReM3). The information model builds upon Web architecture and standards, more specifically the Linked Data principles when managing resources together with their metadata. It allows to express relations between metadata and to keep track of provenance and access control. In addition to this information model, the architecture of the reference implementation is described along with a Web application that builds upon it. To show the taken approach in practice, several real-world examples are presented as showcases. The information model and its reference implementation have been evaluated from several perspectives, such as the suitability for resource annotation, a preliminary scalability analysis and the adoption in a number of projects. This evaluation in various complementary dimensions shows that ReM3 has been successfully applied in practice and can be considered a serious alternative when developing Web applications where resources are managed along with their metadata.QC 20140417</p

    Pattern-based access control in a decentralised collaboration environment

    Get PDF
    As the building industry is rapidly catching up with digital advancements, and Web technologies grow in both maturity and security, a data- and Web-based construction practice comes within reach. In such an environment, private project information and open online data can be combined to allow cross-domain interoperability at data level, using Semantic Web technologies. As construction projects often feature complex and temporary networks of stakeholder firms and their employees, a property-based access control mechanism is necessary to enable a flexible and automated management of distributed building projects. In this article, we propose a method to facilitate such mechanism using existing Web technologies: RDF, SHACL, WebIDs, nanopublications and the Linked Data Platform. The proposed method will be illustrated with an extension of a custom nodeJS Solid server. The potential of the Solid ecosystem has been put forward earlier as a basis for a Linked Data-based Common Data Environment: its decentralised setup, connection of both RDF and non-RDF resources and fine-grained access control mechanisms are considered an apt foundation to manage distributed building data

    Path-based Access Control for Enterprise Networks

    Get PDF
    Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security policies in these networks have not kept up with the advancements in networking technology. In most cases, system administrators must define policies on a per-application basis, and subsequently, these policies do not interact. For example, there is no mechanism that allows a firewall to communicate decisions based on its ruleset to a web server behind it, even though decisions being made at the firewall may be relevant to decisions made at the web server. In this paper, we describe a path-based access control system which allows applications in a network to pass access-control-related information to neighboring applications, as the applications process requests from outsiders and from each other. This system defends networks against a class of attacks wherein individual applications may make correct access control decisions but the resulting network behavior is incorrect. We demonstrate the system on service-oriented architecture (SOA)-style networks, in two forms, using graph-based policies, and leveraging the KeyNote trust management system
    • …
    corecore