5,671 research outputs found

    Areas of outstanding natural beauty management plans - a guide

    Get PDF
    This is a summary of the guidance produced by the Countryside Agency to assist local authorities, AONB staff units, AONB partners and others concerned with the production and implementation of AONB Management Plans in England. A parallel text has been produced by the Countryside Council for Wales to cover Welsh AONBs. The aims of the guide are to: • assist local authorities and conservation boards to discharge their statutory functions with regard to the production of AONB Management Plans; • help ensure that Management Plans that are produced are appropriate to the needs of the AONB, have the commitment of all AONB partners1 and other stakeholders, are implemented, and their policy objectives achieved. The guide is has statutory force under the 2001 Countryside and Rights of Way Ac

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    National Child Measurement Programme: 2007/08 school year headline results

    Get PDF

    National Child Measurement Programme : England : 2010/11 school year

    Get PDF

    ALT-C 2010 - Conference Proceedings

    Get PDF

    Managing Access to Service Providers in Federated Identity Environments: A Case Study in a Cloud Storage Service

    Get PDF
    © 2015 IEEE. Currently the diversity of services, which are adhering to Identity Federation, has raised new challenges in the area. Increasingly, service providers need to control the access to their resources by users from the federation as, even though the user is authenticated by the federation, its access to resources cannot be taken for granted. Each Service Provider (SP) of a federation implements their own access control mechanism. Moreover, SPs might need to allow different access control granularity. For instance, all users from a particular Identity Provider (IdP) may access the resources due to some financial agreement. On the other hand, it might be the case that only specific users, or groups of users, have access to the resources. This paper proposes a solution to this problem through a hierarchical authorization system. Our approach, which can be customized to different SPs, allows the SP administrator to manage which IdPs, or users, have access to the provided resources. In order to demonstrate the feasibility of our approach, we present a case study in the context of a cloud storage solution

    A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs

    Get PDF
    In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks. More specifically, the framework provides an anonymous mutual authentication protocol whereby legitimate users can connect to network from anywhere without being identified or tracked. No single party (e.g., network operator) can violate the privacy of a user, which is provided in our framework in the strongest sense. Our framework utilizes group signatures, where the private key and the credentials of the users are generated through a secure three-party protocol. User accountability is implemented via user revocation protocol that can be executed by two semitrusted authorities, one of which is the network operator. The assumptions about the trust level of the network operator are relaxed. Our framework makes use of much more efficient signature generation and verification algorithms in terms of computation complexity than their counterparts in literature, where signature size is comparable to the shortest signatures proposed for similar purposes so far

    Increasing online shop revenues with web scraping: a case study for the wine sector

    Get PDF
    Purpose – Wine has been produced for thousands of years and nowadays we have seen a spread in the wine culture. E-commerce sales of wine have increased considerably and online customer’s satisfaction is influenced by quality and price. This paper presents a case study of the company “QuieroVinos, S.L.”, an online wine shop founded in 2015 that sells Spanish wines in two main marketplaces. Design/methodology/approach – With the final target of increasing the company profits it has been designed and developed an application to track the prices of competitors for a set of products. This information will be used to set the product prices in order to offer the products both competitively and profitably in each Marketplace. This application must check, by tacking into account information such as the product cost or the minimum product margin, if it is possible to decrease the price in order to reach the top cheapest position and as a consequence, increase the sales. Findings – The application improved in a notorious way the company’s results in terms of sales and shipping costs. It must be said that without the use of the presented application, performing the price comparison process within each one of the marketplaces would have taken a long time. Moreover, as prices change very frequently, the obtained information has a very limited time value, and the competitors prices should be analyzed daily in order to take accurate decisions regarding the company’s price policy. Originality/value – Although the application has been designed for the wine sector and the two named marketplace, it could be exported to other sectors. For that, it should be implemented new modules to collect information regarding the competitor’s price of the products selling on each corresponding marketplaceThis work was supported by the Ministerio de Economía y Competitividad under contract TIN2017- 84553-C2-2-R. Also, the authors are members of the research group 2017-SGR363, funded by the Generalitat de Catalunya
    corecore