9,175 research outputs found
Flexible Session Management in a Distributed Environment
Many secure communication libraries used by distributed systems, such as SSL,
TLS, and Kerberos, fail to make a clear distinction between the authentication,
session, and communication layers. In this paper we introduce CEDAR, the secure
communication library used by the Condor High Throughput Computing software,
and present the advantages to a distributed computing system resulting from
CEDAR's separation of these layers. Regardless of the authentication method
used, CEDAR establishes a secure session key, which has the flexibility to be
used for multiple capabilities. We demonstrate how a layered approach to
security sessions can avoid round-trips and latency inherent in network
authentication. The creation of a distinct session management layer allows for
optimizations to improve scalability by way of delegating sessions to other
components in the system. This session delegation creates a chain of trust that
reduces the overhead of establishing secure connections and enables centralized
enforcement of system-wide security policies. Additionally, secure channels
based upon UDP datagrams are often overlooked by existing libraries; we show
how CEDAR's structure accommodates this as well. As an example of the utility
of this work, we show how the use of delegated security sessions and other
techniques inherent in CEDAR's architecture enables US CMS to meet their
scalability requirements in deploying Condor over large-scale, wide-area grid
systems
Quantum Bound States with Zero Binding Energy
After reviewing the general properties of zero-energy quantum states, we give
the explicit solutions of the \seq with for the class of potentials
, where , these
solutions are normalizable and correspond to bound states, if the angular
momentum quantum number . [These states are normalizable, even for ,
if we increase the space dimension, , beyond 4; i.e. for .] For the above solutions, although unbound, are normalizable. This is true even
though the corresponding potentials are repulsive for all . We discuss the
physics of these unusual effects.Comment: 11 pages, 4 figures which can be generated from Mathematica commands
given at the end of the file. Latex, REVISED--Fig. 4 Mathematica command
improved and correcte
Report on the City of Tampa, Florida
Fire Prevention and Regulations May, 1927 with supplements and map
Guidelines for conducting birth defects surveillance
"In January of 1999, the National Birth Defects Prevention Network (NBDPN) established a Surveillance Guidelines and Standards Committee (SGSC) in order to develop and promote the use of standards and guidelines for birth defects surveillance programs in the United States. This set of guidelines is designed to serve as an important first step in the documentation of this process and as the vehicle for dissemination of the committee's findings. The Guidelines for Conducting Birth Defects Surveillance (henceforth referred to as The Surveillance Guidelines) were developed with three major long-term objectives in mind: To improve the quality of state birth defects surveillance data, including accuracy, comparability, completeness, and timeliness; To enhance the utility of state birth defects surveillance data for research on the distribution and etiology of birth defects; To encourage and promote the use of state birth defects surveillance data for the purposes of linking affected children with services and evaluation of those services. The technical guidelines that make up this document provide a way of improving the quality of birth defects surveillance data, which in turn enhances their use in support of the latter two objectives. Fundamental to quality is ensuring that procedures for all aspects of data definition, collection, management, and analysis are established and followed. Because state-based surveillance systems operate with different objectives and data needs, it is clear that, with respect to procedures and standards, 'one size does not fit all.' It is also clear, however, that common guidelines can provide a basis for the development of system-specific operating procedures and supporting manuals." - p. iIntroduction -- -- Chapter 1. The Whys and Hows of Birth Defects Surveillance - Using Data -- -- Chapter 2. Legislation -- Appendix 2.1. Sample State Legislation -- Appendix 2.2. Table of Birth Defects Legislation -- Appendix 2.3. Definitions Used to Determine Covered Entity Status Under the Privacy Rule -- Appendix 2.4. Office of Civil Rights (OCR) HIPAA Privacy Regulation Text -- -- Chapter 3.Case Definition -- Appendix 3.1. Birth Defects Included in the Case Definition of the National Birth Defects Prevention Network -- Appendix 3.2. NBDPN Abstractor's Instructions -- Appendix 3.3. Examples of Conditions Considered to Be Minor Anomalies -- Appendix 3.4. Conditions Related to Prematurity in Infants Born at Less Than 36 Weeks Gestation -- -- Chapter 4. Data Variables -- Appendix 4.1. Descriptions of Minimum (Core) Data Variables -- Appendix 4.2. Descriptions of Recommended Data Variables -- -- Chapter 5. Classification and Coding -- Appendix 5.1. Texas Disease Index -- Appendix 5.2. 6-Digit CDC Codes (updated 8/2007) -- -- Chapter 6. Case Ascertainment Methods -- Appendix 6.1. Data Source Described in Detail - Vital Records -- Appendix 6.2. Data Source Described in Detail - Hospital Data Sets -- Appendix 6.3. Data Source Described in Detail - Hospital and Patient Services Logs -- Appendix 6.4. Data Source Described in Detail - Genetic Services -- -- Chapter 7. Data Quality Management -- Appendix 7.1. Data Sources Descriptive Assessment Tool -- -- Chapter 8. Statistical Methods -- -- Chapter 9. Data Management and Security -- -- Chapter 10. Data Collaboration and Dissemination through the NBDPN -- -- Chapter 11. Data Presentation -- Appendix 11.1. Data Suppression -- Appendix 11.2. Use of Geographic Information Systems (GIS) to Map Data -- Appendix 11.3. Data Users Matrix -- Appendix 11.4. What Type of Chart or Graph Should I Use?edited by Lowell E. Sever."June 2004."Support for development, production, and distribution of these guidelines was provided by the Birth Defects State Research Partnerships Team, National Center on Birth Defects and Developmental Disabilities, Centers for Disease Control and Prevention.Title from title caption (viewed on Jan. 6, 2012).Mode of access: Internet from the CDC web site as an Acrobat .pdf file ((7.6 MB, 627 p.).System requirements: Adobe Acrobat Reader.Includes bibliographical references.Text in PDF format.National Birth Defects Prevention Network (NBDPN). Guidelines for Conducting Birth Defects Surveillance. Sever, LE, ed. Atlanta, GA: National Birth Defects Prevention Network, Inc., June 2004
The Ten Essential Shared Capabilities: a framework for mental health practice
The 10 Essential Shared Capabilities (ESC) are a
description of the core aspects of practice that
support effective implementation and delivery of
mental health care. The ESC have been derived
directly from work with users, carers and mental
health personnel. To support their introduction a
learning pack was developed giving examples of the
10 ESC as they relate to current practice.
A pilot programme across England was developed
to test the acceptability and potential utility of these
materials and this paper reports on the evaluation of
that pilot programme. Facilitators (n=75) and learners (n=579) were asked to rate each of the seven modules
contained in the learning pack. A number of
recommendations have been made to improve the materials that are being acted upon
Lifting the lid: a clinical audit on commode cleaning
Many healthcare-associated infections (HCAIs) are preventable by infection control procedures designed to interrupt the transmission of organisms from a source. Commodes are in use constantly throughout healthcare facilities. Therefore commode surfaces are constantly handled, and any pathogens present have the potential to be transferred to not only other surfaces but also, more importantly, to patients, thus compromising patient safety. In order to examine the effectiveness and thoroughness of cleaning commodes an audit was undertaken to assess compliance with evidence-based practice. This audit demonstrates a cycle which includes defining best practice, implementing best practice, monitoring best practice and taking action to improve practice. The audit results confirmed an issue that the authors had long suspected. That is, that commodes allocated to individual patients are not always cleaned after every use. Using adenosine triphosphate (ATP) bioluminescence as an indicator of organic soiling also demonstrated that commodes that were considered clean were not always cleaned to a high standard. Implementing the audit recommendations improves staff knowledge through education, standardises cleaning procedures and ultimately improves patient safety
Recommended from our members
Artificial Intelligence Risk Management Framework (AI RMF 1.0)
This report outlines a framework for risk management in the context of artifiical intelligence including people, processes, infrastructure, and data
- …