771 research outputs found
Une médiathèque pour un nouveau départ
Dans la redéfinition d’un quartier, l’ouverture d’une médiathèque est un geste fort qui résume les choix faits et signe la direction prise. Transformer une ancienne école maternelle en médiathèque de quartier, tel est l’objectif que s’est fixé la Ville d’Épernay dans le cadre de l’Opération de renouvellement urbain (ORU) de Bernon
Triumph of hope over experience: learning from interventions to reduce avoidable hospital admissions identified through an Academic Health and Social Care Network.
BACKGROUND: Internationally health services are facing increasing demands due to new and more expensive health technologies and treatments, coupled with the needs of an ageing population. Reducing avoidable use of expensive secondary care services, especially high cost admissions where no procedure is carried out, has become a focus for the commissioners of healthcare.
METHOD: We set out to identify, evaluate and share learning about interventions to reduce avoidable hospital admission across a regional Academic Health and Social Care Network (AHSN). We conducted a service evaluation identifying initiatives that had taken place across the AHSN. This comprised a literature review, case studies, and two workshops.
RESULTS: We identified three types of intervention: pre-hospital; within the emergency department (ED); and post-admission evaluation of appropriateness. Pre-hospital interventions included the use of predictive modelling tools (PARR - Patients at risk of readmission and ACG - Adjusted Clinical Groups) sometimes supported by community matrons or virtual wards. GP-advisers and outreach nurses were employed within the ED. The principal post-hoc interventions were the audit of records in primary care or the application of the Appropriateness Evaluation Protocol (AEP) within the admission ward. Overall there was a shortage of independent evaluation and limited evidence that each intervention had an impact on rates of admission.
CONCLUSIONS: Despite the frequency and cost of emergency admission there has been little independent evaluation of interventions to reduce avoidable admission. Commissioners of healthcare should consider interventions at all stages of the admission pathway, including regular audit, to ensure admission thresholds don't change
A service dependency modeling framework for policy-based response enforcement
International audienceThe use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tightened during system design-time, and the large number of service dependencies in a system architecture makes their dynamic adaptation di±cult. The enforcement of a single re- sponse rule requires performing multiple con¯guration changes on multi- ple services. This paper formally describes a Service Dependency Frame- work (SDF) in order to assist the response process in selecting the pol- icy enforcement points (PEPs) capable of applying a dynamic response rule. It automatically derives elementary access rules from the generic access control, either allowed or denied by the dynamic response pol- icy, so they can be locally managed by local PEPs. SDF introduces a requires/provides model of service dependencies. It models the service architecture in a modular way, and thus provides both extensibility and reusability of model components. SDF is de¯ned using the Architecture Analysis and Design Language, which provides formal concepts for mod- eling system architectures. This paper presents a systematic treatment of the dependency model which aims to apply policy rules while minimizing con¯guration changes and reducing resource consumption
Heroines and Murderers The World of Sophoclean Women
This thesis will examine the female characters of the extant and fragmentary plays of the 5th-century BC Athenian poet Sophocles. These plays’ composition date ranges from the second half of the 5th century BC. Not every play will be considered for this study, as some do not contain female characters or female characters cannot be ascribed to a fragmentary play. Only plays that feature female characters or plays in which female characters and their actions can be reasonably estimated will be used in this study. For the fragments and their information, I shall default to Hugh Lloyd-Jones’ 1996 Sophocles: Fragments. To ascertain which fragmentary plays and quotes are relevant, I read Lloyd-Jones’ description for each play which he believes existed and can provide evidence written by Sophocles. In my study I use the kurios as a reference point for each female character, which is how I divided each character as “good” or “bad” in theirrespective role. Some characters can take multiple roles, such as being both a mother and wife, and will be judged by each role, as some characters will appear twice in this paper. Although I am labeling the characters good or bad, I am not condemning nor endorsing their actions but am labeling based on their actions related to their kurios. I have divided each chapter based on the progression of a typical Athenian woman’s life, starting with girlhood, then marriage, and finallymotherhood. The most important theme in Sophocles’ work is passion, which brings out the worst and the best in different characters. Overall, I believe my thesis works the same way, showing Sophocles’ female characters at their best and worst. Passion is a neutral force in Sophoclean drama; it is the characters themselves that decide to wield it for good or bad, and no characters exemplify this more than the Sophoclean women
A new approach to deploy a self-adaptive distributed firewall
Distributed firewall systems emerged with the proposal of protecting individual hosts against attacks originating from inside the network. In these systems, firewall rules are centrally created, then distributed and enforced on all servers that compose the firewall, restricting which services will be available. However, this approach lacks protection against software vulnerabilities that can make network services vulnerable to attacks, since firewalls usually do not scan application protocols. In this sense, from the discovery of any vulnerability until the publication and application of patches there is an exposure window that should be reduced. In this context, this article presents Self-Adaptive Distributed Firewall (SADF). Our approach is based on monitoring hosts and using a vulnerability assessment system to detect vulnerable services, integrated with components capable of deciding and applying firewall rules on affected hosts. In this way, SADF can respond to vulnerabilities discovered in these hosts, helping to mitigate the risk of exploiting the vulnerability. Our system was evaluated in the context of a simulated network environment, where the results achieved demonstrate its viability
Self-adaptive federated authorization infrastructures
Authorization infrastructures are an integral part of any network where resources need to be protected. As networks expand and organizations start to federate access to their resources, authorization infrastructures become increasingly difficult to manage. In this paper, we explore the automatic adaptation of authorization assets (policies and subject access rights) in order to manage federated authorization infrastructures. We demonstrate adaptation through a Self-Adaptive Authorization Framework (SAAF) controller that is capable of managing policy based federated role/attribute access control authorization infrastructures. The SAAF controller implements a feedback loop to monitor the authorization infrastructure in terms of authorization assets and subject behavior, analyze potential adaptations for handling malicious behavior, and act upon authorization assets to control future authorization decisions. We evaluate a prototype of the SAAF controller by simulating malicious behavior within a deployed federated authorization infrastructure (federation), demonstrating the escalation of adaptation, along with a comparison of SAAF to current technology
Les aides directes à l'agriculture aux États-Unis : le débat du Farm Bill
Utility maximising allocation of time between leisure and labour would imply to adjust labour supply to the level of non-labour income. Therefore, agricultural support measures that are decoupled from production or working activities, may be expected to decrease the amount of labour supplied by farm households. This article reports an empirical investigation of the labour supply response to variations in non-labour income in a sample of Danish farm households. The sample was partitioned according to a range of characteristics assumed to express features of the households' utility function. Elasticities of labour supply with respect to non-labour income and wages are reported and illustrated by policy scenarios. Results suggest that the magnitude of labour response to decoupled payments may be significantly different between the household groups identified. Policy implications are discussed
Combining Technical and Financial Impacts for Countermeasure Selection
Research in information security has generally focused on providing a
comprehensive interpretation of threats, vulnerabilities, and attacks, in
particular to evaluate their danger and prioritize responses accordingly. Most
of the current approaches propose advanced techniques to detect intrusions and
complex attacks but few of these approaches propose well defined methodologies
to react against a given attack. In this paper, we propose a novel and
systematic method to select security countermeasures from a pool of candidates,
by ranking them based on the technical and financial impact associated to each
alternative. The method includes industrial evaluation and simulations of the
impact associated to a given security measure which allows to compute the
return on response investment for different candidates. A simple case study is
proposed at the end of the paper to show the applicability of the model.Comment: In Proceedings AIDP 2014, arXiv:1410.322
- …
