1,972 research outputs found

    DTD level authorization in XML documents with usage control

    Get PDF
    [Summary]: In recent years an increasing amount of semi-structured data has become important to humans and programs. XML promoted by the World Wide Web Consortium (W3C) is rapidly emerging as the new standard language for semi-structured data representation and exchange on the Internet. XML documents may contain private information that cannot be shared by all user communities. So securing XML data is becoming increasingly important and several approaches have been designed to protect information in a website. However, these approaches typically are used at file system level, rather than for the data in XML documents. Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. Usage control enables finer-grained control over usage of digital objects than that of traditional access control policies and models. In this paper, we present a usage control model to protect information distributed on the web, which allows the access restrictions directly at DTD-level and XML document-level. Finally, comparisons with related works are analysed

    Well Integrity Analysis and Application Based on FTA Method

    Get PDF
    With the increase of development the well integcrity problem are becoming more and more serious. This article uses the Fault Tree Analysis (FTA) method for many factors, such as completion, production and operation process, pressure annulus, the cementing quality, the wellhead system and leakage of pipe string. Many wellbore risk factors to conduct a comprehensive analysis and evaluation. Through the qualitative analysis of wellbore integrity failure risk, determining the level of risk factors and establishing the damage analysis model of the wellbore. According to the selected blocks in Shengli Oilfield example analysis of single wells find out the minimum cut sets, the minimum path sets and structure importance. The results showed that the selected block probability of top event is calculated and it’s 0.9961, and the actual selection conforms to statistics prove that the proposed based on the FTA wellbore damage risk analysis method is feasible, and through quantitative analysis and calculation of basic events of different important degree of parameters.According to these risk factors for prevention of failure risk control measures are put forward, which provides reference for predict wellbore integrity to ensure the safety of oil and gas production run smoothly

    Reimagining Culture With Youth: Relationship and Representation in Culturally Centered Learning Environments

    Get PDF
    This dissertation intends to develop an understanding of how culturally centered learning environments impact youth’s relationship with culture. Working alongside a multicultural team of researchers, educators, and designers who came together with a shared goal of designing curricular activities to engage sixth graders with culture, I followed 12 sixth graders for a school year to understand their development of relationships with culture. I (re)conceptualize the holistic process of learning and engagement with culture as Ti-Wu and propose a cultural learning model that helps us understand how youth develop multiple relationships with culture. I further share how multimedia technology mediates youth’s relationship with culture through remixing and reimagining. This dissertation has implications for the ways in which we can (1) design a culturally centered learning environment to engage youth with culture and support the development of diverse relationships with culture, (2) develop youth’s relationship with culture through designing multimedia learning activities in formal learning environments, and (3) decenter Western-oriented research discourse on cultural learning and development

    From Well-Side Meetings to Pelican Strategy: A Context-Based Approach to Combat Corruption

    Get PDF
    This article takes up the question of what strategy is to be used among different communities to eradicate corruption across borders. The debate between two legal scholars, Steven Salbu and Philip Nichols, over the viability of extraterritorial application of anti-bribery laws remains thought-provoking when we look at the effectiveness of the OECD Anti-bribery Convention or FCPA in curbing corruption. Empirical research shows that firms from countries with extraterritorial legal restrictions do not necessarily refrain themselves from paying bribes in foreign transactions. This article ties the Salbu-Nichols’ debate, ISCT, mediating institutions theory, and Pelican Gambits strategy together to structure a context based anti-corruption framework. It builds on ISCT’s authenticity and legitimacy principles to give context of the norms in order to apply various strategies to combat corruption. This article is by no means to promote elimination of laws or regulations of corruption or acquiescence of illegitimacy of corruption in international business. Instead, the framework emphasizes the importance of the interactive dynamics between a firm and its community when designing anti-corruption strategy in a global environment

    Exploring the Role of Mobile Technologies in Place-Based Learning: A Review of Literature

    Get PDF
    Place-based learning (Smith, 2002) has been developing along with the evolving technologies that are leveraged to education. Integrating technologies with the place enhances the entanglement between learner and the place, which constitutes of dynamic networks of cultures and identities (Jocson, 2016), and thus creating an enriched conceptualization of place-based learning. The development of technologies provides new opportunities of learning through the place. Researchers have recognized the impact of emerging technology on place-based learning. Recent research focuses on the role of technology in building relations. Mobile augmented reality technologies connected diverse learners and help to build deeper, more meaningful relationships with their local environments (Litts & Whitney, 2018). To better understand the recent trend of using technologies in place-based learning, it is needed to delineate the trajectory of technologies used and identify their related roles. The purpose of this study is to conduct a systematic review of studies on place-based learning with technology so as to understand what research has been conducted regarding technology in place-based learning and what insight could be drawn from the current practice. Findings of the research are based on the theme emerged from the coding of each article. Specifically, we identified three different roles of mobile technologies in terms of place-based learning:1) Technologies helps to create the identity of the explorer of the place, 2) technologies increase the interactivity with the place, 3) technologies explain the leaners\u27 embodied experience
    • …
    corecore