2,287,285 research outputs found
Raising Our Sights: The Need for Ethics Training in Government
Reporthttps://ir.lawnet.fordham.edu/feerick_integrity_commission_reports/1014/thumbnail.jp
Raising Our Sights: The Need for Ethics Training in Government
Reporthttps://ir.lawnet.fordham.edu/feerick_integrity_commission_reports/1014/thumbnail.jp
Crime Shouldn\u27t Pay: A Pension Forfeiture Statute for New York
Reporthttps://ir.lawnet.fordham.edu/feerick_integrity_commission_reports/1004/thumbnail.jp
XML data integrity based on concatenated hash function
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through investigation, the paper discovered that besides data content integrity, XML data integrity should also protect element location information, and context referential integrity under fine-grained security situation. The aim of this paper is to propose a model for XML data integrity considering XML data features. The paper presents an XML data integrity model named as CSR (content integrity, structure integrity, context referential integrity) based on a concatenated hash function. XML data content integrity is ensured using an iterative hash process, structure integrity is protected by hashing an absolute path string from root node, and context referential integrity is ensured by protecting context-related elements. Presented XML data integrity model can satisfy integrity requirements under situation of fine-grained security, and compatible with XML signature. Through evaluation, the integrity model presented has a higher efficiency on digest value-generation than the Merkle hash tree-based integrity model for XML data
Turbocharger Structural Integrity
Since the introduction of Euro VI in January 2014, all new diesel powered commercial vehicles have been equipped with turbocharged engines. It is virtually impossible to meet these emission regulations without using a turbocharger. Similarly, in the passenger car sector both on diesel and petrol (gasoline) powered vehicles, legislative pressure to reduce emissions of carbon dioxide are seeing the introduction of turbochargers across almost all new power units. Future legislation will continue this trend with engine manufacturers becoming increasingly reliant on turbocharging. As well as increasing the requirement for turbochargers, these external factors are also demanding that turbochargers become more responsive with reduced rotor inertia and lower thermal inertias. This in turn makes the task of ensuring that turbocharger components remain fit for purpose for the life of the turbocharger that much more difficult. In this paper some of the recent developments in turbocharger technology will be identified and the demands that these place on the structural components will be explored. The limitations of current methods of structural integrity assessment for some of these components will be discussed. Future developments of these methods will then be proposed
The Integrity of Thinking
When we look at our political landscape today, I wonder where has our integrity gone?
Teachers want to know how to explain (if that’s the right word) the language and behavior of the current American president to children in their class. He lies, he is rude and inconsiderate; he bad-mouths people and makes fun of people with disabilities. And classroom teachers not only teach certain disciplines; they also teach the need for civil discipline. The latter seems to be lacking with the current president.
How do we teach for integrity in a time, which seems to be totally lacking in any true sense of integrity
Structuring the process of integrity maintenance (extended version)
Two different approaches have been traditionally considered for dealing with the process of integrity constraints
enforcement: integrity checking and integrity maintenance. However, while previous research in the first approach has
mainly addressed efficiency issues, research in the second approach has been mainly concentrated in being able to
generate all possible repairs that falsify an integrity constraint violation. In this paper we address efficiency issues during
the process of integrity maintenance. In this sense, we propose a technique which improves efficiency of existing methods
by defining the order in which maintenance of integrity constraints should be performed. Moreover, we use also this
technique for being able to handle in an integrated way the integrity constraintsPostprint (published version
- …
