WorldWideScience

Sample records for access control policies

  1. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  2. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  3. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  4. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  5. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    Science.gov (United States)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  6. The OPL Access Control Policy Language

    Science.gov (United States)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  7. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  8. A Logic for Reasoning About Time-Dependent Access Control Policies

    National Research Council Canada - National Science Library

    DeYoung, Henry

    2008-01-01

    .... Because of the number and complexity of authorization policies in access control systems, it is clear that ad hoc methods for specifying and enforcing policies cannot inspire a high degree of trust...

  9. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    Science.gov (United States)

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  10. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0....... The main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...

  11. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  12. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

    Directory of Open Access Journals (Sweden)

    Davy Preuveneers

    2017-09-01

    Full Text Available Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1 how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2 how to let multiple microservices contribute to a collective data-driven authorization decision and (3 how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.

  13. Semantically Enriched Data Access Policies in eHealth.

    Science.gov (United States)

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  14. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  15. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  16. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  17. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  18. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  19. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  20. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  1. Checklist "Open Access Policies": Analysis of the Open Access Policies of Public Universities in Austria

    Directory of Open Access Journals (Sweden)

    Bruno Bauer

    2016-12-01

    Full Text Available This checklist provides an overview of the Open Access policies implemented at Austrian universities and extramural research institutions. Furthermore, the polices adopted at nine public universities are analyzed and the respective text modules are categorized thematically. The second part of the checklist presents measures for the promotion of Open Access following the implementation of an Open Access policy.

  2. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  3. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policiespolicies based on the future beh...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  4. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  5. Towards an Approach of Semantic Access Control for Cloud Computing

    Science.gov (United States)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  6. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  7. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  8. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  9. Foundation for a Time Interval Access Control Model

    National Research Council Canada - National Science Library

    Afinidad, Francis B; Levin, Timothy E; Irvine, Cynthia E; Nguyen, Thuy D

    2005-01-01

    A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph...

  10. Open Access Policy for CERN Physics Publications

    CERN Multimedia

    2014-01-01

    CERN is committed to Open Access. It represents one of the values written in our Convention sixty years ago and is increasingly important for our Member States.   In the last edition of the Bulletin, this article described how CERN is doing with regards to open access publishing today. On Thursday this week, the Open Access Policy for CERN Physics Publications* was endorsed by the Scientific Information Policy Board (SIPB) and approved by the Director-General the same day . For any clarifications regarding the policy, please contact the Scientific Information Service library.desk@cern.ch. * A French version of the policy will be made available shortly.

  11. Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information

    Directory of Open Access Journals (Sweden)

    Raik Kuhlisch

    2017-07-01

    Full Text Available This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC is proposed as a proper means for such regulation. A proper representation of ABAC policies must include a handling of policy attributes among different policy types. In this article, we propose a semantic policy model with predefined policy conflict categories. A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. The model and conflicts are used in a conceptual application environment and evaluated in a technical experiment during an interoperability test event.

  12. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  13. Alumni access policies in public university libraries | Burclaff ...

    African Journals Online (AJOL)

    This paper explores the current library access policies for alumni at a public university system using document analysis, observations and interviews. We found that alumni are specifically addressed in only two library access policies, and borrowing privileges through cards, on-site access and restricted access to electronic ...

  14. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  16. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  17. Requirements for Scalable Access Control and Security Management Architectures

    National Research Council Canada - National Science Library

    Keromytis, Angelos D; Smith, Jonathan M

    2005-01-01

    Maximizing local autonomy has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access control policies and mechanisms...

  18. LTER network data access policy revision: report and recommendations.

    Science.gov (United States)

    James Brunt; Peter McCartney; Stuart Gage; Don. Henshaw

    2004-01-01

    This document is a report on work carried out to update the LTER Network Data Access Policy. The current LTER Network Data Access Policy, approved by the coordinating committee in 1997, has been in use since 1990. An analysis of the current policies related to the release, access, and use of LTER data has been undertaken by a sub-committee of the LTER Network...

  19. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  20. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  1. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  2. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  3. Application-Defined Decentralized Access Control

    Science.gov (United States)

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  4. Role based access control design using Triadic concept analysis

    Institute of Scientific and Technical Information of China (English)

    Ch Aswani Kumar; S Chandra Mouliswaran; LI Jin-hai; C Chandrasekar

    2016-01-01

    Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

  5. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf...... to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points....

  6. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  7. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  8. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  9. Solar Access: Issues and Policy Options | State, Local, and Tribal

    Science.gov (United States)

    Governments | NREL Solar Access: Issues and Policy Options Solar Access: Issues and Policy Options June 06, 2017 by Alison Holm Distributed solar capacity in the United States is on the rise : approximately 2,580 megawatts (MW) of new residential solar photovoltaic (PV) capacity was brought online in

  10. Strategies for Success: Open Access Policies at North American Educational Institutions

    Science.gov (United States)

    Fruin, Christine; Sutton, Shan

    2016-01-01

    Recognizing the paucity of quantitative and qualitative data from North American educational institutions that have pursued open access policies, the authors devised a survey to collect information on the characteristics of these institutions, as well as the elements of the open access policies, the methods of promoting these policies, faculty…

  11. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  12. Do open access data policies inhibit innovation?

    Science.gov (United States)

    Katzner, Todd E.

    2015-01-01

    There has been a great deal of attention paid recently to the idea of data sharing (Van Noorden 2014, Beardsley 2015, Nature Publishing Group2015, www.copdess.com). However, the vast majority of these arguments are in agreement and present as fait accompli the idea that data are a public good and that therefore, once published, they should become open access. In fact, although there are many good reasons for data sharing, there also are a number of cogent and coherent cases to be made against open-access policies (e.g., Fenichel and Skelly 2015). The goal of this piece is not to debate the relevance or accuracy of the points made in favor of data sharing but to elevate the discussion by pointing out key problems with open-access policies and to identify central issues that, if solved, will enhance the utility of data sharing to science and society.

  13. Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database

    Science.gov (United States)

    Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin

    2014-06-01

    The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.

  14. A review of existing studies reporting the negative effects of alcohol access and positive effects of alcohol control policies on interpersonal violence

    Directory of Open Access Journals (Sweden)

    Jessica Laura Fitterer

    2015-11-01

    Full Text Available Alcohol consumption often leads to elevated rates of violence yet alcohol access policies continue to relax across the globe. Our review establishes the extent alcohol policy can moderate violent crime through alcohol availability restrictions. Results were informed from comprehensive selection of peer-reviewed journals from 1950 to October 2015. Our search identified 88 relevant studies on alcohol access and violence conducted across 12 countries. Seventeen studies included quasi-control design, and 23 conducted intervention analysis. Seventy-two (82% reported a significant relationship between alcohol access and violent offences. Alcohol outlet studies reported the greatest percentage of significant results (93%, with trading hours (63%, and alcohol price following (58%. Results from baseline studies indicated the effectiveness of increasing the price of commonly consumed alcohol, restricting the hours of alcohol trading, and limiting the number of alcohol outlets per region to prevent violent offences. Unclear are the effects of tax reductions, restriction of on-premises re-entry, and different outlet types on violent crime. Further, the generalization of statistics over broad areas and the low number of control/intervention studies poses some concern for confounding or correlated effects on study results, and amount of information for local level prevention of interpersonal violence. Future studies should focus on gathering longitudinal data, validating models, limiting crime data to peak drinking days and times, and wherever possible collecting the joint distribution between violent crime, intoxication, and place. A greater up take of local level analysis will benefit studies comparing the influence of multiple alcohol establishment types by relating the location of a crime to establishment proximity. Despite, some uncertainties particular studies showed that even modest policy changes such as 1% increases in alcohol price, one hour changes

  15. Transparency of Biobank Access in Canada: An Assessment of Industry Access and the Availability of Information on Access Policies and Resulting Research.

    Science.gov (United States)

    Gibson, Shannon G; Axler, Renata E; Lemmens, Trudo

    2017-12-01

    A key issue impacting public trust in biobanks is how these resources are utilized, including who is given access to biobank data and samples. To assess the conditions under which researchers are given access to Canadian biobanks, we reviewed websites and contacted Canadian biobanks to determine the availability of information on access policies and procedures; research resulting from access biobank data and samples; and conditions on private industry access to biobanks. We also conducted expert interviews with key Canadian stakeholders ( n = 11) to obtain their perspectives on biobank transparency and access policies. Among 21 Canadian biobanks, there was wide variation in the access information made publicly available, and the majority of these allowed access by industry applicants. Biobanks should be governed by the principles of transparency, accountability, and accessibility, and attention must be given to the conditions around the commercialization of biobank-based research.

  16. A Review of Open Access Self-Archiving Mandate Policies

    Science.gov (United States)

    Xia, Jingfeng; Gilchrist, Sarah B.; Smith, Nathaniel X. P.; Kingery, Justin A.; Radecki, Jennifer R.; Wilhelm, Marcia L.; Harrison, Keith C.; Ashby, Michael L.; Mahn, Alyson J.

    2012-01-01

    This article reviews the history of open access (OA) policies and examines the current status of mandate policy implementations. It finds that hundreds of policies have been proposed and adopted at various organizational levels and many of them have shown a positive effect on the rate of repository content accumulation. However, it also detects…

  17. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  18. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  19. Evidence-based policy versus morality policy: the case of syringe access programs.

    Science.gov (United States)

    de Saxe Zerden, Lisa; O'Quinn, Erin; Davis, Corey

    2015-01-01

    Evidence-based practice (EBP) combines proven interventions with clinical experience, ethics, and client preferences to inform treatment and services. Although EBP is integrated into most aspects of social work and public health, at times EBP is at odds with social policy. In this article the authors explore the paradox of evidence-based policy using syringe access programs (SAP) as a case example, and review methods of bridging the gap between the emphasis on EBP and lack of evidence informing SAP policy. Analysis includes the overuse of morality policy and examines historical and current theories why this paradox exists. Action steps are highlighted for creating effective policy and opportunities for public health change. Strategies on reframing the problem and shifting target population focus to garner support for evidence-based policy change are included. This interdisciplinary understanding of the way in which these factors converge is a critical first step in moving beyond morality-based policy toward evidence-based policy.

  20. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  1. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  2. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, interorganizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  3. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  4. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  5. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  6. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  7. Translanguaging in Self-Access Language Advising: Informing Language Policy

    Directory of Open Access Journals (Sweden)

    Naoki Fujimoto-Adamson

    2012-03-01

    Full Text Available This study investigates language advising in a self-access center (SAC with the purpose of informing language policy. This center is located in a new Japanese university and has shifted from an initially teacher-imposed ‘English-only’ language policy into one which encourages “translanguaging” (Blackledge & Creese, 2010, p. 105 between the students’ and center advisors’ (termed as mentors in this center L1 (Japanese and their L2 (English. Data from audio-recordings of interaction with advisors and students and between students themselves, interviews with mentors, and student questionnaires all reveal how translanguaging occurs in practice and how it helps to create a learning space in which the “local, pragmatic coping tactics” (Lin, 2005, p. 46 of code-switching offer a more viable approach for learning than under its initial monolingual policy. Mentor interviews and student questionnaires indicate generally positive attitudes towards translanguaging; however, some students still favor an ‘English-only’ policy. Conclusions reveal that a looser language policy in the center is emerging in which mentors now guide students towards their own individualized language policies. It is argued in this paper that this “code choice” (Levine, 2011 in language use is therefore aligned more closely to the principles of student-direction in self-access use.

  8. Mexico SimSmoke: how changes in tobacco control policies would impact smoking prevalence and smoking attributable deaths in Mexico.

    Science.gov (United States)

    Fleischer, Nancy L; Thrasher, James F; Reynales-Shigematsu, Luz Myriam; Cummings, K Michael; Meza, Rafael; Zhang, Yian; Levy, David T

    2017-07-01

    We examined the effect of tobacco control policies in Mexico on smoking prevalence and smoking-related deaths using the Mexico SimSmoke model. The model is based on the previously developed SimSmoke simulation model of tobacco control policy, and uses population size, smoking rates and tobacco control policy data for Mexico. It assesses, individually, and in combination, the effect of six tobacco control policies on smoking prevalence and smoking-related deaths. Policies included: cigarette excise taxes, smoke-free laws, anti-smoking public education campaigns, marketing restrictions, access to tobacco cessation treatments and enforcement against tobacco sales youth. The model estimates that, if Mexico were to adopt strong tobacco control policies compared to current policy levels, smoking prevalence could be reduced by 30% in the next decade and by 50% by 2053; an additional 470,000 smoking-related premature deaths could be averted over the next 40 years. The greatest impact on smoking and smoking-related deaths would be achieved by raising excise taxes on cigarettes from 55% to at least 70% of the retail price, followed by strong youth access enforcement and access to cessation treatments. Implementing tobacco control policies in Mexico could reduce smoking prevalence by 50%, and prevent 470,000 smoking-related deaths by 2053.

  9. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  10. International trade agreements challenge tobacco and alcohol control policies.

    Science.gov (United States)

    Zeigler, Donald W

    2006-11-01

    This report reviews aspects of trade agreements that challenge tobacco and alcohol control policies. Trade agreements reduce barriers, increase competition, lower prices and promote consumption. Conversely, tobacco and alcohol control measures seek to reduce access and consumption, raise prices and restrict advertising and promotion in order to reduce health and social problems. However, under current and pending international agreements, negotiated by trade experts without public health input, governments and corporations may challenge these protections as constraints on trade. Advocates must recognise the inherent conflicts between free trade and public health and work to exclude alcohol and tobacco from trade agreements. The Framework Convention on Tobacco Control has potential to protect tobacco policies and serve as a model for alcohol control.

  11. CERN’s Computing rules updated to include policy for control systems

    CERN Multimedia

    IT Department

    2008-01-01

    The use of CERN’s computing facilities is governed by rules defined in Operational Circular No. 5 and its subsidiary rules of use. These rules are available from the web site http://cern.ch/ComputingRules. Please note that the subsidiary rules for Internet/Network use have been updated to include a requirement that control systems comply with the CNIC(Computing and Network Infrastructure for Control) Security Policy. The security policy for control systems, which was approved earlier this year, can be accessed at https://edms.cern.ch/document/584092 IT Department

  12. Adolescents' alcohol use and strength of policy relating to youth access, trading hours and driving under the influence: findings from Australia.

    Science.gov (United States)

    White, Victoria; Azar, Denise; Faulkner, Agatha; Coomber, Kerri; Durkin, Sarah; Livingston, Michael; Chikritzhs, Tanya; Room, Robin; Wakefield, Melanie

    2018-06-01

    To determine (i) whether the strength of Australian alcohol control policy in three domains (youth access, trading hours and drink driving) changed during the 2000s; and (ii) estimate associations between these policies and adolescent drinking after adjusting for television alcohol advertising exposures, alcohol outlet density, alcohol price changes, exposure to negative articles about alcohol in daily newspapers and adult drinking prevalence. Repeated cross-sectional surveys conducted triennially from 2002 to 2011. Multi-level modelling examined the association between alcohol control policies and drinking prevalence after adjusting for covariates. Four Australian capital cities between 2002 and 2011. Students aged 12-17 years participating in a triennial national representative school-based survey (sample size range/survey: 9805-13 119). Outcome measures were: past month drinking and risky drinking (5+ drinks on a day) in the past 7 days. Policy strength in each of three domains (youth access, trading hours, drink-driving) were the key predictor variables. Covariates included: past 3-month television alcohol and alcohol-control advertising, alcohol outlet density, alcohol price change, negatively framed newspaper alcohol articles, adult drinking prevalence and student demographic characteristics. During the study period, the strength of youth access policies increased by 10%, trading hours policies by 14% and drink-driving policies by 58%. Past-month and risky drinking prevalence decreased (e.g. past-month: 2002: 47.4% to 2011: 26.3%). Multivariable analyses that included all policy variables and adjusted for year, student and other covariates showed past-month drinking to be associated inversely with stronger trading hours policies [odds ratio (OR) = 0.80, 95% confidence interval (CI) = 0.69, 0.94], but not youth access (OR = 0.92 95% CI = 0.81, 1.04) or drink-driving (OR = 1.00, 95% CI = 0.93, 1.09). Risky drinking was associated inversely with

  13. Moving towards tangible decision-making tools for policy makers: Measuring and monitoring energy access provision

    International Nuclear Information System (INIS)

    Bhanot, Jaya; Jha, Vivek

    2012-01-01

    Access to energy services has been recognised as central to achieving economic growth and sustainable development. However, almost 1.3 billion people in the world still lack access to electricity and 2.7 billion lack access to clean cooking facilities. In this backdrop, the issue of energy access is receiving more interest than ever before and this has brought to the fore, the need for a robust decision support tool for policy makers to measure the progress of energy access provision and also to provide direction for future policy making. The paper studies existing definitions of energy access and identifies the key requirements for an appropriate decision-making tool to measure and monitor energy access provision. In this context the paper assesses the strengths and weaknesses of the metrics currently being used to measure energy access in policy, as well as of contemporary monitoring and evaluation frameworks being used in other sectors. Based on these insights, a dashboard of indicators is proposed as an alternate decision support tool for policy makers to measure energy access. The paper concludes with a discussion on what is needed to operationalise this proposed framework. - Highlights: ► No one indicator or metric can successfully capture progress on energy access. ► A service oriented approach is necessary to measure energy access. ► Socio-economic and political contexts influence success of energy access policies.

  14. [Sustainability of Brazilian policy for access to antiretroviral drugs].

    Science.gov (United States)

    Grangeiro, Alexandre; Teixeira, Luciana; Bastos, Francisco I; Teixeira, Paulo

    2006-04-01

    The expense of acquiring antiretroviral drugs in Brazil has given rise to debate about the sustainability of the policy of universal access to AIDS medications, despite the evident benefits. The objective of this study was to analyze the evolution of the Ministry of Health's spending on acquiring antiretroviral drugs from 1998 to 2005, the determining factors and the medium-term sustainability of this policy (2006-2008). The study on the evolution of spending on antiretrovirals included analysis of their prices, the year-by-year expenditure, the number of patients utilizing the medication, the mean expenditure per patient and the strategies for reducing the prices maintained during this period. To analyze the sustainability of the policy for access to antiretrovirals, the cost of acquiring the drugs over the period from 2006 to 2008 was estimated, along with the proportion of gross domestic product and federal health expenditure represented by this spending. The data were collected from the Ministry of Health, the Brazilian Institute for Geography and Statistics (IBGE) and the Ministry of Planning. The expenditure on antiretrovirals increased by 66% in 2005, breaking the declining trend observed over the period from 2000 to 2004. The main factors associated with this increase were the weakening of the national generics industry and the unsatisfactory results from the process of negotiating with pharmaceutical companies. The Brazilian policy for universal access is unsustainable at the present growth rates of the gross domestic product, unless the country compromises its investments in other fields.

  15. Policies to Spur Energy Access. Executive Summary; Volume 1, Engaging the Private Sector in Expanding Access to Electricity; Volume 2, Case Studies to Public-Private Models to Finance Decentralized Electricity Access

    Energy Technology Data Exchange (ETDEWEB)

    Walters, Terri [National Renewable Energy Lab. (NREL), Golden, CO (United States); Rai, Neha [International Institute for Environment and Development (IIED), London (England); Esterly, Sean [National Renewable Energy Lab. (NREL), Golden, CO (United States); Cox, Sadie [National Renewable Energy Lab. (NREL), Golden, CO (United States); Reber, Tim [National Renewable Energy Lab. (NREL), Golden, CO (United States); Muzammil, Maliha [Univ. of Oxford (United Kingdom); Mahmood, Tasfiq [International Center for Climate Change and Development, Baridhara (Bangladesh); Kaur, Nanki [International Institute for Environment and Development (IIED), London (England); Tesfaye, Lidya [Echnoserve Consulting (Ethiopia); Mamuye, Simret [Echnoserve Consulting (Ethiopia); Knuckles, James [Univ. of London (England). Cass Business School; Morris, Ellen [Columbia Univ., New York, NY (United States); de Been, Merijn [Delft Univ. of Technology (Netherlands); Steinbach, Dave [International Institute for Environment and Development (IIED), London (England); Acharya, Sunil [Digo Bikas Inst. (Nepal); Chhetri, Raju Pandit [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bhushal, Ramesh [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-09-01

    Government policy is one of the most important factors in engaging the private sector in providing universal access to electricity. In particular, the private sector is well positioned to provide decentralized electricity products and services. While policy uncertainty and regulatory barriers can keep enterprises and investors from engaging in the market, targeted policies can create opportunities to leverage private investment and skills to expand electricity access. However, creating a sustainable market requires policies beyond traditional electricity regulation. The report reviews the range of policy issues that impact the development and expansion of a market for decentralized electricity services from establishing an enabling policy environment to catalyzing finance, building human capacity, and integrating energy access with development programs. The case studies in this report show that robust policy frameworks--addressing a wide range of market issues--can lead to rapid transformation in energy access. The report highlights examples of these policies in action Bangladesh, Ethiopia, Mali, Mexico, and Nepal.

  16. Environmental Policy of Serbia and Challenges of Accession to Europe

    Directory of Open Access Journals (Sweden)

    Darko Nadić

    2012-01-01

    Full Text Available This article analyzes the environmental policy of the Republic of Serbia within the context of accession conditions to the European Union. The main challenges of environmental integration of the environmental policies of Serbia are: economic challenges, the sustainable development challenge, administrative challenges, democratic deficiency challenges, and political challenges. These challenges, while flaws of the environmental policy in Serbia, are no different than the challenges faced by other Central Eastern European countries during the accession process. However, the influence of the global economic crisis, the constant political crisis and unclear definition of the political scene in Serbia, an incomplete vision of environmental education, as well as too much "green" marketing activities and a lack of true law implementation, are additional factors that make the process of environmental accession of Serbia to the EU even more difficult. Therefore, the harmonization of the Serbian environmental legal frame with the European one must be followed by the harmonization of actions of political institutions, social groups and individual citizens, and the overall democratization of society.

  17. Political economy of tobacco control policy on public health in Japan.

    Science.gov (United States)

    Desapriya, E B R; Iwase, Nobutada; Shimizu, Shinji

    2003-02-01

    Tobacco use, particularly smoking, remains the number one cause of preventable disease and mortality in Japan. This review of the tobacco control policy and public health is the first to offer a composite review of the subject within Japan. This review attempts to evaluate the most important aspects of the current political economy of the tobacco control policy, and concludes that more effective control policies must be employed to minimize the impact of smoking on the public's health in Japan. Further the article attempts to place the approaches in the larger context of tobacco control, providing a vision for the future of tobacco prevention and control based on current knowledge. Tobacco use will remain the leading cause of preventable illness and death in Japan, until tobacco prevention and control efforts are commensurate with the harm caused by tobacco. Taken together, the results of various studies have clearly shown that control measures can influence tobacco smoking patterns, and in turn, the rate of tobacco-related problems. Government tobacco taxes have not kept pace with inflation for years. Availability of tobacco is virtually unlimited with easy access and the prices being very low due to the strong currency of Japan. Thus Japan must be one of the most tobacco accessible countries. It is important to ensure that people are not conditioned to smoke tobacco by an unduly favourable economic and commercial environment. For that reason, prevention advocates have called for substantial regulation of tobacco products and appeal for both tobacco tax increases and tobacco taxes to be indexed to inflation. In this review, present tobacco related public health policies in Japan are discussed with implication for prevention of tobacco related problems. Continued research in this area will be necessary to determine the most effective policies of reducing tobacco related problems in Japan.

  18. In an Age of Open Access to Research Policies: Physician and Public Health NGO Staff Research Use and Policy Awareness.

    Science.gov (United States)

    Moorhead, Laura L; Holzmeyer, Cheryl; Maggio, Lauren A; Steinberg, Ryan M; Willinsky, John

    2015-01-01

    Through funding agency and publisher policies, an increasing proportion of the health sciences literature is being made open access. Such an increase in access raises questions about the awareness and potential utilization of this literature by those working in health fields. A sample of physicians (N=336) and public health non-governmental organization (NGO) staff (N=92) were provided with relatively complete access to the research literature indexed in PubMed, as well as access to the point-of-care service UpToDate, for up to one year, with their usage monitored through the tracking of web-log data. The physicians also participated in a one-month trial of relatively complete or limited access. The study found that participants' research interests were not satisfied by article abstracts alone nor, in the case of the physicians, by a clinical summary service such as UpToDate. On average, a third of the physicians viewed research a little more frequently than once a week, while two-thirds of the public health NGO staff viewed more than three articles a week. Those articles were published since the 2008 adoption of the NIH Public Access Policy, as well as prior to 2008 and during the maximum 12-month embargo period. A portion of the articles in each period was already open access, but complete access encouraged a viewing of more research articles. Those working in health fields will utilize more research in the course of their work as a result of (a) increasing open access to research, (b) improving awareness of and preparation for this access, and (c) adjusting public and open access policies to maximize the extent of potential access, through reduction in embargo periods and access to pre-policy literature.

  19. A Comprehensive Examination of the Influence of State Tobacco Control Programs and Policies on Youth Smoking

    Science.gov (United States)

    Loomis, Brett R.; Han, Beth; Gfroerer, Joe; Kuiper, Nicole; Couzens, G. Lance; Dube, Shanta; Caraballo, Ralph S.

    2013-01-01

    Objectives. We examined the influence of tobacco control policies (tobacco control program expenditures, smoke-free air laws, youth access law compliance, and cigarette prices) on youth smoking outcomes (smoking susceptibility, past-year initiation, current smoking, and established smoking). Methods. We combined data from the 2002 to 2008 National Surveys on Drug Use and Health with state and municipality population data from the US Census Bureau to assess the associations between state tobacco control policy variables and youth smoking outcomes, focusing on youths aged 12 to 17 years. We also examined the influence of policy variables on youth access when these variables were held at 2002 levels. Results. Per capita funding for state tobacco control programs was negatively associated with all 4 smoking outcomes. Smoke-free air laws were negatively associated with all outcomes except past-year initiation, and cigarette prices were associated only with current smoking. We found no association between these outcomes and retailer compliance with youth access laws. Conclusions. Smoke-free air laws and state tobacco control programs are effective strategies for curbing youth smoking. PMID:23327252

  20. Implementing an Open Access Policy – Modeling KAUST in the Region

    KAUST Repository

    Baessa, Mohamed A.; Vijayakumar, J.K.

    2014-01-01

    The presentation will discuss different open access approaches, and what can well-fit academic and governmental institutions. As a case study of KAUST, presenters will discuss how it can be initiated in a university set-up, how to get academic stakeholder engaged with support, and how the final stage is reached. Details about the KAUST Open Access Policy for research articles, theses and dissertations and the required tools and workflow to implement the policies will be highlighted.

  1. Implementing an Open Access Policy – Modeling KAUST in the Region

    KAUST Repository

    Baessa, Mohamed A.

    2014-11-12

    The presentation will discuss different open access approaches, and what can well-fit academic and governmental institutions. As a case study of KAUST, presenters will discuss how it can be initiated in a university set-up, how to get academic stakeholder engaged with support, and how the final stage is reached. Details about the KAUST Open Access Policy for research articles, theses and dissertations and the required tools and workflow to implement the policies will be highlighted.

  2. Expanding Access to Insurance by the Poor : Policy, Regulation and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Expanding Access to Insurance by the Poor : Policy, Regulation and Supervision of Micro Insurance. This project aims to facilitate poor people's access to insurance products and services as a means of addressing their vulnerability to risk. It will do so by carrying out case studies in five countries. Potential candidates ...

  3. Public Access to Government Electronic Information. Policy Framework.

    Science.gov (United States)

    Bulletin of the American Society for Information Science, 1992

    1992-01-01

    This policy framework provides guidelines for federal agencies on public access to government electronic information. Highlights include reasons for disseminating information; defining user groups; which technology to use; pricing flexibility; security and privacy issues; and the private sector and state and local government roles. (LRW)

  4. Open Access Journal Policies: A Systematic Analysis of Radiology Journals.

    Science.gov (United States)

    Narayan, Anand; Lobner, Katie; Fritz, Jan

    2018-02-01

    The open access movement has pushed for greater access to scientific knowledge by expanding access to scientific journal articles. There is limited information about the extent to which open access policies have been adopted by radiology journals. We performed a systematic analysis to ascertain the proportion of radiology journals with open access options. A search was performed with the assistance of a clinical informationist. Full and mixed English-language diagnostic and interventional radiology Web of Science journals (impact factors > 1.0) were included. Nuclear medicine, radiation oncology, physics, and solicitation-only journals were excluded. Primary outcome was open access option (yes or no) with additional outcomes including presence or absence of embargo, complete or partial copyright transfer, publication fees, and self-archiving policies. Secondary outcomes included journal citations, journal impact factors, immediacy, Eigenfactor, and article influence scores. Independent double readings were performed with differences resolved by consensus, supplemented by contacting editorial staff at each journal. In all, 125 journals were identified; review yielded 49 journals (39%, mean impact factor of 2.61). Thirty-six of the journals had open access options (73.4%), and four journals were exclusively open access (8.2%). Twelve-month embargoes were most commonly cited (90.6%) with 28.6% of journals stating that they did not require a complete transfer of copyright. Prices for open access options ranged from $750 to $4,000 (median $3,000). No statistically significant differences were found in journal impact measures comparing journals with open access options to journals without open access options. Diagnostic and interventional radiology journals have widely adopted open access options with a few radiology journals being exclusively open access. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  5. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  6. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  7. South Dakota Department of Education Data Access Policy

    Science.gov (United States)

    South Dakota Department of Education, 2015

    2015-01-01

    The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…

  8. 3PAC: Enforcing Access Policies for Web Services

    NARCIS (Netherlands)

    van Bemmel, J.; Wegdam, M.; Lagerberg, K.

    Web Services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security. In particular, the enforcement of access policies in a Service Oriented Architecture is not addressed adequately. We

  9. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  10. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  11. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  12. Do Your School Policies Provide Equal Access to Computers? Are You Sure?

    Science.gov (United States)

    DuBois, Phyllis A.; Schubert, Jane G.

    1986-01-01

    Outlines how school policies can unintentionally perpetuate gender discrimination in student computer use and access. Describes four areas of administrative policies that can cause inequities and provides ways for administrators to counteract these policies. Includes discussion of a program to balance computer use, and an abstract of an article…

  13. Associations between state minimum wage policy and health care access: a multi-level analysis of the 2004 Behavioral Risk Factor survey.

    Science.gov (United States)

    McCarrier, Kelly P; Martin, Diane P; Ralston, James D; Zimmerman, Frederick J

    2010-05-01

    Minimum wage policies have been advanced as mechanisms to improve the economic conditions of the working poor. Both positive and negative effects of such policies on health care access have been hypothesized, but associations have yet to be thoroughly tested. To examine whether the presence of minimum wage policies in excess of the federal standard of $5.15 per hour was associated with health care access indicators among low-skilled adults of working age, a cross-sectional analysis of 2004 Behavioral Risk Factor Surveillance System data was conducted. Self-reported health insurance status and experience with cost-related barriers to needed medical care were adjusted in multi-level logistic regression models to control for potential confounding at the state, county, and individual levels. State-level wage policy was not found to be associated with insurance status or unmet medical need in the models, providing early evidence that increased minimum wage rates may neither strengthen nor weaken access to care as previously predicted.

  14. Global Policy Change and Women\\'s Access to safe abortion: The ...

    African Journals Online (AJOL)

    Global Policy Change and Women\\'s Access to safe abortion: The impact of the World Health Organization\\'s guidance in African. ... remains very high in many African countries, stakeholders are increasingly using WHO recommendations in conjunction with other global and regional policy frameworks, including the African ...

  15. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  16. Internationalisation of information services for publishers' open access policies: the DINI multilingual integration layer

    Science.gov (United States)

    Scholze, Frank

    2008-01-01

    It is essential for the strategy of open access self-archiving that scientific authors are given comprehensive information on publisher copyright policies. DINI, the German Initiative for Networked Information, has developed a German (and potentially multilingual) interface to the English SHERPA/RoMEO service to provide additional information on German publishers' open access policies. As a next step, this interface was enhanced to an integration layer combining different sources on publisher copyright policies. This integration layer can be used in many different contexts. Together with the SHERPA/RoMEO team, DINI aims to build an international support structure for open access information. PMID:18662383

  17. Access to Orphan Drugs: A Comprehensive Review of Legislations, Regulations and Policies in 35 Countries.

    Science.gov (United States)

    Gammie, Todd; Lu, Christine Y; Babar, Zaheer Ud-Din

    2015-01-01

    To review existing regulations and policies utilised by countries to enable patient access to orphan drugs. A review of the literature (1998 to 2014) was performed to identify relevant, peer-reviewed articles. Using content analysis, we synthesised regulations and policies for access to orphan drugs by type and by country. Fifty seven articles and 35 countries were included in this review. Six broad categories of regulation and policy instruments were identified: national orphan drug policies, orphan drug designation, marketing authorization, incentives, marketing exclusivity, and pricing and reimbursement. The availability of orphan drugs depends on individual country's legislation and regulations including national orphan drug policies, orphan drug designation, marketing authorization, marketing exclusivity and incentives such as tax credits to ensure research, development and marketing. The majority of countries (27/35) had in place orphan drug legislation. Access to orphan drugs depends on individual country's pricing and reimbursement policies, which varied widely between countries. High prices and insufficient evidence often limit orphan drugs from meeting the traditional health technology assessment criteria, especially cost-effectiveness, which may influence access. Overall many countries have implemented a combination of legislations, regulations and policies for orphan drugs in the last two decades. While these may enable the availability and access to orphan drugs, there are critical differences between countries in terms of range and types of legislations, regulations and policies implemented. Importantly, China and India, two of the largest countries by population size, both lack national legislation for orphan medicines and rare diseases, which could have substantial negative impacts on their patient populations with rare diseases.

  18. Access to Orphan Drugs: A Comprehensive Review of Legislations, Regulations and Policies in 35 Countries.

    Directory of Open Access Journals (Sweden)

    Todd Gammie

    Full Text Available To review existing regulations and policies utilised by countries to enable patient access to orphan drugs.A review of the literature (1998 to 2014 was performed to identify relevant, peer-reviewed articles. Using content analysis, we synthesised regulations and policies for access to orphan drugs by type and by country.Fifty seven articles and 35 countries were included in this review. Six broad categories of regulation and policy instruments were identified: national orphan drug policies, orphan drug designation, marketing authorization, incentives, marketing exclusivity, and pricing and reimbursement. The availability of orphan drugs depends on individual country's legislation and regulations including national orphan drug policies, orphan drug designation, marketing authorization, marketing exclusivity and incentives such as tax credits to ensure research, development and marketing. The majority of countries (27/35 had in place orphan drug legislation. Access to orphan drugs depends on individual country's pricing and reimbursement policies, which varied widely between countries. High prices and insufficient evidence often limit orphan drugs from meeting the traditional health technology assessment criteria, especially cost-effectiveness, which may influence access.Overall many countries have implemented a combination of legislations, regulations and policies for orphan drugs in the last two decades. While these may enable the availability and access to orphan drugs, there are critical differences between countries in terms of range and types of legislations, regulations and policies implemented. Importantly, China and India, two of the largest countries by population size, both lack national legislation for orphan medicines and rare diseases, which could have substantial negative impacts on their patient populations with rare diseases.

  19. Projecting the effects of tobacco control policies in the USA through microsimulation: a study protocol

    Science.gov (United States)

    Levy, David T; Jeon, Jihyoun; Clarke, John; Gilkeson, Scott; Hall, Tim; Holford, Theodore R; Meza, Rafael

    2018-01-01

    Introduction Smoking remains the leading cause of preventable death in the USA but can be reduced through policy interventions. Computational models of smoking can provide estimates of the projected impact of tobacco control policies and can be used to inform public health decision making. We outline a protocol for simulating the effects of tobacco policies on population health outcomes. Methods and analysis We extend the Smoking History Generator (SHG), a microsimulation model based on data from the National Health Interview Surveys, to evaluate the effects of tobacco control policies on projections of smoking prevalence and mortality in the USA. The SHG simulates individual life trajectories including smoking initiation, cessation and mortality. We illustrate the application of the SHG policy module for four types of tobacco control policies at the national and state levels: smoke-free air laws, cigarette taxes, increasing tobacco control programme expenditures and raising the minimum age of legal access to tobacco. Smoking initiation and cessation rates are modified by age, birth cohort, gender and years since policy implementation. Initiation and cessation rate modifiers are adjusted for differences across age groups and the level of existing policy coverage. Smoking prevalence, the number of population deaths avoided, and life-years gained are calculated for each policy scenario at the national and state levels. The model only considers direct individual benefits through reduced smoking and does not consider benefits through reduced exposure to secondhand smoke. Ethics and dissemination A web-based interface is being developed to integrate the results of the simulations into a format that allows the user to explore the projected effects of tobacco control policies in the USA. Usability testing is being conducted in which experts provide feedback on the interface. Development of this tool is under way, and a publicly accessible website is available at http

  20. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  1. Patient access to medicines in two countries with similar health systems and differing medicines policies: Implications from a comprehensive literature review.

    Science.gov (United States)

    Babar, Zaheer-Ud-Din; Gammie, Todd; Seyfoddin, Ali; Hasan, Syed Shahzad; Curley, Louise E

    2018-04-13

    Countries with similar health systems but different medicines policies might result in substantial medicines usage differences and resultant outcomes. The literature is sparse in this area. To review pharmaceutical policy research in New Zealand and Australia and discuss differences between the two countries and the impact these differences may have on subsequent medicine access. A review of the literature (2008-2016) was performed to identify relevant, peer-reviewed articles. Systematic searches were conducted across the six databases MEDLINE, PubMed, Science Direct, Springer Links, Scopus and Google Scholar. A further search of journals of high relevance was also conducted. Using content analysis, a narrative synthesis of pharmaceutical policy research influencing access to medicines in Australia and New Zealand was conducted. The results were critically assessed in the context of policy material available via grey literature from the respective countries. Key elements regarding pharmaceutical policy were identified from the 35 research papers identified for this review. Through a content analysis, three broad categories of pharmaceutical policy were found, which potentially could influence patient access to medicines in each country; the national health system, pricing and reimbursement. Within these three categories, 9 subcategories were identified: national health policy, pharmacy system, marketing authorization and regulation, prescription to non-prescription medicine switch, orphan drug policies, generic medicine substitution, national pharmaceutical schedule and health technology assessment, patient co-payment and managed entry agreements. This review systematically evaluated the current literature and identified key areas of difference in policy between Australia and NZ. Australia appears to cover and reimburse a greater number of medicines, while New Zealand achieves much lower prices for medicines than their Australian counterparts and has been more

  2. Sweden SimSmoke: the effect of tobacco control policies on smoking and snus prevalence and attributable deaths

    OpenAIRE

    Near, Aimee M.; Blackman, Kenneth; Currie, Laura M.; Levy, David T.

    2013-01-01

    Background: This study examines the effect of past tobacco control policies and projects the effect of future policies on smoking and snus use prevalence and associated premature mortality in Sweden. Methods: The established SimSmoke model was adapted with population, smoking rates and tobacco control policy data from Sweden. SimSmoke evaluates the effect of taxes, smoke-free air, mass media, marketing bans, warning labels, cessation treatment and youth access policies on smoking and snus pre...

  3. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  4. Access to Elementary Education in India: Politics, Policies and Progress. CREATE Pathways to Access. Research Monograph No. 44

    Science.gov (United States)

    Little, Angela W.

    2010-01-01

    This monograph examines progress in, and policies for, access to elementary education over the past 60 years, the role played by political factors in the process of policy formulation and implementation and the drivers and inhibitors of the implementation of reforms in elementary education in recent years in India. Drawing on interviews and…

  5. Access to Orphan Drugs: A Comprehensive Review of Legislations, Regulations and Policies in 35 Countries

    Science.gov (United States)

    Gammie, Todd

    2015-01-01

    Objective To review existing regulations and policies utilised by countries to enable patient access to orphan drugs. Methods A review of the literature (1998 to 2014) was performed to identify relevant, peer-reviewed articles. Using content analysis, we synthesised regulations and policies for access to orphan drugs by type and by country. Results Fifty seven articles and 35 countries were included in this review. Six broad categories of regulation and policy instruments were identified: national orphan drug policies, orphan drug designation, marketing authorization, incentives, marketing exclusivity, and pricing and reimbursement. The availability of orphan drugs depends on individual country’s legislation and regulations including national orphan drug policies, orphan drug designation, marketing authorization, marketing exclusivity and incentives such as tax credits to ensure research, development and marketing. The majority of countries (27/35) had in place orphan drug legislation. Access to orphan drugs depends on individual country’s pricing and reimbursement policies, which varied widely between countries. High prices and insufficient evidence often limit orphan drugs from meeting the traditional health technology assessment criteria, especially cost-effectiveness, which may influence access. Conclusions Overall many countries have implemented a combination of legislations, regulations and policies for orphan drugs in the last two decades. While these may enable the availability and access to orphan drugs, there are critical differences between countries in terms of range and types of legislations, regulations and policies implemented. Importantly, China and India, two of the largest countries by population size, both lack national legislation for orphan medicines and rare diseases, which could have substantial negative impacts on their patient populations with rare diseases. PMID:26451948

  6. One goal, many paths: Policy proposals for universal access to broadband in Brazil

    OpenAIRE

    Gomes, André Moura; Cordeiro, Pedro Antero Braga; Araújo, Pedro Lucas da Cruz Pereira

    2014-01-01

    The purpose is to introduce policy proposals for universal access to broadband, assessing the hypothetical implementation of instruments suggested by the sectoral literature to Brazil. The methodology is based on the analysis of the literature on policies for universal access and broadband plans in the context of Latin America and the Organization for Economic Cooperation and Development (OECD) and the discussion of its effects on related sectoral indicators. Then, the impact of the applicati...

  7. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  8. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  9. Policy-based secure communication with automatic key management for industrial control and automation systems

    Science.gov (United States)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    2016-11-22

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one or more other devices in the industrial process control and automation system in order to control communications to or from the specified device.

  10. Accessing the digital environment: making policy in academic libraries

    African Journals Online (AJOL)

    Accessing the digital environment: making policy in academic libraries. Dorette Snyman. Abstract. No Abstract Available Innovation No.23 2001: 13-18. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers ...

  11. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  12. Usage Control Enhanced Access Control Based on XACML%使用控制支持的基于XACML的访问控制

    Institute of Scientific and Technical Information of China (English)

    陶宇炜; 符彦惟

    2011-01-01

    针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型.用可扩展访问标记语占XACML描述访问控制的授权策略,结合SAML声明和请求/响应机制,根据用户、资源、环境的属性进行访问控制决策,可动态地评估访问请求,提供细粒度的访问控制和良好的互操作性.%Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML. The paper describes authorization policy about access control by XACML, combines SAML statement and request/response mechanism, executes access control decision based on user, resource and environment attributes, evaluates access request dynamically, and provides fine-grained access control and good interoperability.

  13. Administrative tutelage of energy access policies; Tutela regulatoria das politicas de acesso a energia

    Energy Technology Data Exchange (ETDEWEB)

    Vannucci, Vasconcellos Mariana; Souza, Mendonca Fabiano Andre de [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil). Programa de pos Graduacao em Direito

    2008-07-01

    The change of the position of the State in relation to the economy, although brought the opening of the market to the foreign investments, brought the responsibility of this State in relation to its social aspect. The creation of public policy that could grow the development in the country has been the main goal of the governmental actions, also of its economic planning. This because, when it prevent itself of the direct action in the economy, the State brought for itself the control of some essentials sectors, amongst them the energy sector as well. The energy is a strategical good, the development of a society depends of that, and then, it must be faced as condition to assure the quality of life of the society of direct and indirect form. Therefore the energy is a character of social right, being necessary the implementation of public policies, to not only assure the access of all to the energy, as the rational use of this resource, therefore its it offers assures the independence of a nation in relation to others. It is in this direction that this work searches to analyze the guardianship of the policy of access to the energy by the State, in way this can accomplish the basic objectives of the Constitution, amongst them, the development. (author)

  14. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  15. Global Scenarios of Air Pollution until 2030: Combining Air Quality, Climate Change and Energy Access Policies

    Science.gov (United States)

    Rao, S.; Dentener, F. J.; Klimont, Z.; Riahi, K.

    2011-12-01

    Outdoor air pollution is increasingly recognized as a significant contributor to global health outcomes. This has led to the implementation of a number of air quality policies worldwide, with total air pollution control costs in 2005 estimated at US$195 billion. More than 80% of the world's population is still found to be exposed to PM2.5 concentrations exceeding WHO air quality guidelines and health impacts resulting from these exposures estimated at around 2-5% of the global disease burden. Key questions to answer are 1) How will pollutant emissions evolve in the future given developments in the energy system and how will energy and environmental policies influence such emission trends. 2) What implications will this have for resulting exposures and related health outcomes. In order to answer these questions, varying levels of stringency of air quality legislation are analyzed in combination with policies on universal access to clean cooking fuels and limiting global temperature change to 2°C in 2100. Bottom-up methodologies using energy emissions modeling are used to derive sector-based pollutant emission trajectories until 2030. Emissions are spatially downscaled and used in combination with a global transport chemistry model to derive ambient concentrations of PM2.5. Health impacts of these exposures are further estimated consistent with WHO data and methodology. The results indicate that currently planned air quality legislation combined with rising energy demand will be insufficient in controlling future emissions growth in developing countries. In order to achieve significant reductions in pollutant emissions of the order of more than 50% from 2005 levels and reduce exposures to levels consistent with WHO standards, it will be necessary to increase the stringency of such legislations and combine them with policies on energy access and climate change. Combined policies also result in reductions in air pollution control costs as compared to those associated

  16. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

    Institute of Scientific and Technical Information of China (English)

    Shuo; QIU; Jiqiang; LIU; Yanfeng; SHI; Rui; ZHANG

    2017-01-01

    Attribute-based encryption with keyword search(ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However,existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information. Furthermore, resulting from the exposure of the access structures, ABKS schemes are susceptible to an off-line keyword guessing attack if the keyword space has a polynomial size. To solve these problems, we propose a novel primitive named hidden policy ciphertext-policy attribute-based encryption with keyword search(HP-CPABKS). With our primitive, the data user is unable to search on encrypted data and learn any information about the access structure if his/her attribute credentials cannot satisfy the access control policy specified by the data owner. We present a rigorous selective security analysis of the proposed HP-CPABKS scheme, which simultaneously keeps the indistinguishability of the keywords and the access structures. Finally,the performance evaluation verifies that our proposed scheme is efficient and practical.

  17. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  18. Open-Access Colleges Responsible for Greatest Gains in Graduation Rates. Policy Alert

    Science.gov (United States)

    Doyle, William R.

    2010-01-01

    The largest gains in graduation rates over the past decade have been accomplished at open-access or nearly open-access colleges and universities. In addition, states could see even bigger increases if they directed their policies and supports toward improving graduation rates at these nonselective institutions. These findings from the author's…

  19. The use of a policy dialogue to facilitate evidence-informed policy development for improved access to care: the case of the Winnipeg Central Intake Service (WCIS).

    Science.gov (United States)

    Damani, Zaheed; MacKean, Gail; Bohm, Eric; DeMone, Brie; Wright, Brock; Noseworthy, Tom; Holroyd-Leduc, Jayna; Marshall, Deborah A

    2016-10-18

    Policy dialogues are critical for developing responsive, effective, sustainable, evidence-informed policy. Our multidisciplinary team, including researchers, physicians and senior decision-makers, comprehensively evaluated The Winnipeg Central Intake Service, a single-entry model in Winnipeg, Manitoba, to improve patient access to hip/knee replacement surgery. We used the evaluation findings to develop five evidence-informed policy directions to help improve access to scheduled clinical services across Manitoba. Using guiding principles of public participation processes, we hosted a policy roundtable meeting to engage stakeholders and use their input to refine the policy directions. Here, we report on the use and input of a policy roundtable meeting and its role in contributing to the development of evidence-informed policy. Our evidence-informed policy directions focused on formal measurement/monitoring of quality, central intake as a preferred model for service delivery, provincial scope, transparent processes/performance indicators, and patient choice of provider. We held a policy roundtable meeting and used outcomes of facilitated discussions to refine these directions. Individuals from our team and six stakeholder groups across Manitoba participated (n = 44), including patients, family physicians, orthopaedic surgeons, surgical office assistants, Winnipeg Central Intake team, and administrators/managers. We developed evaluation forms to assess the meeting process, and collected decision-maker partners' perspectives on the value of the policy roundtable meeting and use of policy directions to improve access to scheduled clinical services after the meeting, and again 15 months later. We analyzed roundtable and evaluation data using thematic analysis to identify key themes. Four key findings emerged. First, participants supported all policy directions, with revisions and key implementation considerations identified. Second, participants felt the policy roundtable

  20. Understanding the political economy and key drivers of energy access in addressing national energy access priorities and policies

    International Nuclear Information System (INIS)

    Rehman, I.H.; Kar, Abhishek; Banerjee, Manjushree; Kumar, Preeth; Shardul, Martand; Mohanty, Jeevan; Hossain, Ijaz

    2012-01-01

    Globally, 1.5 billion people lack access to electricity and nearly 3 billion lack access to modern cooking energy options. Of the world’s “energy poor”, 95% are in Asia and Sub-Saharan Africa. Within Asia, almost 80% of electricity-deprived and 86% of biomass-dependent populations are in the “Big 5” countries: Bangladesh, China, India, Indonesia, and Pakistan. In this paper, we discuss the broad contours of the political economy of energy access in these countries. The political economy is assessed through an examination of three sustainability objectives: accessibility of physical infrastructure; energy service delivery; and conformance to social goals. The key areas of concern include emphasis on supply-driven grid electricity; vested power dynamics favouring affluent and urban areas; unreliability of energy service provision; and misdirected and misappropriated subsidies. The above-mentioned issues are responsible for limiting accelerated achievement of universal energy access in the “Big 5” countries and need to be addressed through innovative approaches. The paper emphasizes the need for firm commitments, policy convergence, and the implementation of 'pro-poor' equitable energy policies through a broad-based energy framework of bench-marked, technology-neutral energy provisioning that ensures reliability and equity. It highlights the need for reorienting of the subsidy regime and incorporating energy service delivery indicators in monitoring and reporting mechanisms. - Highlights: ► Limited emphasis on improved cooking programmes relative to electrification schemes. ► Strong disparity between rural and urban electrification and LPG access. ► Grid extension and subsidy on cooking fuels has limited success. ► Electricity access does not indicate transition to better cooking options. ► Technology neutrality in choosing suitable alternatives may led to improved access. ► There is need to re-orient energy subsidies and incentives.

  1. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  2. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  3. Environmental control policy change in the EU between ideas and reality; Umweltpolitischer Steuerungswechsel in der EU zwischen Ideen und Realitaet

    Energy Technology Data Exchange (ETDEWEB)

    Heumader, Katja

    2014-07-01

    The study on the environmental policy change in the EU covers the following issues: theoretical frame work: the scientific policy debate on political control and governance; boom of ideas: development in the discussion on European environmental policy; discrepancies: the change of political control between intention and realization; case studies: EU policy concerning the enhancement of energy efficiency, the groundwater guideline, waste policy and waste stream priorities, the European emission trading system, access to jurisdiction for environmental issues, the soil protection guideline.

  4. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  5. Access, expansion and equity in Higher Education: new challenges for Brazilian education policy

    Directory of Open Access Journals (Sweden)

    Clarissa Eckert Baeta Neves

    Full Text Available Higher education has come to be included in the list of items considered to be of priority and of strategic importance for the future of a nation: a generally accepted conviction that development requires an ever increasing level of education in the population. In Brazil, however, only 10.6% of those aged between 18 and 24 manage to enter higher education. How to increase access and obtain greater equity whilst providing quality education is a central issue in education policy. In the last decade solutions have been proposed to provide greater access and equity based on the diversification of the system with the creation of new types of HEIs, new types and modalities of courses, as well as those proposals including affirmative action (PROUNI and the policy of quotas. The analysis of statistical data, interviews, documents, and legislation reveals the current situation: the amplification of access as well as the implementation of social inclusion policies, has, particularly in the private higher education sector, resulted in the production of a socially perverse democratization effect.

  6. Open Access Policies of Research Funders: The Case Study of the Austrian Science Fund (FWF)

    OpenAIRE

    Tonto, Yaşar; Doğan, Güleda; Al, Umut; Madran, Orçun

    2015-01-01

    The Austrian Science Fund (FWF) is the main funder for basic research in Austria. FWF has been instrumental in promoting Open Access in Austria and elsewhere and possesses a strong Open Access policy for the research it funds. This case study presents FWF as a good practice of an effective funder policy on account of its comprehensive strategy and multi-faceted approach for implementing and supporting it.

  7. How Can Pricing and Reimbursement Policies Improve Affordable Access to Medicines? Lessons Learned from European Countries.

    Science.gov (United States)

    Vogler, Sabine; Paris, Valérie; Ferrario, Alessandra; Wirtz, Veronika J; de Joncheere, Kees; Schneider, Peter; Pedersen, Hanne Bak; Dedet, Guillaume; Babar, Zaheer-Ud-Din

    2017-06-01

    This article discusses pharmaceutical pricing and reimbursement policies in European countries with regard to their ability to ensure affordable access to medicines. A frequently applied pricing policy is external price referencing. While it provides some benchmark for policy-makers and has been shown to be able to generate savings, it may also contribute to delay in product launch in countries where medicine prices are low. Value-based pricing has been proposed as a policy that promotes access while rewarding useful innovation; however, implementing it has proven quite challenging. For high-priced medicines, managed-entry agreements are increasingly used. These agreements allow policy-makers to manage uncertainty and obtain lower prices. They can also facilitate earlier market access in case of limited evidence about added therapeutic value of the medicine. However, these agreements raise transparency concerns due to the confidentiality clause. Tendering as used in the hospital and offpatent outpatient sectors has been proven to reduce medicine prices but it requires a robust framework and appropriate design with clear strategic goals in order to prevent shortages. These pricing and reimbursement policies are supplemented by the widespread use of Health Technology Assessment to inform decision-making, and by strategies to improve the uptake of generics, and also biosimilars. While European countries have been implementing a set of policy options, there is a lack of thorough impact assessments of several pricing and reimbursement policies on affordable access. Increased cooperation between authorities, experience sharing and improving transparency on price information, including the disclosure of confidential discounts, are opportunities to address current challenges.

  8. Improving access to skilled attendance at delivery: a policy brief for Uganda.

    Science.gov (United States)

    Nabudere, Harriet; Asiimwe, Delius; Amandua, Jacinto

    2013-04-01

    This study describes the process of production, findings for a policy brief on Increasing Access to Skilled Birth Attendance, and subsequent use of the report by policy makers and others from the health sector in Uganda. The methods used to prepare the policy brief use the SUPPORT Tools for evidence-informed health policy making. The problem that this evidence brief addresses was identified through an explicit priority setting process involving policy makers and other stakeholders, further clarification with key informant interviews of relevant policy makers, and review of relevant documents. A working group of national stakeholder representatives and external reviewers commented on and contributed to successive drafts of the report. Research describing the problem, policy options, and implementation considerations was identified by reviewing government documents, routinely collected data, electronic literature searches, contact with key informants, and reviewing the reference lists of relevant documents that were retrieved. The proportion of pregnant women delivering from public and private non-profit facilities was low at 34 percent in 2008/09. The three policy options discussed in the report could be adopted independently or complementary to the other to increase access to skilled care. The Ministry of Health in deliberating to provide intrapartum care at first level health facilities from the second level of care, requested for research evidence to support these decisions. Maternal waiting shelters and working with the private-for-profit sector to facilitate deliveries in health facilities are promising complementary interventions that have been piloted in both the public and private health sector. A combination of strategies is needed to effectively implement the proposed options as discussed further in this article. The policy brief report was used as a background document for two stakeholder dialogue meetings involving members of parliament, policy makers

  9. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  10. The role of discourse and linguistic framing effects in sustaining high carbon energy policy-An accessible introduction

    International Nuclear Information System (INIS)

    Scrase, J. Ivan; Ockwell, David G.

    2010-01-01

    This paper seeks to provide an accessible introduction to the relevance to energy policy of a fundamental insight from the policy sciences. This concerns the role that the linguistic framing of policy problems and solutions can play in sustaining the dominance of existing policy positions. The paper introduces a discourse perspective to understanding the policy process and uses it to analyse four central goals pursued in energy policy: access, security, efficiency and environmental acceptability, drawing on examples from UK policy documents. It introduces readers to how, as well as requiring technical and economic solutions, a transition to a low carbon energy system will also require a 'reframing' of energy policy problems and solutions in a way that either connects with, or overrides the powerful discourses that shape energy policy today.

  11. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  12. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  13. Policies and programs to facilitate access to targeted cancer therapies in Thailand.

    Directory of Open Access Journals (Sweden)

    Rosarin Sruamsiri

    Full Text Available Increasing access to clinically beneficial targeted cancer medicines is a challenge in every country due to their high cost. We describe the interplay of innovative policies and programs involving multiple stakeholders to facilitate access to these medicines in Thailand, as well as the utilization of selected targeted therapies over time.We selected two medicines on the 2013 Thai national list of essential medicines (NLEM [letrozole and imatinib] and three unlisted medicines for the same indications [trastuzumab, nilotinib and dasatinib]. We created timelines of access policies and programs for these products based on scientific and grey literature. Using IMS Health sales data, we described the trajectories of sales volumes of the study medicines between January 2001 and December 2012. We compared estimated average numbers of patients treated before and after the implementation of policies and programs for each product.Different stakeholders implemented multiple interventions to increase access to the study medicines for different patient populations. During 2007-2009, the Thai Government created a special NLEM category with different coverage requirements for payers and issued compulsory licenses; payers negotiated prices with manufacturers and engaged in pooled procurement; pharmaceutical companies expanded patient assistance programs and lowered prices in different ways. Compared to before the interventions, estimated numbers of patients treated with each medicine increased significantly afterwards: for letrozole from 645 (95% CI 366-923 to 3683 (95% CI 2,748-4,618; for imatinib from 103 (95% CI 72-174 to 350 (95% CI 307-398; and for trastuzumab from 68 (95% CI 45-118 to 412 (95% CI 344-563.Government, payers, and manufacturers implemented multi-pronged approaches to facilitate access to targeted cancer therapies for the Thai population, which differed by medicine. Routine monitoring is needed to assess clinical and economic impacts of these

  14. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  15. Policy framework on energy access and key development indicators: ECOWAS interventions and the case of Ghana

    International Nuclear Information System (INIS)

    Aglina, Moses Kwame; Agbejule, Adebayo; Nyamuame, Godwin Yao

    2016-01-01

    Energy has become the main driver for development as industries grow, agricultural sectors become more modernized, economies boom and countries become wealthy. There are still vast majority of people living under the poverty line especially in the ECOWAS region. The purpose of this study is to explore how improvements in energy access can be a key driver in economic development and progress in the ECOWAS region. Data for the study was obtained from the database of the World Bank. A regression analysis was carried out to establish the relationships between energy access and development indicators. The paper suggests the need for policy makers in the ECOWAS region to focus on targets, such as household access, consumption of electricity, and ease of use instead on supply targets that focus merely on physical coverage. A case on how Ghana is improving energy access is presented. - Highlights: • Energy policies in the ECOWAS region must focus on demand side targets. • Energy policies should target rural and peri-urban areas of the ECOWAS region. • Improved energy access requires a new supply chain energy model.

  16. An Approach to Enforcing Clark-Wilson Model in Role-based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    LIANGBin; SHIWenchang; SUNYufang; SUNBo

    2004-01-01

    Using one security model to enforce another is a prospective solution to multi-policy support. In this paper, an approach to the enforcing Clark-Wilson data integrity model in the Role-based access control (RBAC) model is proposed. An enforcement construction with great feasibility is presented. In this construction, a direct way to enforce the Clark-Wilson model is provided, the corresponding relations among users, transformation procedures, and constrained data items are strengthened; the concepts of task and subtask are introduced to enhance the support to least-privilege. The proposed approach widens the applicability of RBAC. The theoretical foundation for adopting Clark-Wilson model in a RBAC system with small cost is offered to meet the requirements of multi-policy support and policy flexibility.

  17. Free Education for Open Learning: Open educational policies, strategies & access for all

    NARCIS (Netherlands)

    Stracke, Christian M.

    2016-01-01

    Invited Speech at the Moscow International Education Fair 2016, Moscow, Russian Federation, by Stracke, C. M. (2016, 15 April): "Free Education for Open Learning: Open educational policies, strategies & access for all"

  18. [European integration and health policies: repercussions of the internal European Market on access to health services].

    Science.gov (United States)

    Guimarães, Luisa; Giovanella, Lígia

    2006-09-01

    This article explores the health policy repercussions of countries' regional integration into the European Union. The aim is to review the regulation of access in other countries, with the conclusion of the single European market and the free circulation of persons, services, goods, and capital. The article begins by reviewing the various forms of integration and describes the expansion and institutionalization of Community agencies. The repercussions of European integration on health policies and regulation of access are analyzed. Market impacts on health result from Treaty directives and internal policy adjustments to free circulation. Health services access is gradually regulated and granted by rulings. Projects along borders illustrate the dynamics where differences are used to achieve comprehensive care. In the oldest integration experience, the market regulation has generated intentional and non-intentional impacts on the health policies of member states, regardless of the organizational model. Knowledge and analysis of this experience signals challenges for the Southern Cone Common Market (Mercosur) and adds to future debates and decisions.

  19. Refinement for administrative policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Jonker, W.; Petkovic, M.

    2007-01-01

    Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for a general class of RBAC models. We present a

  20. Access and Definition: Exploring how STEM Faculty, Department Heads, and University Policy Administrators Navigate the Implementation of a Parental Leave Policy

    OpenAIRE

    Schimpf, Corey T; Santiago, Marisol Mercado; Pawley, Alice L.

    2012-01-01

    Access and Definition: Exploring how STEM Faculty, Department Heads and University Policy Administrators Navigate the Enactment of a Parental Leave Policy A key feature in various reports exploring women’s persisting underrepresentation in STEM faculty positions in the US is the need to disseminate policy information to all stakeholders involved in issues relating to women STEM faculty underrepresentation and retention. Indeed, the National Academies of Science Beyond Barriers and Bias: Fulfi...

  1. Kenya's Constituency Development Fund, Free Secondary Education Policy, and Access to Secondary Education

    Science.gov (United States)

    Nzuki, Charles Kyalo

    2018-01-01

    The effects of the Constituency Development Fund (CDF) and the Free Secondary Education Policy (FSEP) on access to secondary school education in Kenya's Yatta sub-county have not been adequately explored in available public policy literature. Hence, this qualitative multiple-case study was designed to understand the effects of the 2 policies on…

  2. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations....

  3. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  4. Are personal health records safe? A review of free web-accessible personal health record privacy policies.

    Science.gov (United States)

    Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-08-23

    Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.

  5. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  6. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  7. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  8. Gold or green: the debate on open access policies.

    Science.gov (United States)

    Abadal, Ernest

    2013-09-01

    The movement for open access to science seeks to achieve unrestricted and free access to academic publications on the Internet. To this end, two mechanisms have been established: the gold road, in which scientific journals are openly accessible, and the green road, in which publications are self-archived in repositories. The publication of the Finch Report in 2012, advocating exclusively the adoption of the gold road, generated a debate as to whether either of the two options should be prioritized. The recommendations of the Finch Report stirred controversy among academicians specialized in open access issues, who felt that the role played by repositories was not adequately considered and because the green road places the burden of publishing costs basically on authors. The Finch Report's conclusions are compatible with the characteristics of science communication in the UK and they could surely also be applied to the (few) countries with a powerful publishing industry and substantial research funding. In Spain, both the current national legislation and the existing rules at universities largely advocate the green road. This is directly related to the structure of scientific communication in Spain, where many journals have little commercial significance, the system of charging a fee to authors has not been adopted, and there is a good repository infrastructure. As for open access policies, the performance of the scientific communication system in each country should be carefully analyzed to determine the most suitable open access strategy.

  9. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  10. Evaluating the impact of climate policies on regional food availability and accessibility using an Integrated Assessment Model

    Science.gov (United States)

    Gilmore, E.; Cui, Y. R.; Waldhoff, S.

    2015-12-01

    Beyond 2015, eradicating hunger will remain a critical part of the global development agenda through the Sustainable Development Goals (SDG). Efforts to limit climate change through both mitigation of greenhouse gas emissions and land use policies may interact with food availability and accessibility in complex and unanticipated ways. Here, we develop projections of regional food accessibility to 2050 under the alternative futures outlined by the Shared Socioeconomic Pathways (SSPs) and under different climate policy targets and structures. We use the Global Change Assessment Model (GCAM), an integrated assessment model (IAM), for our projections. We calculate food access as the weighted average of consumption of five staples and the portion of income spend on those commodities and extend the GCAM calculated universal global producer price to regional consumer prices drawing on historical relationships of these prices. Along the SSPs, food access depends largely on expectations of increases in population and economic status. Under a more optimistic scenario, the pressures on food access from increasing demand and rising prices can be counterbalanced by faster economic development. Stringent climate policies that increase commodity prices, however, may hinder vulnerable regions, namely Sub-Saharan Africa, from achieving greater food accessibility.

  11. Open Access and OER in Latin America: A survey of the policy landscape in Chile, Colombia and Uruguay

    OpenAIRE

    Toledo, Amalia

    2017-01-01

    This chapter presents an overview of the mechanisms (funding, policy, legislative and procedural) adopted by Latin American governments with respect to Open Access and Open Educational Resources (OER) initiatives in the higher education sector. It addresses three questions: How do the higher education systems of Chile, Colombia and Uruguay operate and fund their activities in general? How do existing policies and processes incorporating Open Access and/or OER influence student access to learn...

  12. Small-Area Estimation of Spatial Access to Care and Its Implications for Policy.

    Science.gov (United States)

    Gentili, Monica; Isett, Kim; Serban, Nicoleta; Swann, Julie

    2015-10-01

    Local or small-area estimates to capture emerging trends across large geographic regions are critical in identifying and addressing community-level health interventions. However, they are often unavailable due to lack of analytic capabilities in compiling and integrating extensive datasets and complementing them with the knowledge about variations in state-level health policies. This study introduces a modeling approach for small-area estimation of spatial access to pediatric primary care that is data "rich" and mathematically rigorous, integrating data and health policy in a systematic way. We illustrate the sensitivity of the model to policy decision making across large geographic regions by performing a systematic comparison of the estimates at the census tract and county levels for Georgia and California. Our results show the proposed approach is able to overcome limitations of other existing models by capturing patient and provider preferences and by incorporating possible changes in health policies. The primary finding is systematic underestimation of spatial access, and inaccurate estimates of disparities across population and across geography at the county level with respect to those at the census tract level with implications on where to focus and which type of interventions to consider.

  13. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  14. Developing an agenda for research about policies to improve access to healthy foods in rural communities: a concept mapping study

    Science.gov (United States)

    2014-01-01

    Background Policies that improve access to healthy, affordable foods may improve population health and reduce health disparities. In the United States most food access policy research focuses on urban communities even though residents of rural communities face disproportionately higher risk for nutrition-related chronic diseases compared to residents of urban communities. The purpose of this study was to (1) identify the factors associated with access to healthy, affordable food in rural communities in the United States; and (2) prioritize a meaningful and feasible rural food policy research agenda. Methods This study was conducted by the Rural Food Access Workgroup (RFAWG), a workgroup facilitated by the Nutrition and Obesity Policy Research and Evaluation Network. A national sample of academic and non-academic researchers, public health and cooperative extension practitioners, and other experts who focus on rural food access and economic development was invited to complete a concept mapping process that included brainstorming the factors that are associated with rural food access, sorting and organizing the factors into similar domains, and rating the importance of policies and research to address these factors. As a last step, RFAWG members convened to interpret the data and establish research recommendations. Results Seventy-five participants in the brainstorming exercise represented the following sectors: non-extension research (n = 27), non-extension program administration (n = 18), “other” (n = 14), policy advocacy (n = 10), and cooperative extension service (n = 6). The brainstorming exercise generated 90 distinct statements about factors associated with rural food access in the United States; these were sorted into 5 clusters. Go Zones were established for the factors that were rated highly as both a priority policy target and a priority for research. The highest ranked policy and research priorities include strategies designed to

  15. Policies of access to healthcare services for accompanied asylum-seeking children in the Nordic countries.

    Science.gov (United States)

    Sandahl, Hinuga; Norredam, Marie; Hjern, Anders; Asher, Henry; Nielsen, Signe Smith

    2013-08-01

    Asylum-seeking children constitute a vulnerable group with high prevalence and risk for mental health problems. The aim of this study was to compare policies of access to healthcare services, including physical examination and screening for mental health problems on arrival, for accompanied asylum-seeking children in the Nordic countries. This study was based on the national reports "Reception of refugee children in the Nordic countries" written by independent national experts for the Nordic Network for Research on Refugee Children, supplemented by information from relevant authorities. In Sweden, Norway and Iceland, asylum-seeking children had access to healthcare services equal to children in the general population. On a policy level, Denmark imposed restrictions on non-acute hospitalisations and prolonged specialist treatments. Regarding health examinations, Sweden deviated from the Nordic pattern by not performing these systematically. In Denmark, Iceland, and some counties in Sweden, but not in Norway, screening for mental health problems was offered to asylum-seeking children. Access to healthcare services for asylum-seeking children differs in the Nordic countries; the consequences of these systematic differences for the individual asylum-seeking child are unknown. For asylum-seeking children, access to healthcare has to be considered in a wider context that includes the core conditions of being an asylum-seeker. A comparative study at policy level needs to be supplemented with empirical follow-up studies of the well-being of the study population to document potential consequences of policies in practice.

  16. Access to antiretroviral treatment, issues of well-being and public health governance in Chad: what justifies the limited success of the universal access policy?

    Science.gov (United States)

    Azétsop, Jacquineau; Diop, Blondin A

    2013-08-01

    Universal access to antiretroviral treatment (ART) in Chad was officially declared in December 2006. This presidential initiative was and is still funded 100% by the country's budget and external donors' financial support. Many factors have triggered the spread of AIDS. Some of these factors include the existence of norms and beliefs that create or increase exposure, the low-level education that precludes access to health information, social unrest, and population migration to areas of high economic opportunities and gender-based discrimination. Social forces that influence the distribution of dimensions of well-being and shape risks for infection also determine the persistence of access barriers to ART. The universal access policy is quite revolutionary but should be informed by the systemic barriers to access so as to promote equity. It is not enough to distribute ARVs and provide health services when health systems are poorly organized and managed. Comprehensive access to ART raises many organizational, ethical and policy problems that need to be solved to achieve equity in access. This paper argues that the persistence of access barriers is due to weak health systems and a poor public health leadership. AIDS has challenged health systems in a manner that is essentially different from other health problems.

  17. Understanding tobacco control policy at the national level: bridging the gap between public policy and tobacco control advocacy

    Directory of Open Access Journals (Sweden)

    Marc C. Willemsen

    2018-03-01

    Full Text Available Background While some countries have advanced tobacco control policies, other countries struggle to adopt and implement FCTC's measures. This presentation uncovers the main factors that explain such variations, taking insights from public policy and political science as a starting point for a case study. Methods A case study of tobacco control policy making in the Netherlands, covering the period from the 1960s until the present. The study consisted of a systematic search and analysis of documents and proceedings of parliamentary debates on tobacco policy, supplemented with 22 interviews with key informants from the government, health organisations, politicians, and the tobacco industry. In addition, documents from the Truth Tobacco Industry Documents database, pertaining to the influence of the tobacco industry on Dutch policy making, were analysed. Results The Dutch government started relatively late to regulate tobacco. The choices in tobacco control policy making at the national level and the tempo in which they are made are explained by the interaction of the five main elements of the tobacco control policy making process: Relatively stable context factors (constitutional structures, 'rules of the policy making game', national cultural values Relatively dynamic context factors (regime changes, EU regulation and FCTC guidelines, changing social norms, public support Transfer of ideas (availability and interpretation of scientific evidence Pro and anti-tobacco control networks and coalitions (their organisational and lobby strength Agenda-setting (changes in problem definition, issue framing, media advocacy Conclusions Despite worldwide convergence of tobacco control policies, accelerated by the ratification of the FCTC treaty by most nations, governments develop approaches to tobacco control in line with cultural values, ideological preferences and specific national institutional arrangements. There is no one-size-fits-all approach. The

  18. Unofficial policy: access to housing, housing information and social services among homeless drug users in Hartford, Connecticut

    Directory of Open Access Journals (Sweden)

    Corbett A Michelle

    2007-03-01

    Full Text Available Abstract Background Much research has shown that the homeless have higher rates of substance abuse problems than housed populations and that substance abuse increases individuals' vulnerability to homelessness. However, the effects of housing policies on drug users' access to housing have been understudied to date. This paper will look at the "unofficial" housing policies that affect drug users' access to housing. Methods Qualitative interviews were conducted with 65 active users of heroin and cocaine at baseline, 3 and 6 months. Participants were purposively sampled to reflect a variety of housing statuses including homeless on the streets, in shelters, "doubled-up" with family or friends, or permanently housed in subsidized, unsubsidized or supportive housing. Key informant interviews and two focus group interviews were conducted with 15 housing caseworkers. Data were analyzed to explore the processes by which drug users receive information about different housing subsidies and welfare benefits, and their experiences in applying for these. Results A number of unofficial policy mechanisms limit drug users' access to housing, information and services, including limited outreach to non-shelter using homeless regarding housing programs, service provider priorities, and service provider discretion in processing applications and providing services. Conclusion Unofficial policy, i.e. the mechanisms used by caseworkers to ration scarce housing resources, is as important as official housing policies in limiting drug users' access to housing. Drug users' descriptions of their experiences working with caseworkers to obtain permanent, affordable housing, provide insights as to how access to supportive and subsidized housing can be improved for this population.

  19. Sweden SimSmoke: the effect of tobacco control policies on smoking and snus prevalence and attributable deaths.

    Science.gov (United States)

    Near, Aimee M; Blackman, Kenneth; Currie, Laura M; Levy, David T

    2014-06-01

    This study examines the effect of past tobacco control policies and projects the effect of future policies on smoking and snus use prevalence and associated premature mortality in Sweden. The established SimSmoke model was adapted with population, smoking rates and tobacco control policy data from Sweden. SimSmoke evaluates the effect of taxes, smoke-free air, mass media, marketing bans, warning labels, cessation treatment and youth access policies on smoking and snus prevalence and the number of deaths attributable to smoking and snus use by gender from 2010 to 2040. Sweden SimSmoke estimates that significant inroads to reducing smoking and snus prevalence and premature mortality can be achieved through tax increases, especially when combined with other policies. Smoking prevalence can be decreased by as much as 26% in the first few years, reaching a 37% reduction within 30 years. Without effective tobacco control policies, almost 54 500 lives will be lost in Sweden due to tobacco use by the year 2040. Besides presenting the benefits of a comprehensive tobacco control strategy, the model identifies gaps in surveillance and evaluation that can help better focus tobacco control policy in Sweden. © The Author 2013. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  20. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  1. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  2. 'A preferred consultant and partner to the Royal Government, NGOs, and the community': British American Tobacco's access to policy-makers in Cambodia.

    Science.gov (United States)

    MacKenzie, Ross; Collin, Jeff

    2017-04-01

    British American Tobacco Cambodia (BATC) has dominated the country's tobacco market since its launch in 1996. Aggressive marketing in a weak regulatory environment and strategies to influence tobacco control policy have contributed to an emerging tobacco-related public health crisis. Analysis of internal tobacco industry documents, issues of BATC's in-house newsletter, civil society reports and media demonstrate that BATC officials have successfully sought to align the company with Cambodia's increasingly controversial political and business leadership that is centred around the Cambodian People's Party with the aim of gaining access to policy-makers and influencing the policy process. Connections to the political elite have resulted in official recognition of the company's ostensible contribution to Cambodia's economic and social development and, more significantly, provided BATC with opportunities to petition policy-makers and to dilute tobacco control regulation. Corporate promotion of its contribution to Cambodia's economic and social development is at odds with its determined efforts to thwart public health regulation and Cambodia's compliance with the Framework Convention on Tobacco Control.

  3. Local government broadband policies for areas with limited Internet access

    Directory of Open Access Journals (Sweden)

    Yoshio Arai

    2014-03-01

    Full Text Available Despite their wide diffusion in developed countries, broadband services are still limited in areas where providing them is not profitable for private telecom carriers. To address this, many local governments in Japan have implemented broadband deployment projects subsidized by the national government. In this paper, we discuss local government broadband policies based on survey data collected from municipalities throughout the country. With the support of national promotion policies, broadband services were rapidly introduced to most local municipalities in Japan during the 2000s. Local government deployment policies helped to reduce the number of areas with no broadband access. A business model based on the Indefeasible Right of Use (IRU contract between a private telecom carrier and a local government has been developed in recent years. Even local governments without the technical capacity to operate a broadband business can introduce broadband services into their territory using the IRU business model.

  4. Pharmaceutical policies and access to medicines : a hospital-pharmacy perspective from Ghana

    NARCIS (Netherlands)

    Ankrah, D.

    2017-01-01

    Access to quality medicines is a universal human right which featured prominently on the agenda of the World Health Organisation (WHO) over the past decades. Hospital pharmacists play a pivotal role in ensuring that treatment outcomes are optimal. This thesis studied pharmaceutical policies and

  5. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  6. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  7. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  8. Associations between minimum wage policy and access to health care: evidence from the Behavioral Risk Factor Surveillance System, 1996-2007.

    Science.gov (United States)

    McCarrier, Kelly P; Zimmerman, Frederick J; Ralston, James D; Martin, Diane P

    2011-02-01

    We examined whether minimum wage policy is associated with access to medical care among low-skilled workers in the United States. We used multilevel logistic regression to analyze a data set consisting of individual-level indicators of uninsurance and unmet medical need from the Behavioral Risk Factor Surveillance System and state-level ecological controls from the US Census, Bureau of Labor Statistics, and several other sources in all 50 states and the District of Columbia between 1996 and 2007. Higher state-level minimum wage rates were associated with significantly reduced odds of reporting unmet medical need after control for the ecological covariates, substate region fixed effects, and individual demographic and health characteristics (odds ratio = 0.853; 95% confidence interval = 0.750, 0.971). Minimum wage rates were not significantly associated with being uninsured. Higher minimum wages may be associated with a reduced likelihood of experiencing unmet medical need among low-skilled workers, and do not appear to be associated with uninsurance. These findings appear to refute the suggestion that minimum wage laws have detrimental effects on access to health care, as opponents of the policies have suggested.

  9. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  10. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  11. Collaborative Approaches and Policy Opportunities for Accelerated Progress toward Effective Disease Prevention, Care, and Control: Using the Case of Poverty Diseases to Explore Universal Access to Affordable Health Care.

    Science.gov (United States)

    Laokri, Samia

    2017-01-01

    There is a massive global momentum to progress toward the sustainable development and universal health coverage goals. However, effective policies to health-care coverage can only emerge through high-quality services delivered to empowered care users by means of strong local health systems and a translational standpoint. Health policies aimed at removing user fees for a defined health-care package may fail at reaching desired results if not applied with system thinking. Secondary data analysis of two country-based cost-of-illness studies was performed to gain knowledge in informed decision-making toward enhanced access to care in the context of resource-constraint settings. A scoping review was performed to map relevant experiences and evidence underpinning the defined research area, the economic burden of illness. Original studies reflected on catastrophic costs to patients because of care services use and related policy gaps. Poverty diseases such as tuberculosis (TB) may constitute prime examples to assess the extent of effective high-priority health-care coverage. Our findings suggest that a share of the economic burden of illness can be attributed to implementation failures of health programs and supply-side features, which may highly impair attainment of the global stated goals. We attempted to define and discuss a knowledge development framework for effective policy-making and foster system levers for integrated care. Bottlenecks to effective policy persist and rely on interrelated patterns of health-care coverage. Health system performance and policy responsiveness have to do with collaborative work among all health stakeholders. Public-private mix strategies may play a role in lowering the economic burden of disease and solving some policy gaps. We reviewed possible added value and pitfalls of collaborative approaches to enhance dynamic local knowledge development and realize integration with the various health-care silos. Despite a large political

  12. Collaborative Approaches and Policy Opportunities for Accelerated Progress toward Effective Disease Prevention, Care, and Control: Using the Case of Poverty Diseases to Explore Universal Access to Affordable Health Care

    Directory of Open Access Journals (Sweden)

    Samia Laokri

    2017-08-01

    Full Text Available BackgroundThere is a massive global momentum to progress toward the sustainable development and universal health coverage goals. However, effective policies to health-care coverage can only emerge through high-quality services delivered to empowered care users by means of strong local health systems and a translational standpoint. Health policies aimed at removing user fees for a defined health-care package may fail at reaching desired results if not applied with system thinking.MethodSecondary data analysis of two country-based cost-of-illness studies was performed to gain knowledge in informed decision-making toward enhanced access to care in the context of resource-constraint settings. A scoping review was performed to map relevant experiences and evidence underpinning the defined research area, the economic burden of illness.FindingsOriginal studies reflected on catastrophic costs to patients because of care services use and related policy gaps. Poverty diseases such as tuberculosis (TB may constitute prime examples to assess the extent of effective high-priority health-care coverage. Our findings suggest that a share of the economic burden of illness can be attributed to implementation failures of health programs and supply-side features, which may highly impair attainment of the global stated goals. We attempted to define and discuss a knowledge development framework for effective policy-making and foster system levers for integrated care.DiscussionBottlenecks to effective policy persist and rely on interrelated patterns of health-care coverage. Health system performance and policy responsiveness have to do with collaborative work among all health stakeholders. Public–private mix strategies may play a role in lowering the economic burden of disease and solving some policy gaps. We reviewed possible added value and pitfalls of collaborative approaches to enhance dynamic local knowledge development and realize integration with the various

  13. Policy administration in tag-based authorization

    NARCIS (Netherlands)

    Etalle, Sandro; Hinrichs, Timothy L.; Lee, Adam J.; Trivellato, Daniel; Zannone, Nicola

    2013-01-01

    Tag-Based Authorization (TBA) is a hybrid access control model that combines the ease of use of extensional access control models with the expressivity of logic-based formalisms. The main limitation of TBA is that it lacks support for policy administration. More precisely, it does not allow

  14. A Systematic Content Analysis of Policy Barriers Impeding Access to Opioid Medication in Central and Eastern Europe: Results of ATOME.

    Science.gov (United States)

    Larjow, Eugenia; Papavasiliou, Evangelia; Payne, Sheila; Scholten, Willem; Radbruch, Lukas

    2016-01-01

    Reliable access to opioid medication is critical to delivering effective pain management, adequate treatment of opioid dependence, and quality palliative care. However, more than 80% of the world population is estimated to be inadequately treated for pain because of difficulties in accessing opioids. Although barriers to opioid access are primarily associated with restrictive laws, regulations, and licensing requirements, a key problem that significantly limits opioid access relates to policy constraints. To identify and explore policy barriers to opioid access in 12 Eastern and Central European countries involved in the Access to Opioid Medication in Europe project, funded by the European Community's Seventh Framework (FP7/2007-2013, no. 222994) Programme. A systematic content analysis of texts retrieved from documents (e.g., protocols of national problem analyses, strategic planning worksheets, and executive summaries) compiled, reviewed, approved, and submitted by either the Access to Opioid Medication in Europe consortium or the national country teams (comprising experts in pain management, harm reduction, and palliative care) between September 2011 and April 2014 was performed. Twenty-five policy barriers were identified (e.g., economic crisis, bureaucratic issues, lack of training initiatives, stigma, and discrimination), classified under four predetermined categories (financial/economic aspects and governmental support, formularies, education and training, and societal attitudes). Key barriers related to issues of funding allocation, affordability, knowledge, and fears associated with opioids. Reducing barriers and improving access to opioids require policy reform at the governmental level with a set of action plans being formulated and concurrently implemented and aimed at different levels of social, education, and economic policy change. Copyright © 2016 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  15. Internet Access Practices and Employee Attitudes toward Internet Usage Policy Implementation in Selected Philippines Financial Institutions

    Directory of Open Access Journals (Sweden)

    Maria Sagrario R. Simbulan

    2004-06-01

    Full Text Available This study explores the employees’ concept of appropriate use of Internet facilities as well as their perception of the rights and liabilities, both of the individual and of the organization, associated with the grant of Internet access privileges in the workplace. It further examines how employees perceive their organization’s monitoring of employees online activities and the use of an Internet Usage Policy, whether these are seen as monitoring and control mechanisms or as ways to ensure that Internet access facilities are shared equitably and used responsibly. While the issue of the impact of Internet access on employee productivity will not directly be tackled, the study will provide insights into the frequency and type of usage of Internet facilities in the workplace. Considering the sizeable investment that an organization makes to provide Internet facilities, determining how employees use these facilities to achieve the goals of the organization is, in the very least, interesting and for most organizations concerned with their survival in difficult times, critically important.

  16. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    Science.gov (United States)

    2015-03-01

    a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on

  17. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  18. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  19. 10 CFR 11.5 - Policy.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL General Provisions § 11.5 Policy. It is the policy of the Nuclear Regulatory Commission to carry...

  20. Implementing the data preservation and open access policy in CMS

    International Nuclear Information System (INIS)

    Lassila-Perini, K; Lampén, T; Luukka, P; Alverson, G; Cabrillo, I; Calderon, A; Marco, J; Colling, D; Huffman, A; Hildreth, M; McCauley, T; Sonnenschein, L

    2014-01-01

    Implementation of the CMS policy on long-term data preservation, re-use and open access has started. Current practices in providing data additional to published papers and distributing simplified data-samples for outreach are promoted and consolidated. The first measures have been taken for analysis and data preservation for the internal use of the collaboration and for open access to part of the data. Two complementary approaches are followed. First, a virtual machine environment, which will pack all ingredients needed to compile and run a software release with which the legacy data was reconstructed. Second, a validation framework, maintaining the capability not only to read the old raw data, but also to reprocess them with an updated release or to another format to help ensure long-term reusability of the legacy data.

  1. Associations Between Minimum Wage Policy and Access to Health Care: Evidence From the Behavioral Risk Factor Surveillance System, 1996–2007

    Science.gov (United States)

    Zimmerman, Frederick J.; Ralston, James D.; Martin, Diane P.

    2011-01-01

    Objectives. We examined whether minimum wage policy is associated with access to medical care among low-skilled workers in the United States. Methods. We used multilevel logistic regression to analyze a data set consisting of individual-level indicators of uninsurance and unmet medical need from the Behavioral Risk Factor Surveillance System and state-level ecological controls from the US Census, Bureau of Labor Statistics, and several other sources in all 50 states and the District of Columbia between 1996 and 2007. Results. Higher state-level minimum wage rates were associated with significantly reduced odds of reporting unmet medical need after control for the ecological covariates, substate region fixed effects, and individual demographic and health characteristics (odds ratio = 0.853; 95% confidence interval = 0.750, 0.971). Minimum wage rates were not significantly associated with being uninsured. Conclusions. Higher minimum wages may be associated with a reduced likelihood of experiencing unmet medical need among low-skilled workers, and do not appear to be associated with uninsurance. These findings appear to refute the suggestion that minimum wage laws have detrimental effects on access to health care, as opponents of the policies have suggested. PMID:21164102

  2. Open Learning for Smart Education: Open educational policies, strategies & access for all

    NARCIS (Netherlands)

    Stracke, Christian M.

    2016-01-01

    keynote on Open Learning at the International IEEE EDUCON Conference 2016: I will speak about “Open Learning for Smart Education: Open educational policies, strategies and access for all”. This year EDUCON is taking place from 10th to 13th of April 2016 in Abu Dhabi. My questions of the keynote

  3. Effects of tobacco control policies on smoking prevalence and tobacco-attributable deaths in Mexico: the SimSmoke model

    Directory of Open Access Journals (Sweden)

    Luz Myriam Reynales-Shigematsu

    Full Text Available OBJECTIVE: To examine how policies adopted in Mexico in response to the Framework Convention on Tobacco Control affected smoking prevalence and smoking-attributable deaths. METHODS: The SimSmoke simulation model of tobacco control policy is applied to Mexico. This discrete time, first-order Markov model uses data on population size, smoking rates and tobacco control policy for Mexico. It assesses, individually and jointly, the effects of seven types of policies: cigarette taxes, smoke-free air laws, mass media campaigns, advertising bans, warning labels, cessation treatment, and youth tobacco access policies. RESULTS: The Mexico SimSmoke model estimates that smoking rates have been reduced by about 30% as a result of policies implemented since 2002, and that the number of smoking-attributable deaths will have been reduced by about 826 000 by 2053. Increases in cigarette prices are responsible for over 60% of the reductions, but health warnings, smoke-free air laws, marketing restrictions and cessation treatments also play important roles. CONCLUSIONS: Mexico has shown steady progress towards reducing smoking prevalence in a short period of time, as have other Latin American countries, such as Brazil, Panama and Uruguay. Tobacco control policies play an important role in continued efforts to reduce tobacco use and associated deaths in Mexico.

  4. Can free open access resources strengthen knowledge-based emerging public health priorities, policies and programs in Africa?

    Science.gov (United States)

    Tambo, Ernest; Madjou, Ghislaine; Khayeka-Wandabwa, Christopher; Tekwu, Emmanuel N; Olalubi, Oluwasogo A; Midzi, Nicolas; Bengyella, Louis; Adedeji, Ahmed A; Ngogang, Jeanne Y

    2016-01-01

    Tackling emerging epidemics and infectious diseases burden in Africa requires increasing unrestricted open access and free use or reuse of regional and global policies reforms as well as timely communication capabilities and strategies. Promoting, scaling up data and information sharing between African researchers and international partners are of vital importance in accelerating open access at no cost. Free Open Access (FOA) health data and information acceptability, uptake tactics and sustainable mechanisms are urgently needed. These are critical in establishing real time and effective knowledge or evidence-based translation, proven and validated approaches, strategies and tools to strengthen and revamp health systems.  As such, early and timely access to needed emerging public health information is meant to be instrumental and valuable for policy-makers, implementers, care providers, researchers, health-related institutions and stakeholders including populations when guiding health financing, and planning contextual programs.

  5. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  6. Government policy and access to natural gas service in Canada

    International Nuclear Information System (INIS)

    Plourde, A.; Ryan, D.L.

    1995-01-01

    As part of the Canadian energy policy between the mid-1970's to the mid-1980's, consumers were encouraged to use fuels alternative to oil. The first set of policy issues involved measures to provide consumers with incentives to switch to non-oil-burning equipment, whereas the second set of. policy papers emphasized the expansion of the natural gas distribution system. More than $1 billion have been spent on the gas pipeline expansion project. Consequences of program expenditures in each province were examined. With the exception of Manitoba, it was found that annual net pipeline additions were higher during the program period, indicating that the program policies induced these activities to occur sooner than if the policies were not in place. Kilometres of gas pipeline per individual constructed was highest in Quebec, where construction proceeded mainly between the more densely populated centres. In contrast, in Saskatchewan and Alberta, the program encouraged natural gas pipeline construction in rural areas with lower populations. Without the program, these areas may not have had access to natural gas for a very long time. It was concluded that, in this, and some other instances, public investment had the effect of accelerating developments, or encouraging the completion of projects that otherwise would not have been undertaken. It was suggested that in the future decision-makers consider the costs of changes in activity patterns prior to designing such programs. 2 figs., 1 table

  7. Combining apps targeting professionals and senior citizens to improve housing accessibility and influence housing provision policies

    DEFF Research Database (Denmark)

    Helle, Tina; Iwarsson, Susanne; Lunn, Tine Bieber

    2015-01-01

    Two separate apps that address the increasingly important issue of accessible housing for senior citizens have been developed in different project settings. One of the apps was developed to facilitate the process for professional raters to assess housing accessibility in the context of individual...... and influence housing provision policies....

  8. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  9. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  10. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  11. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  12. What impact have tobacco control policies, cigarette price and tobacco control programme funding had on Australian adolescents' smoking? Findings over a 15-year period.

    Science.gov (United States)

    White, Victoria M; Warne, Charles D; Spittal, Matthew J; Durkin, Sarah; Purcell, Kate; Wakefield, Melanie A

    2011-08-01

    To assess the impact of tobacco control policies relating to youth access, clean indoor air and tobacco advertising at point-of-sale and outdoors, in addition to cigarette price and per capita tobacco control spending, on adolescent smoking prevalence. Repeated cross-sectional surveys. Logistic regression analyses examined association between policies and smoking prevalence. Australia, 1990-2005. A nationally representative sample of secondary students (aged 12-17 years) participating in a triennial survey (sample size per survey range: 20 560 to 27 480). Students' report of past-month smoking. In each jurisdiction, extent of implementation of the three policies for the year of the survey was determined. For each survey year, national per capita tobacco control spending was determined and jurisdiction-specific 12-month change in cigarette price obtained. Extent of implementation of the three policy areas varied between states and over the survey years. Multivariate analyses that adjusted for demographic factors, year and all tobacco control variables showed that 12-month cigarette price increases [odds ratio (OR): 0.98, 95% confidence interval (CI): 0.97-0.99], greater per capita tobacco control spending (OR: 0.99, 95% CI: 0.98-0.99) and stronger implementation of clean indoor air policies (OR: 0.93, 95% CI: 0.92-0.94) were associated with reduced smoking prevalence. Adult-directed, population-based tobacco control policies such as clean indoor air laws and increased prices of cigarettes, implemented as part of a well-funded comprehensive tobacco control programme are associated with lower adolescent smoking. © 2011 The Authors, Addiction © 2011 Society for the Study of Addiction.

  13. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  14. Invalidating Policies using Structural Information

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2013-01-01

    by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation's policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based...... on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control system or policies....

  15. Pain and Policy Studies Group: Two Decades of Working to Address Regulatory Barriers to Improve Opioid Availability and Accessibility Around the World.

    Science.gov (United States)

    Cleary, James F; Maurer, Martha A

    2018-02-01

    For two decades, the Pain & Policy Studies Group (PPSG), a global research program at the University of Wisconsin Carbone Cancer Center, has worked passionately to fulfill its mission of improving pain relief by achieving balanced access to opioids worldwide. PPSG's early work highlighted the conceptual framework of balance leading to the development of the seminal guidelines and criteria for evaluating opioid policy. It has collaborated at the global level with United Nations agencies to promote access to opioids and has developed a unique model of technical assistance to help national governments assess regulatory barriers to essential medicines for pain relief and amend existing or develop new legislation that facilitates appropriate and adequate opioid prescribing according to international standards. This model was initially applied in regional workshops and individual country projects and then adapted for PPSG's International Pain Policy Fellowship, which provides long-term mentoring and support for several countries simultaneously. The PPSG disseminates its work online in several ways, including an extensive Web site, news alerts, and through several social media outlets. PPSG has become the focal point for expertise on policy governing drug control and medicine and pharmacy practice related to opioid availability and pain relief. Copyright © 2017 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  16. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  17. Formal analysis of XACML policies using SMT

    NARCIS (Netherlands)

    Turkmen, F.; den Hartog, J.; Ranise, S.; Zannone, N.

    2017-01-01

    The eXtensible Access Control Markup Language (XACML) has attracted significant attention from both industry and academia, and has become the de facto standard for the specification of access control policies. However, its XML-based verbose syntax and rich set of constructs make the authoring of

  18. Corporate social responsibility and access to policy élites: an analysis of tobacco industry documents.

    Science.gov (United States)

    Fooks, Gary J; Gilmore, Anna B; Smith, Katherine E; Collin, Jeff; Holden, Chris; Lee, Kelley

    2011-08-01

    Recent attempts by large tobacco companies to represent themselves as socially responsible have been widely dismissed as image management. Existing research supports such claims by pointing to the failings and misleading nature of corporate social responsibility (CSR) initiatives. However, few studies have focused in depth on what tobacco companies hoped to achieve through CSR or reflected on the extent to which these ambitions have been realised. Iterative searching relating to CSR strategies was undertaken of internal British American Tobacco (BAT) documents, released through litigation in the US. Relevant documents (764) were indexed and qualitatively analysed. In the past decade, BAT has actively developed a wide-ranging CSR programme. Company documents indicate that one of the key aims of this programme was to help the company secure access to policymakers and, thereby, increase the company's chances of influencing policy decisions. Taking the UK as a case study, this paper demonstrates the way in which CSR can be used to renew and maintain dialogue with policymakers, even in ostensibly unreceptive political contexts. In practice, the impact of this political use of CSR is likely to be context specific; depending on factors such as policy élites' understanding of the credibility of companies as a reliable source of information. The findings suggest that tobacco company CSR strategies can enable access to and dialogue with policymakers and provide opportunities for issue definition. CSR should therefore be seen as a form of corporate political activity. This underlines the need for broad implementation of Article 5.3 of the Framework Convention on Tobacco Control. Measures are needed to ensure transparency of interactions between all parts of government and the tobacco industry and for policy makers to be made more aware of what companies hope to achieve through CSR.

  19. Corporate social responsibility and access to policy élites: an analysis of tobacco industry documents.

    Directory of Open Access Journals (Sweden)

    Gary J Fooks

    2011-08-01

    Full Text Available Recent attempts by large tobacco companies to represent themselves as socially responsible have been widely dismissed as image management. Existing research supports such claims by pointing to the failings and misleading nature of corporate social responsibility (CSR initiatives. However, few studies have focused in depth on what tobacco companies hoped to achieve through CSR or reflected on the extent to which these ambitions have been realised.Iterative searching relating to CSR strategies was undertaken of internal British American Tobacco (BAT documents, released through litigation in the US. Relevant documents (764 were indexed and qualitatively analysed. In the past decade, BAT has actively developed a wide-ranging CSR programme. Company documents indicate that one of the key aims of this programme was to help the company secure access to policymakers and, thereby, increase the company's chances of influencing policy decisions. Taking the UK as a case study, this paper demonstrates the way in which CSR can be used to renew and maintain dialogue with policymakers, even in ostensibly unreceptive political contexts. In practice, the impact of this political use of CSR is likely to be context specific; depending on factors such as policy élites' understanding of the credibility of companies as a reliable source of information.The findings suggest that tobacco company CSR strategies can enable access to and dialogue with policymakers and provide opportunities for issue definition. CSR should therefore be seen as a form of corporate political activity. This underlines the need for broad implementation of Article 5.3 of the Framework Convention on Tobacco Control. Measures are needed to ensure transparency of interactions between all parts of government and the tobacco industry and for policy makers to be made more aware of what companies hope to achieve through CSR.

  20. Electricity access for geographically disadvantaged rural communities--technology and policy insights

    International Nuclear Information System (INIS)

    Chaurey, Akanksha; Ranganathan, Malini; Mohanty, Parimita

    2004-01-01

    The purpose of this paper is to weigh the issues and options for increasing electricity access in remote and geographically challenged villages in interior Rajasthan, the desertstate in Western India where power sector reforms are currently underway. By first providing an overview of reforms and various electrification policy initiatives in India, the paper then analyzes the specific problems as studied at the grass-roots level with respect to rural electricity access and the use of off-grid renewables. Finally, it discusses interventions that could facilitate access to electricity by suggesting a sequential distributed generation (DG)-based approach, wherein consecutive DG schemes--incorporating the requisite technological, financial, and institutional arrangements--are designed depending on the developmental requirements of the community. In essence, this approach fits under the broader need to understand how the three 'Rs'- rural electrification (the process), power sector reforms (the catalyst), and the use of renewable energy technologies (the means) - could potentially converge to meet the needs of India's rural poor

  1. Electricity access for geographically disadvantaged rural communities--technology and policy insights

    Energy Technology Data Exchange (ETDEWEB)

    Chaurey, Akanksha E-mail: akanksha@teri.res.in; Ranganathan, Malini E-mail: malinir@teri.res.in; Mohanty, Parimita

    2004-10-01

    The purpose of this paper is to weigh the issues and options for increasing electricity access in remote and geographically challenged villages in interior Rajasthan, the desertstate in Western India where power sector reforms are currently underway. By first providing an overview of reforms and various electrification policy initiatives in India, the paper then analyzes the specific problems as studied at the grass-roots level with respect to rural electricity access and the use of off-grid renewables. Finally, it discusses interventions that could facilitate access to electricity by suggesting a sequential distributed generation (DG)-based approach, wherein consecutive DG schemes--incorporating the requisite technological, financial, and institutional arrangements--are designed depending on the developmental requirements of the community. In essence, this approach fits under the broader need to understand how the three 'Rs'- rural electrification (the process), power sector reforms (the catalyst), and the use of renewable energy technologies (the means) - could potentially converge to meet the needs of India's rural poor.

  2. Nuclear power hazard control policy

    Energy Technology Data Exchange (ETDEWEB)

    Chicken, J C

    1982-01-01

    This study presents an analysis of the factors that appear to have influenced the formation and form of nuclear power hazard control policy in Britain. A simple account is given of the technical nature of nuclear hazards and of the legal and administrative framework that has been constructed to control them. The subsequent analysis concentrates primarily on the influence exerted by social and political factors. Particular attention is directed to those political groups which have developed a special interest in the problems of nuclear power, and to the interplay between organised groupings and public opinion generally. The metamorphosis of these groupings is traced from the origins of the nuclear industry in the Second World War to their prominent role during the Windscale Inquiry. Attention is given to the policy constraint imposed by increased expectations in the form of demands for higher standards of living, and improvements in the quality of the environment. The study is concerned with both policy-making and with policy implementation; with interest articulation as well as with the functioning of formal institutions. The evolution of policy takes place in an atmosphere of keen economic debate and conflicting moral perceptions. A model of the policy-making system is postulated.

  3. Nuclear power hazard control policy

    International Nuclear Information System (INIS)

    Chicken, J.C.

    1982-01-01

    This study presents an analysis of the factors that appear to have influenced the formation and form of nuclear power hazard control policy in Britain. A simple account is given of the technical nature of nuclear hazards and of the legal and administrative framework that has been constructed to control them. The subsequent analysis concentrates primarily on the influence exerted by social and political factors. Particular attention is directed to those political groups which have developed a special interest in the problems of nuclear power, and to the interplay between organised groupings and public opinion generally. The metamorphosis of these groupings is traced from the origins of the nuclear industry in the Second World War to their prominent role during the Windscale Inquiry. Attention is given to the policy constraint imposed by increased expectations in the form of demands for higher standards of living, and improvements in the quality of the environment. The study is concerned with both policy-making and with policy implementation; with interest articulation as well as with the functioning of formal institutions. The evolution of policy takes place in an atmosphere of keen economic debate and conflicting moral perceptions. A model of the policy-making system is postulated. (author)

  4. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    Segalard, Jean

    1970-01-01

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  5. Accessibility appraisal of integrated land-use/transport policy strategies: more than just adding up travel time savings

    NARCIS (Netherlands)

    Geurs, Karst Teunis; Zondag, Barry; de Jong, Gerard; de Bok, Michiel

    2010-01-01

    We examine the accessibility benefits associated with some land-use policy strategies for the Netherlands that anticipate on expected climate change. A disaggregate logsum accessibility measure using the Dutch national land-use/transport interaction model TIGRIS XL is used to compute changes in

  6. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    Science.gov (United States)

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  7. Tobacco control, global health policy and development: towards policy coherence in global governance

    Science.gov (United States)

    Collin, Jeff

    2015-01-01

    The WHO Framework Convention on Tobacco Control (FCTC) demonstrates the international political will invested in combating the tobacco pandemic and a newfound prominence for tobacco control within the global health agenda. However, major difficulties exist in managing conflicts with foreign and trade policy priorities, and significant obstacles confront efforts to create synergies with development policy and avoid tensions with other health priorities. This paper uses the concept of policy coherence to explore congruence and inconsistencies in objectives, policy, and practice between tobacco control and trade, development and global health priorities. Following the inability of the FCTC negotiations to satisfactorily address the relationship between trade and health, several disputes highlight the challenges posed to tobacco control policies by multilateral and bilateral agreements. While the work of the World Bank has demonstrated the potential contribution of tobacco control to development, the absence of non-communicable diseases from the Millennium Development Goals has limited scope to offer developing countries support for FCTC implementation. Even within international health, tobacco control priorities may be hard to reconcile with other agendas. The paper concludes by discussing the extent to which tobacco control has been pursued via a model of governance very deliberately different from those used in other health issues, in what can be termed ‘tobacco exceptionalism’. The analysis developed here suggests that non-communicable disease (NCD) policies, global health, development and tobacco control would have much to gain from re-examining this presumption of difference. PMID:22345267

  8. Toward Effective Water Pipe Tobacco Control Policy in the United States: Synthesis of Federal, State, and Local Policy Texts.

    Science.gov (United States)

    Colditz, Jason B; Ton, Jessica N; James, A Everette; Primack, Brian A

    2017-07-01

    Water pipe tobacco smoking (WTS) is growing in popularity among U.S. young adults and is associated with health risks similar to those of cigarette smoking. The purpose of this study is to examine existing tobacco control policies (TCPs) in order to investigate how they engage WTS. A systematic synthesis of content and legal interactions among federal, state, and local TCP documents. Pennsylvania, which represents a politically and demographically diverse microcosm of the United States. No human subjects. Federal and state TCPs were retrieved via public legal repositories. Local policy searches were conducted via county/municipal Web sites, inclusive of 13 localities that had autonomous health departments or existing TCPs based on a National Cancer Institute report. Full-text TCPs were double coded within a grounded theory framework for health policy analysis. Emergent codes were used to compare and contrast policy texts and to examine legal interactions among TCPs. Examination of policy categories including youth access, use restrictions, and taxation revealed WTS as largely omitted from current TCPs. WTS was sometimes addressed as an "other" tobacco product under older TCPs, though ambiguities in language led to questionable enforceability. State preemptions have rolled back or prevented well-tailored reforms at the local level. Federal preemptions have likewise constrained state TCPs. Outdated, preempted, and unclear policies limit the extent to which TCPs engage WTS. Health advocates might target these aspects of TCP reform.

  9. Insights into the government's role in food system policy making: improving access to healthy, local food alongside other priorities.

    Science.gov (United States)

    Wegener, Jessica; Raine, Kim D; Hanning, Rhona M

    2012-11-12

    Government actors have an important role to play in creating healthy public policies and supportive environments to facilitate access to safe, affordable, nutritious food. The purpose of this research was to examine Waterloo Region (Ontario, Canada) as a case study for "what works" with respect to facilitating access to healthy, local food through regional food system policy making. Policy and planning approaches were explored through multi-sectoral perspectives of: (a) the development and adoption of food policies as part of the comprehensive planning process; (b) barriers to food system planning; and (c) the role and motivation of the Region's public health and planning departments in food system policy making. Forty-seven in-depth interviews with decision makers, experts in public health and planning, and local food system stakeholders provided rich insight into strategic government actions, as well as the local and historical context within which food system policies were developed. Grounded theory methods were used to identify key overarching themes including: "strategic positioning", "partnerships" and "knowledge transfer" and related sub-themes ("aligned agendas", "issue framing", "visioning" and "legitimacy"). A conceptual framework to illustrate the process and features of food system policy making is presented and can be used as a starting point to  engage multi-sectoral stakeholders in plans and actions to facilitate access to healthy food.

  10. Internet accessibility and disability policy: lessons for digital inclusion and equality from Australia

    Directory of Open Access Journals (Sweden)

    Gerard Goggin

    2017-03-01

    Full Text Available In the fifth decade of the internet, accessibility for all, especially those with disabilities, is central to digital inclusion. Yet internationally, the score card on internet and accessibility remains mixed, at best; and woefully inadequate, at worst. Via an Australian case study, we argue that it is imperative to better understand how internet technology interacts with the life worlds and dynamics of disability, and we suggest how policy can be articulated and improved to put people with disabilities on an equal basis to others in digital societies.

  11. Supermarket access, transport mode and BMI: the potential for urban design and planning policy across socio-economic areas.

    Science.gov (United States)

    Murphy, Maureen; Koohsari, Mohammad Javad; Badland, Hannah; Giles-Corti, Billie

    2017-12-01

    To investigate dietary intake, BMI and supermarket access at varying geographic scales and transport modes across areas of socio-economic disadvantage, and to evaluate the implementation of an urban planning policy that provides guidance on spatial access to supermarkets. Cross-sectional study used generalised estimating equations to investigate associations between supermarket density and proximity, vegetable and fruit intake and BMI at five geographic scales representing distances people travel to purchase food by varying transport modes. A stratified analysis by area-level disadvantage was conducted to detect optimal distances to supermarkets across socio-economic areas. Spatial distribution of supermarket and transport access was analysed using a geographic information system. Melbourne, Australia. Adults (n 3128) from twelve local government areas (LGA) across Melbourne. Supermarket access was protective of BMI for participants in high disadvantaged areas within 800 m (P=0·040) and 1000 m (P=0·032) road network buffers around the household but not for participants in less disadvantaged areas. In urban growth area LGA, only 26 % of dwellings were within 1 km of a supermarket, far less than 80-90 % of dwellings suggested in the local urban planning policy. Low public transport access compounded disadvantage. Rapid urbanisation is a global health challenge linked to increases in dietary risk factors and BMI. Our findings highlight the importance of identifying the most appropriate geographic scale to inform urban planning policy for optimal health outcomes across socio-economic strata. Urban planning policy implementation in disadvantaged areas within cities has potential for reducing health inequities.

  12. Open Access and OER in Latin America: A survey of the policy landscape in Chile, Colombia and Uruguay (Advance online publication)

    OpenAIRE

    Toledo, Amalia

    2017-01-01

    This chapter presents an overview of the mechanisms (funding, policy, legislative and procedural) adopted by Latin American governments with respect to Open Access and Open Educational Resources (OER) initiatives in the higher education sector. It addresses three questions: How do the higher education systems of Chile, Colombia and Uruguay operate and fund their activities in general? How do existing policies and processes incorporating Open Access and/or OER influence student access to learn...

  13. Real-World Data: Policy Issues Regarding their Access and Use.

    Science.gov (United States)

    Basu, Anirban; Axelsen, Kirsten; Grabowski, David C; Meltzer, David O; Polsky, Daniel; Ridley, David B; Wiederkehr, Daniel; Philipson, Tomas J

    2016-12-01

    As real-world data (RWD) in health care begin to cross over to the Big Data realms, a panel of health economists was gathered to establish how well the current US policy environment further the goals of RWD and, if not, what can be done to improve matters. This report summarizes these discussions spanning the current US landscape of RWD availability and usefulness, private versus public development of RWD assets, the current inherent bias in terms of access to RWD, and guiding principles in providing quality assessments of new RWD studies. Three main conclusions emerge: (1) a business case is often required to incentivize investments in RWD assets. However, access restrictions for public data assets have failed to generate a proper market for these data and hence may have led to an underinvestment of public RWDs; (2) Very weak empirical evidence exist on for-profit entities misusing public RWD data entities to further their own agendas, which is the basis for supporting access restrictions of public RWD data; and (3) perhaps developing standardized metrics that could flag misuse of RWDs in an efficient way could help quell some of the fear of sharing public RWD assets with for-profit entities. It is hoped that these discussions and conclusions would pave the way for more rigorous and timely debates on the greater availability and accessibility of RWD assets.

  14. Promoting healthy food consumption: a review of state-level policies to improve access to fruits and vegetables.

    Science.gov (United States)

    Hood, Carlyn; Martinez-Donate, Ana; Meinen, Amy

    2012-12-01

    Research indicates poor nutrition is a leading determinant of the development of chronic disease, and increasing fruit and vegetable consumption is one method for decreasing obesity. Many policies have focused on increasing the demand for fruits and vegetables through price reductions and coupons. However, without ensuring a stable supply, increased demand can continue to raise prices, crowding out individuals who may otherwise have purchased fruits and vegetables and ultimately leading to continued disparities in access. This paper presents a review of selected state-level policy options recently proposed or implemented in states across the United States, and provides an evidence-based lens through which food access policy can be shaped in the Midwest. This review and potential framework uses Wisconsin to illustrate the feasibility of different state-level decisions and their potential impact on particular populations. Future supply-side policies to consider include expanding Electronic Benefit Transfer to the Special Supplemental Nutrition Program for Women, Infants and Children (WIC),program and farmers markets, incentivizing the purchase of locally grown produce, assisting local specialty farmers directly, and/or establishing a state-level food policy council. This review reveals that a food policy council would create a more sustainable policy analysis process to better ensure future policy adoption is truly comprehensive, encompassing the production, distribution and purchase of locally grown fruits and vegetables.

  15. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  16. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  17. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  18. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  19. Policies for patient access to clinical data via PHRs: current state and recommendations.

    Science.gov (United States)

    Collins, Sarah A; Vawdrey, David K; Kukafka, Rita; Kuperman, Gilad J

    2011-12-01

    Healthcare delivery organizations are increasingly using online personal health records (PHRs) to provide patients with direct access to their clinical information; however, there may be a lack of consistency in the data made available. We aimed to understand the general use and functionality of PHRs and the organizational policies and decision-making structures for making data available to patients. A cross-sectional survey was administered by telephone structured interview to 21 organizations to determine the types of data made available to patients through PHRs and the presence of explicit governance for PHR data release. Organizations were identified based on a review of the literature, PHR experts, and snowball sampling. Organizations that did not provide patients with electronic access to their data via a PHR were excluded. Interviews were conducted with 17 organizations for a response rate of 81%. Half of the organizations had explicit governance in the form of a written policy that outlined the data types made available to patients. Overall, 88% of the organizations used a committee structure for the decision-making process and included senior management and information services. All organizations sought input from clinicians. Discussion There was considerable variability in the types of clinical data and the time frame for releasing these data to patients. Variability in data release policies may have implications for PHR use and adoption. Future policy activities, such as requirement specification for the latter stages of Meaningful Use, should be leveraged as an opportunity to encourage standardization of functionality and broad deployment of PHRs.

  20. Long-term trends in alcohol policy attitudes in Norway.

    Science.gov (United States)

    Rossow, Ingeborg; Storvoll, Elisabet E

    2014-05-01

    The aim of this study was to describe trends in attitudes to alcohol control policies in Norway over a period of 50 years and to discuss how these trends relate to developments in alcohol policy. Survey data from 17 national population surveys, national statistics and previous publications were applied to describe trends in attitudes to alcohol control polices (access to alcohol and price) and changes in these policies over the period 1962 to 2012. From 1962 to 1999, an increasing proportion of the population reported that regulations on availability of alcohol were too strict and that alcohol prices were too high, whereas in the 2000s this trend was reversed and support for existing control policies increased. Although the pillars of Norwegian alcohol policy--high prices, restricted access and a state monopoly on retail sales-remained, control policies were gradually relaxed throughout the entire period. Relaxation of strict alcohol control policies in Norway in the first four decades were probably, in part, the result of increasingly liberal public opinion. The subsequent reversed trend in opinions with increasing support for control policies may be due to several factors, for example, consumer-oriented changes in the monopoly system, increased availability and affordability, increased awareness of alcohol-related harm and the effectiveness of control policies. Thus, the dynamics of policies and attitudes may well change over time. © 2013 Australasian Professional Society on Alcohol and other Drugs.

  1. Identification and Authentication Policy

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1999-01-01

    .... We will accomplish the audit objective in two phases. In this phase, we reviewed current DoD Component policies on the use of identification and authentication controls to access information systems...

  2. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  3. Institutional Control Policies and Implementation for the Area 5 and Area 3 Radioactive Waste Management Sites

    International Nuclear Information System (INIS)

    Vefa Yucel; Greg Shott; Denise Wieland

    2007-01-01

    The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) has implemented varying institutional control policies in performance assessment/composite analysis (PA/CA) calculations for the Area 5 and Area 3 Radioactive Waste Management Sites (RWMSs) (Shott et al., 1998; 2000; Bechtel Nevada [BN] and Neptune and Company Inc. [Neptune], 2006). The facilities are within the actively maintained boundaries of the Nevada Test Site (NTS) that are enforced by NNSA/NSO. Under current policies, access required for exposure of the member of public (MOP) or the inadvertent human intruder (IHI) is prohibited. Uncertainties affecting institutional control policies are the duration and effectiveness of the controls during the post-closure period. Implementing a uniform set of institutional control policies for the RWMSs that encompasses waste management and environmental restoration programs and is consistent with the end-state vision for the environmental management programs for the NTS (DOE, 2006) is a primary goal of the maintenance program. The NNSA/NSO Performance Management Plan (DOE, 2002) complies with DOE Policy P455.1, 'Use of Risk-Based End States' (DOE, 2003a). Expected future land uses are a driver in selecting acceptable end state conditions and clean-up goals for the NTS. NNSA/NSO Environmental Management's (EM's) land management assumptions and framework for Environmental Management activities are as follows: The NTS will remain under federal control in perpetuity as an NNSA test site, and the large buffer zone surrounding the NTS (the Nevada Test and Training Range) is assumed to remain under the control of the U.S. Air Force. There are no plans for transfer of any NTS lands to other agencies or public entities. Access will continue to be restricted to the NTS and the surrounding areas. For management purposes, NNSA/NV EM activities have been established based on the source of contamination and type of waste

  4. Institutional Control Policies and Implementation for the Area 5 and Area 3 Radioactive Waste Management Sites

    Energy Technology Data Exchange (ETDEWEB)

    Vefa Yucel, Greg Shott, Denise Wieland, et al.

    2007-11-01

    The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) has implemented varying institutional control policies in performance assessment/composite analysis (PA/CA) calculations for the Area 5 and Area 3 Radioactive Waste Management Sites (RWMSs) (Shott et al., 1998; 2000; Bechtel Nevada [BN] and Neptune and Company Inc. [Neptune], 2006). The facilities are within the actively maintained boundaries of the Nevada Test Site (NTS) that are enforced by NNSA/NSO. Under current policies, access required for exposure of the member of public (MOP) or the inadvertent human intruder (IHI) is prohibited. Uncertainties affecting institutional control policies are the duration and effectiveness of the controls during the post-closure period. Implementing a uniform set of institutional control policies for the RWMSs that encompasses waste management and environmental restoration programs and is consistent with the end-state vision for the environmental management programs for the NTS (DOE, 2006) is a primary goal of the maintenance program. The NNSA/NSO Performance Management Plan (DOE, 2002) complies with DOE Policy P455.1, 'Use of Risk-Based End States' (DOE, 2003a). Expected future land uses are a driver in selecting acceptable end state conditions and clean-up goals for the NTS. NNSA/NSO Environmental Management's (EM's) land management assumptions and framework for Environmental Management activities are as follows: The NTS will remain under federal control in perpetuity as an NNSA test site, and the large buffer zone surrounding the NTS (the Nevada Test and Training Range) is assumed to remain under the control of the U.S. Air Force. There are no plans for transfer of any NTS lands to other agencies or public entities. Access will continue to be restricted to the NTS and the surrounding areas. For management purposes, NNSA/NV EM activities have been established based on the source of contamination and

  5. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Science.gov (United States)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  6. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-03-07

    The transition to open access (OA) is being driven by funders, libraries, researchers and publishers around the world, and is having an impact on us all. It is inevitable that different countries, organisations and disciplines are moving at different rates towards an OA model, and it is this that we will focus on in this session. Drawing on experiences from across Europe and the Middle East we will provide perspectives from both a global publisher and institutions based in the region. Taylor & Francis take a flexible, evidence-based approach to open access, providing a choice of publication routes for our authors, and a choice of agreements for our library customers. Carolyn will outline some of the open access developments, opportunities and challenges at Taylor & Francis. The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad Bachir will each give an overview of how this is being managed by their institution. There will be an opportunity for questions and discussion with the panel.

  7. Cognitive radio policy and regulation techno-economic studies to facilitate dynamic spectrum access

    CERN Document Server

    Holland, Oliver

    2014-01-01

    This book offers a timely reflection on how the proliferation of advanced wireless communications technologies, particularly cognitive radio (CR) can be enabled by thoroughly-considered policy and appropriate regulation. It looks at the prospects of CR from the divergent standpoints of technological development and economic market reality. The book provides a broad survey of various techno-economic and policy aspects of CR development, and provides the reader with an understanding of the complexities involved as well as a toolbox of possible solutions to enable the evolutionary leap towards successful implementation of disruptive CR technology or indeed any other novel wireless technologies. Cognitive Radio Policy and Regulation showcases the original ideas and concepts introduced into the field of CR and dynamic spectrum access policy over nearly four years of work within COST Action IC0905 TERRA, a think-tank with participants from more than 20 countries. The book’s subject matter includes: • deploymen...

  8. Electricity access for geographically disadvantaged rural communities - technology and policy insights

    Energy Technology Data Exchange (ETDEWEB)

    Chaurey, A.; Malini Ranganathan [The Energy and Resources Institute, New Delhi (India). India Habitat Centre; Parimita Mohanty [Jadavpur University, Kolkota (India). School of Energy Studies

    2004-10-01

    The purpose of this paper is to weigh the issues and options for increasing electricity access in remote and geographically challenged villages in interior Rajasthan, the desert state in Western India where power sector reforms are currently underway. By first providing an overview of reforms and various electrification policy initiatives in India, the paper then analyzes the specific problems as studied at the grass-roots level with respect to rural electricity access and the use of off-grid renewables. Finally, it discusses interventions that could facilitate access to electricity by suggesting a sequential distributed generation (DG)-based approach, wherein consecutive DG schemes-incorporating the requisite technological, financial, and institutional arrangements-are designed depending on the developmental requirements of the community. In essence, this approach fits under the broader need to understand how the three ''Rs'' - rural electrification (the process), power sector reforms (the catalyst), and the use of renewable energy technologies (the means)- could potentially converge to meet the needs of India's rural poor. (author)

  9. Insights into the Government’s Role in Food System Policy Making: Improving Access to Healthy, Local Food Alongside Other Priorities

    Directory of Open Access Journals (Sweden)

    Kim D. Raine

    2012-11-01

    Full Text Available Government actors have an important role to play in creating healthy public policies and supportive environments to facilitate access to safe, affordable, nutritious food. The purpose of this research was to examine Waterloo Region (Ontario, Canada as a case study for “what works” with respect to facilitating access to healthy, local food through regional food system policy making. Policy and planning approaches were explored through multi-sectoral perspectives of: (a the development and adoption of food policies as part of the comprehensive planning process; (b barriers to food system planning; and (c the role and motivation of the Region’s public health and planning departments in food system policy making. Forty-seven in-depth interviews with decision makers, experts in public health and planning, and local food system stakeholders provided rich insight into strategic government actions, as well as the local and historical context within which food system policies were developed. Grounded theory methods were used to identify key overarching themes including: “strategic positioning”, “partnerships” and “knowledge transfer” and related sub-themes (“aligned agendas”, “issue framing”, “visioning” and “legitimacy”. A conceptual framework to illustrate the process and features of food system policy making is presented and can be used as a starting point to  engage multi-sectoral stakeholders in plans and actions to facilitate access to healthy food.

  10. Insights into the Government’s Role in Food System Policy Making: Improving Access to Healthy, Local Food Alongside Other Priorities

    Science.gov (United States)

    Wegener, Jessica; Raine, Kim D.; Hanning, Rhona M.

    2012-01-01

    Government actors have an important role to play in creating healthy public policies and supportive environments to facilitate access to safe, affordable, nutritious food. The purpose of this research was to examine Waterloo Region (Ontario, Canada) as a case study for “what works” with respect to facilitating access to healthy, local food through regional food system policy making. Policy and planning approaches were explored through multi-sectoral perspectives of: (a) the development and adoption of food policies as part of the comprehensive planning process; (b) barriers to food system planning; and (c) the role and motivation of the Region’s public health and planning departments in food system policy making. Forty-seven in-depth interviews with decision makers, experts in public health and planning, and local food system stakeholders provided rich insight into strategic government actions, as well as the local and historical context within which food system policies were developed. Grounded theory methods were used to identify key overarching themes including: “strategic positioning”, “partnerships” and “knowledge transfer” and related sub-themes (“aligned agendas”, “issue framing”, “visioning” and “legitimacy”). A conceptual framework to illustrate the process and features of food system policy making is presented and can be used as a starting point to engage multi-sectoral stakeholders in plans and actions to facilitate access to healthy food. PMID:23202834

  11. Analysis on logistic company action toward the access restriction policy on freight vehicle

    Science.gov (United States)

    Nur, Muhammad; Hadiwardoyo, Sigit P.; Nahry, Nahdalina

    2017-06-01

    The high volume of freight vehicles that enters, leaves or passes through the urban areas, especially Jakarta, has caused traffic congestion. Local authority plans to perform the access restriction on freight vehicles on the Jakarta Outer Ring Road (JORR) to reduce the congestion on that toll road. The study aims to analyze the alternative solutions of the logistics companies to overcome the impact of such policy. The data collection is done by interviewing 102 truck drivers and 7 staffs of logistic companies that use JORR. The results show that the most preferred action is shifting the operating time. Based on the open test, access restriction policy on JORR may cause a significant impact on the operational costs of delivery. Shifting the operational time will increase the operating cost by 1.71%, while turning the route will increase the operating costs by 4.35%. Moreover, changing the mode will reduce the operating expenses by 50%, and the combination action of shifting the route and the time will increase the operating costs by 5.39%.

  12. Urban stormwater source control policies: why and how?

    Directory of Open Access Journals (Sweden)

    G. Petrucci

    2014-09-01

    Full Text Available Stormwater source control is becoming a common strategy for urban stormwater management in many countries. It relies on regulations or other policy instruments compelling or inciting implementation, for each new urban development, of small-scale facilities to locally store and manage stormwater. Local authorities that pioneered source control since the 1980s have already observed that small-scale facilities systematically implemented over a catchment are able to influence its hydrological behaviour. This capability is the main strength of source control, as it allows compensation for the negative effects of urbanization. Yet, it also represents its main risk: if initial decision-making is not sufficiently accurate, source control can produce long-term negative effects. Because of its current spreading, source control will acquire an increasing role as a driver of hydrological changes in urban catchments, and the directions of these changes depend on current policy-making practices. This paper presents an analysis and a critical discussion of the main objectives that policy-makers attribute to stormwater source control. The investigation is based on a sample of French case studies, completed by a literature review for international comparison. It identifies four main objectives, some typical of urban stormwater management and some more innovative: flood reduction, receiving waters protection, sustainable development, costs reduction. The discussion focuses on how current policy-making practices are able to translate these objectives in concrete policy instruments, and on which knowledge and tools could improve this process. It is shown that for some objectives, basic knowledge is available, but the creation of policy instruments which are effective at the catchment scale and adapted to local conditions is still problematic. For other objectives, substantial lacks of knowledge exist, casting doubts on long-term effectiveness of current policy

  13. Does Health Insurance Premium Exemption Policy for Older People Increase Access to Health Care? Evidence from Ghana.

    Science.gov (United States)

    Duku, Stephen Kwasi Opuku; van Dullemen, Caroline Elisabeth; Fenenga, Christine

    2015-01-01

    Aging in Sub-Saharan Africa causes major challenges for policy makers in social protection. Our study focuses on Ghana, one of the few Sub-Saharan African countries that passed a National Policy on Aging in 2010. Ghana is also one of the first Sub-Saharan African countries that launched a National Health Insurance Scheme (NHIS; NHIS Act 650, 2003) with the aim to improve access to quality health care for all citizens, and as such can be considered as a means of poverty reduction. Our study assesses whether premium exemption policy under the NHIS that grants non-payments of annual health insurance premiums for older people increases access to health care. We assessed differences in enrollment coverage among four different age groups (18-49, 50-59, 60-69, and 70+). We found higher enrollment for the 70+ and 60-69 age groups. The likelihood of enrollment was 2.7 and 1.7 times higher for the 70+ and 60-69 age groups, respectively. Our results suggest the NHIS exemption policy increases insurance coverage of the aged and their utilization of health care services.

  14. Phase and gain control policies for robust active vibration control of flexible structures

    International Nuclear Information System (INIS)

    Zhang, K; Ichchou, M N; Scorletti, G; Mieyeville, F

    2013-01-01

    The interest of this paper is to develop a general and systematic robust control methodology for active vibration control of flexible structures. For this purpose, first phase and gain control policies are proposed to impose qualitative frequency-dependent requirements on the controller to consider a complete set of control objectives. Then the proposed control methodology is developed by employing phase and gain control policies in the dynamic output feedback H ∞  control: according to the set of control objectives, phase and gain control policies incorporate necessary weighting functions and determine them in a rational and systematic way; on the other hand, with the appropriate weighting functions efficient H ∞  control algorithms can automatically realize phase and gain control policies and generate a satisfactory H ∞  controller. The proposed control methodology can be used for both SISO and MIMO systems with collocated or non-collocated sensors and actuators. In this paper, it is validated on a non-collocated piezoelectric cantilever beam. Both numerical simulations and experimental results demonstrate the effectiveness of the proposed control methodology. (paper)

  15. Instruments and options for environmental policy during the accession process of EU associated countries in the area of environment and energy. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Cames, M.; Matthes, F.C.; Baer, S.; Oberthuer, S.; Krug, M.; Mez, L.; Tempel, S.

    2001-07-01

    With regard to the leading role of the EU in climate protection policies, it is important to consider the impact of the accession process on EU climate policy. This study includes the analysis of the most important issues related to environment and energy within the accession process, namely: 1) status quo and development of the energy sector and structural CO{sub 2} mitigation options; 2) legal gap assessment and analysis of performance in the accession process; 3) identification of implementation patterns through detailed policy analysis; 4) evaluation of co-operation projects in the field of environment and energy in order to develop new projects that promote the accession process. This volume includes comparative analysis of the five Accession Countries. The detailed analysis of each country is documented in five country reports, each in a separate volume available only on the attached CD. (orig.)

  16. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  17. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  18. Invalidating Policies using Structural Information

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2014-01-01

    by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation’s policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based...... on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control systems or policies. We provide case studies showing how mechanical verification tools, i.e. modelchecking with MCMAS and interactive theorem proving...

  19. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  20. Public Access ICT across Cultures

    International Development Research Centre (IDRC) Digital Library (Canada)

    3 Impact of Public Access to ICT Skills on Job Prospects in Rwanda ... reform and information and communication technology (ICT) policies, particularly in developing countries. ... (From internal memoranda prepared by Amy Mahan, 2008) ..... little decision-making autonomy, power, or financial control within the household.

  1. Data Policy

    Directory of Open Access Journals (Sweden)

    Mark A Parsons

    2013-07-01

    Full Text Available The first purpose of data policy should be to serve the objectives of the organization or project sponsoring the collection of the data. With research data, data policy should also serve the broader goals of advancing scientific and scholarly inquiry and society at large. This is especially true with government-funded data, which likely comprise the vast majority of research data. Data policy should address multiple issues, depending on the nature and objectives of the data. These issues include data access requirements, data preservation and stewardship requirements, standards and compliance mechanisms, data security issues, privacy and ethical concerns, and potentially even specific collection protocols and defined data flows. The specifics of different policies can vary dramatically, but all data policies need to address data access and preservation. Research data gain value with use and must therefore be accessible and preserved for future access. This article focuses on data access. While policy might address multiple issues, at a first level it must address where the data stand on what Lyon (2009 calls the continuum of openness. Making data as openly accessible as possible provides the greatest societal benefit, and a central purpose of data policy is to work toward ethically open data access. An open data regime not only maximizes the benefit of the data, it also simplifies most of the other issues around effective research data stewardship and infrastructure development.

  2. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  3. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  4. Audit-based compliance control

    NARCIS (Netherlands)

    Cederquist, J.G.; Dimitrakos, T.; Corin, R.J.; Martinelli, F.; Ryan, P.Y.A.; Dekker, M.A.C.; Etalle, Sandro; Schneider, S.; den Hartog, Jeremy; Lenzini, Gabriele

    2007-01-01

    In this paper we introduce a new framework for controlling compliance to discretionary access control policies [Cederquist et al. in Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY), 2005; Corin et al. in Proceedings of the IFIP Workshop on Formal

  5. Migrants' access to healthcare services within the European Union: a content analysis of policy documents in Ireland, Portugal and Spain.

    Science.gov (United States)

    Ledoux, Céline; Pilot, Eva; Diaz, Esperanza; Krafft, Thomas

    2018-06-15

    The current migration flow into Europe is leading to a growing ethnically diverse population in many European countries. Now more than ever, those populations have different healthcare needs, languages, traditions, and previous level of care. This higher level of diversity is likely to increase health inequalities that might challenge healthcare systems if not addressed. In this context, this study aims at reviewing the policy framework for migrants' access to healthcare in Spain, Portugal and Ireland, countries with a long history of immigration, to identify lessons to be learned for policies on migrants' health. A content analysis of official policy documents was undertaken and the conceptual framework developed by Mladowsky was adapted to classify the actions indicated in the policies. The content analysis revealed that the policy aim for all three analysed countries is the improvement of the health status of the immigrant population based on equity and equality principles. The main strategies are the adaptation of services through actions targeting patients and providers, such as the implementation of cultural mediators and trainings for health professionals. The three countries propose a great range of policies aiming at improving access to healthcare services for immigrants that can inspire other European countries currently welcoming refugees. Developing inclusive policies, however does not necessarily mean they will be implemented or felt on the ground. Inclusive policies are indeed under threat due to the economic and social crises and due to the respective nationalistic attitudes towards integration. The European Union is challenged to take a more proactive leadership and ensure that countries effectively implement inclusive actions to improve migrant's access to health services.

  6. Databases as policy instruments. About extending networks as evidence-based policy

    Directory of Open Access Journals (Sweden)

    Stoevelaar Herman

    2007-12-01

    Full Text Available Abstract Background This article seeks to identify the role of databases in health policy. Access to information and communication technologies has changed traditional relationships between the state and professionals, creating new systems of surveillance and control. As a result, databases may have a profound effect on controlling clinical practice. Methods We conducted three case studies to reconstruct the development and use of databases as policy instruments. Each database was intended to be employed to control the use of one particular pharmaceutical in the Netherlands (growth hormone, antiretroviral drugs for HIV and Taxol, respectively. We studied the archives of the Dutch Health Insurance Board, conducted in-depth interviews with key informants and organized two focus groups, all focused on the use of databases both in policy circles and in clinical practice. Results Our results demonstrate that policy makers hardly used the databases, neither for cost control nor for quality assurance. Further analysis revealed that these databases facilitated self-regulation and quality assurance by (national bodies of professionals, resulting in restrictive prescription behavior amongst physicians. Conclusion The databases fulfill control functions that were formerly located within the policy realm. The databases facilitate collaboration between policy makers and physicians, since they enable quality assurance by professionals. Delegating regulatory authority downwards into a network of physicians who control the use of pharmaceuticals seems to be a good alternative for centralized control on the basis of monitoring data.

  7. Mini-grid based off-grid electrification to enhance electricity access in developing countries: What policies may be required?

    International Nuclear Information System (INIS)

    Bhattacharyya, Subhes C.; Palit, Debajit

    2016-01-01

    With 1.2 billion people still lacking electricity access by 2013, electricity access remains a major global challenge. Although mini-grid based electrification has received attention in recent times, their full exploitation requires policy support covering a range of areas. Distilling the experience from a five year research project, OASYS South Asia, this paper presents the summary of research findings and shares the experience from four demonstration activities. It suggests that cost-effective universal electricity service remains a challenge and reaching the universal electrification target by 2030 will remain a challenge for the less developed countries. The financial, organisational and governance weaknesses hinder successful implementation of projects in many countries. The paper then provides 10 policy recommendations to promote mini-grids as a complementary route to grid extension to promote electricity access for successful outcomes. - Highlights: •The academic and action research activities undertaken through OASYS South Asia Project are reported. •Evidence produced through a multi-dimensional participatory framework supplemented by four demonstration projects. •Funding and regulatory challenges militate against universal electrification objectives by 2030. •Innovative business approaches linking local mini-grids and livelihood opportunities exist. •Enabling policies are suggested to exploit such options.

  8. From Access to Documents to Consumption of Information: The European Commission Transparency Policy for the TTIP Negotiations

    Directory of Open Access Journals (Sweden)

    Evelyn Coremans

    2017-09-01

    Full Text Available To increase transparency of the Transatlantic Trade and Investment Partnership (TTIP negotiations, the European Commission has reformed existing information sharing systems for trade policy. The Commission has moved from a strategy of providing transparency in the form of access to documents to one of access to information, geared specifically towards enhancing consumption of the available information. In both public and institutional transparency policy, the width of the target audience and the depth of the information have increased, and the manner of provision has shifted from reactive to proactive provision of information. As a result, the TTIP is now being coined as the most transparent trade negotiation ever in the EU’s history and a pilot project for transparency policy in future trade negotiations. The article adopts a supply-centred perspective to explain a transparency policy that goes beyond the legal minimum imposed by formal requirements. It relies on interview data of the changes brought about in inter-institutional relations since 2014, basic quantitative and qualitative analysis of document material, and a five-month participatory observation by the author in the secretariat of the European Parliament’s Committee on International Trade.

  9. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  10. Dynamic Enforcement of the Strict Integrity Policy

    Institute of Scientific and Technical Information of China (English)

    ZHANGXiangfeng; LIANGHongliang; SUNYufang

    2005-01-01

    The Strict integrity policy (SIP) in Biba's integrity model is widely used in protecting information integrity, but the static integrity labels of both subjects and objects increase compatibility cost of applications and might prevent some operations that are indeed harmless.In order to improve compatibility, Dynamic enforcement of the Strict integrity policy (DESIP) is put forward. The current integrity label attribute of a subject in SIP is replaced with two attributes in DESIP, which are used to confine dynamically the range of objects a subject could be allowed to access. The new rules of access control in DESIP are given for each kind of access mode (observe,modify and invoke) together with the proofs of their valid-ity. Comparison between SIP and DESIP shows that after a sequence of operations, a subject controlled by DESIP tends to behave in a similar way as it is controlled by SIP and DESIP is more compatible than SIP.

  11. Public attitudes towards alcohol control policies in Scotland and England: Results from a mixed-methods study.

    Science.gov (United States)

    Li, Jessica; Lovatt, Melanie; Eadie, Douglas; Dobbie, Fiona; Meier, Petra; Holmes, John; Hastings, Gerard; MacKintosh, Anne Marie

    2017-03-01

    The harmful effects of heavy drinking on health have been widely reported, yet public opinion on governmental responsibility for alcohol control remains divided. This study examines UK public attitudes towards alcohol policies, identifies underlying dimensions that inform these, and relationships with perceived effectiveness. A cross-sectional mixed methods study involving a telephone survey of 3477 adult drinkers aged 16-65 and sixteen focus groups with 89 adult drinkers in Scotland and England was conducted between September 2012 and February 2013. Principal components analysis (PCA) was used to reduce twelve policy statements into underlying dimensions. These dimensions were used in linear regression models examining alcohol policy support by demographics, drinking behaviour and perceptions of UK drinking and government responsibility. Findings were supplemented with a thematic analysis of focus group transcripts. A majority of survey respondents supported all alcohol policies, although the level of support varied by type of policy. Greater enforcement of laws on under-age sales and more police patrolling the streets were strongly supported while support for pricing policies and restricting access to alcohol was more divided. PCA identified four main dimensions underlying support on policies: alcohol availability, provision of health information and treatment services, alcohol pricing, and greater law enforcement. Being female, older, a moderate drinker, and holding a belief that government should do more to reduce alcohol harms were associated with higher support on all policy dimensions. Focus group data revealed findings from the survey may have presented an overly positive level of support on all policies due to differences in perceived policy effectiveness. Perceived effectiveness can help inform underlying patterns of policy support and should be considered in conjunction with standard measures of support in future research on alcohol control policies

  12. Policies for accelerating access to clean energy, improving health, advancing development, and mitigating climate change.

    Science.gov (United States)

    Haines, Andy; Smith, Kirk R; Anderson, Dennis; Epstein, Paul R; McMichael, Anthony J; Roberts, Ian; Wilkinson, Paul; Woodcock, James; Woods, Jeremy

    2007-10-06

    The absence of reliable access to clean energy and the services it provides imposes a large disease burden on low-income populations and impedes prospects for development. Furthermore, current patterns of fossil-fuel use cause substantial ill-health from air pollution and occupational hazards. Impending climate change, mainly driven by energy use, now also threatens health. Policies to promote access to non-polluting and sustainable sources of energy have great potential both to improve public health and to mitigate (prevent) climate disruption. There are several technological options, policy levers, and economic instruments for sectors such as power generation, transport, agriculture, and the built environment. However, barriers to change include vested interests, political inertia, inability to take meaningful action, profound global inequalities, weak technology-transfer mechanisms, and knowledge gaps that must be addressed to transform global markets. The need for policies that prevent dangerous anthropogenic interference with the climate while addressing the energy needs of disadvantaged people is a central challenge of the current era. A comprehensive programme for clean energy should optimise mitigation and, simultaneously, adaption to climate change while maximising co-benefits for health--eg, through improved air, water, and food quality. Intersectoral research and concerted action, both nationally and internationally, will be required.

  13. Amendment of the assured delivery provisions of BPA's Long-Term Intertie Access Policy and increased assured delivery: Access for non-scheduling utilities. Record of decision

    International Nuclear Information System (INIS)

    1994-06-01

    Bonneville Power Administration's BPA's preferred alternative for providing non-Federal Pacific Northwest-Pacific Southwest (PNW-PSW) Intertie access is to adopt the Capacity Ownership alternative combined with the Increased Assured Delivery--Access for Non-Scheduling Utilities alternative. BPA's decision to offer Capacity Ownership was documented in a March 1994 Non-Federal Capacity Ownership Record of Decision (ROD). This ROD documents BPA's decision to facilitate PNW-PSW Intertie access by proceeding with (1) bidirectional Increased Assured Delivery--Access for Non Scheduling Utilities; and (2) amending the Assured Delivery provisions of BPA's Long-Term Intertie Access Policy (LTIAP). Given that the various non-Federal PNW-PSW Intertie access alternatives in the NFP EIS all allowed for different types of contracts, little environmental impact difference among the alternatives was found. Rather, environmental impact was found to be associated with whether exchange contracts or firm power sales contracts would predominate. Such impacts and related environmental analysis are discussed further in section 3.0 of this ROD

  14. Circulation policies in health science libraries.

    Science.gov (United States)

    Watkins, C; Coker, N C

    1970-10-01

    There is general agreement that library policies have considerable influence on the use of libraries. Medical school (health science) libraries of this country were surveyed as to their policies in respect to whether faculty and student use were regulated by a single policy, circulation regulations, hours library was accessible to users, accessibility of reserve material, interlibrary loan, policy on overdue material, and exit control. THE LIBRARIES WERE THEN DIVIDED INTO THREE GROUPS, HIGH, MIDDLE, AND LOW ACCORDING TO THE FOLLOWING CHARACTERISTICS: size of student body, size of faculty, size of holdings, size of library staff, annual budget, and annual circulation. Our findings would indicate that schools falling in a high category based upon these criteria tend to be more restrictive in their policies and to have different regulations for faculty and students than do schools in the low category.These findings warrant further study.

  15. Making or breaking climate targets : The AMPERE study on staged accession scenarios for climate policy

    NARCIS (Netherlands)

    Kriegler, Elmar; Riahi, Keywan; Bauer, Nico; Schwanitz, Valeria Jana; Petermann, Nils; Bosetti, Valentina; Marcucci, Adriana; Otto, Sander; Paroussos, Leonidas; Rao, Shilpa; Arroyo Currás, Tabaré; Ashina, Shuichi; Bollen, Johannes; Eom, Jiyong; Hamdi-Cherif, Meriem; Longden, Thomas; Kitous, Alban; Méjean, Aurélie; Sano, Fuminori; Schaeffer, Michiel; Wada, Kenichi; Capros, Pantelis; P. van Vuuren, Detlef|info:eu-repo/dai/nl/11522016X; Edenhofer, Ottmar

    2015-01-01

    This study explores a situation of staged accession to a global climate policy regime from the current situation of regionally fragmented and moderate climate action. The analysis is based on scenarios in which a front runner coalition - the EU or the EU and China - embarks on immediate ambitious

  16. Creating Access to Opportunities for Youth in Transition from Foster Care. An AYPF Policy Brief

    Science.gov (United States)

    Russ, Erin; Fryar, Garet

    2014-01-01

    What happens to youth in foster care when they turn 18? Many face unprecedented challenges like homelessness, lack of financial resources, difficulty accessing educational opportunities, and unemployment. In this issue brief, The American Youth Policy Forum (AYPF) document these challenges and opportunities in three distinct yet overlapping areas…

  17. The Practice of Hospital Intranet Terminal Access Control Solution

    Institute of Scientific and Technical Information of China (English)

    QI Shi-tao; TANG Li-ming

    2016-01-01

    Along with the increasingly urgent management needs of intranet terminals in hospital, and large scaled deployment of terminal management system, terminal access control has become one of the standard functions of terminal management. This paper mainly aims at some simple research for the system construction of hospital intranet terminal access control.

  18. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  19. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  20. Comprehensive taxonomy and worldwide trends in pharmaceutical policies in relation to country income status.

    Science.gov (United States)

    Maniadakis, N; Kourlaba, G; Shen, J; Holtorf, A

    2017-05-25

    Rapidly evolving socioeconomic and technological trends make it challenging to improve access, effectiveness and efficiency in the use of pharmaceuticals. This paper identifies and systematically classifies the prevailing pharmaceutical policies worldwide in relation to a country's income status. A literature search was undertaken to identify and taxonomize prevailing policies worldwide. Countries that apply those policies and those that do not were then grouped by income status. Pharmaceutical policies are linked to a country's socioeconomics. Developed countries have universal coverage and control pharmaceuticals with external and internal price referencing systems, and indirect price-cost controls; they carry out health technology assessments and demand utilization controls. Price-volume and risk-sharing agreements are also evolving. Developing countries are underperforming in terms of coverage and they rely mostly on restrictive state controls to regulate prices and expenditure. There are significant disparities worldwide in the access to pharmaceuticals, their use, and the reimbursement of costs. The challenge in high-income countries is to maintain access to care whilst dealing with trends in technology and aging. Essential drugs should be available to all; however, many low- and middle-income countries still provide most of their population with only poor access to medicines. As economies grow, there should be greater investment in pharmaceutical care, looking to the policies of high-income countries to increase efficiency. Pharmaceutical companies could also develop special access schemes with low prices to facilitate coverage in low-income countries.

  1. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Faouzi Jaïdi

    2018-01-01

    Full Text Available Substantial advances in Information and Communication Technologies (ICT bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.

  2. Availability of tobacco cessation services in substance use disorder treatment programs: Impact of state tobacco control policy.

    Science.gov (United States)

    Abraham, Amanda J; Bagwell-Adams, Grace; Jayawardhana, Jayani

    2017-08-01

    Given the high prevalence of smoking among substance use disorder (SUD) patients, the specialty SUD treatment system is an important target for adoption and implementation of tobacco cessation (TC) services. While research has addressed the impact of tobacco control on individual tobacco consumption, largely overlooked in the literature is the potential impact of state tobacco control policies on availability of services for tobacco cessation. This paper examines the association between state tobacco control policy and availability of TC services in SUD treatment programs in the United States. State tobacco control and state demographic data (n=51) were merged with treatment program data from the 2012 National Survey of Substance Abuse Treatment Services (n=10.413) to examine availability of TC screening, counseling and pharmacotherapy services in SUD treatment programs using multivariate logistic regression models clustered at the state-level. Approximately 60% of SUD treatment programs offered TC screening services, 41% offered TC counseling services and 26% offered TC pharmacotherapy services. Results of multivariate logistic regression showed the odds of offering TC services were greater for SUD treatment programs located in states with higher cigarette excise taxes and greater spending on tobacco prevention and control. Findings indicate cigarette excise taxes and recommended funding levels may be effective policy tools for increasing access to TC services in SUD treatment programs. Coupled with changes to insurance coverage for TC under the Affordable Care Act, state tobacco control policy tools may further reduce tobacco use in the United States. Published by Elsevier Ltd.

  3. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  4. Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed

    2015-12-01

    This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.

  5. Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.

  6. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  7. Improving access to adequate pain management in Taiwan.

    Science.gov (United States)

    Scholten, Willem

    2015-06-01

    There is a global crisis in access to pain management in the world. WHO estimates that 4.65 billion people live in countries where medical opioid consumption is near to zero. For 2010, WHO considered a per capita consumption of 216.7 mg morphine equivalents adequate, while Taiwan had a per capita consumption of 0.05 mg morphine equivalents in 2007. In Asia, the use of opioids is sensitive because of the Opium Wars in the 19th century and for this reason, the focus of controlled substances policies has been on the prevention of diversion and dependence. However, an optimal public health outcome requires that also the beneficial aspects of these substances are acknowledged. Therefore, WHO recommends a policy based on the Principle of Balance: ensuring access for medical and scientific purposes while preventing diversion, harmful use and dependence. Furthermore, international law requires that countries ensure access to opioid analgesics for medical and scientific purposes. There is evidence that opioid analgesics for chronic pain are not associated with a major risk for developing dependence. Barriers for access can be classified in the categories of overly restrictive laws and regulations; insufficient medical training on pain management and problems related to assessment of medical needs; attitudes like an excessive fear for dependence or diversion; and economic and logistical problems. The GOPI project found many examples of such barriers in Asia. Access to opioid medicines in Taiwan can be improved by analysing the national situation and drafting a plan. The WHO policy guidelines Ensuring Balance in National Policies on Controlled Substances can be helpful for achieving this purpose, as well as international guidelines for pain treatment. Copyright © 2015. Published by Elsevier B.V.

  8. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  9. Healthcare Access for Iraqi Refugee Children in Texas: Persistent Barriers, Potential Solutions, and Policy Implications.

    Science.gov (United States)

    Vermette, David; Shetgiri, Rashmi; Al Zuheiri, Haidar; Flores, Glenn

    2015-10-01

    To identify access barriers to healthcare and potential interventions to improve access for Iraqi refugee children. Four focus groups were conducted using consecutive sampling of Iraqi refugee parents residing in the US for 8 months to 5 years. Eight key-informant interviews also were conducted with employees of organizations serving Iraqi refugee families, recruited using snowball sampling. Focus groups and interviews were audiotaped, transcribed, and analyzed using margin coding and grounded theory. Iraqi refugees identified provider availability, Medicaid maintenance and renewal, language issues, and inadequate recognition of post-traumatic stress disorder as barriers to care for their children. Interviewees cited loss of case-management services and difficulties in understanding the Medicaid renewal process as barriers. Potential interventions to improve access include community-oriented efforts to educate parents on Medicaid renewal, obtaining services, and accessing specialists. Given the enduring nature of language and Medicaid renewal barriers, policies addressing eligibility alone are insufficient.

  10. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  11. Russia SimSmoke: the long-term effects of tobacco control policies on smoking prevalence and smoking-attributable deaths in Russia.

    Science.gov (United States)

    Maslennikova, Galina Ya; Oganov, Rafael G; Boytsov, Sergey A; Ross, Hana; Huang, An-Tsun; Near, Aimee; Kotov, Alexey; Berezhnova, Irina; Levy, David T

    2014-11-01

    Russia has high smoking rates and weak tobacco control policies. A simulation model is used to examine the effect of tobacco control policies on past and future smoking prevalence and premature mortality in Russia. The Russia model was developed using the SimSmoke tobacco control model previously developed for the USA and other nations. The model inputs population size, birth, death and smoking rates specific to Russia. It assesses, individually and in combination, the effect of seven types of policies consistent with the WHO Framework Convention on Tobacco Control (FCTC): taxes, smoke-free air, mass media campaign, advertising bans, warning labels, cessation treatment and youth access policies. Outcomes are smoking prevalence and the number of smoking-attributable deaths by age and gender from 2009 to 2055. Increasing cigarette taxes to 70% of retail price, stronger smoke-free air laws, a high-intensity media campaign and comprehensive treatment policies are each potent policies to reduce smoking prevalence and smoking-attributable premature deaths in Russia. With the stronger set of policies, the model estimates that, relative to the status quo trend, smoking prevalence can be reduced by as much as 30% by 2020, with a 50% reduction projected by 2055. This translates into 2 684 994 male and 1 011 985 female premature deaths averted from 2015-2055. SimSmoke results highlight the relative contribution of policies to reducing the tobacco health burden in Russia. Significant inroads to reducing smoking prevalence and premature mortality can be achieved through strengthening tobacco control policies in line with FCTC recommendations. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. Ancillary effects of selected acid deposition control policies

    Energy Technology Data Exchange (ETDEWEB)

    Moe, R.J.; Lyke, A.J.; Nesse, R.J.

    1986-08-01

    NAPAP is examining a number of potential ways to reduce the precursors (sulfur dioxide and nitrogen oxides) to acid deposition. However, the policies to reduce acid deposition will have other physical, biological and economic effects unrelated to acid deposition. For example, control policies that reduce sulfur dioxide emissions may also increase visibility. The effects of an acid deposition policy that are unrelated to acid deposition are referred to as ''ancillary'' effects. This reserch identifies and characterizes the principle physical and economic ancillary effects associated with acid deposition control and mitigation policies. In this study the ancillary benefits associated with four specific acid deposition policy options were investigated. The four policy options investigated are: (1) flue gas desulfurization, (2) coal blending or switching, (3) reductions in automobile emissions of NO/sub x/, and (4) lake liming. Potential ancillary benefits of each option were identified and characterized. Particular attention was paid to the literature on economic valuation of potential ancillary effects.

  13. Sustainable Development of Renewable Energy Mini-grids for Energy Access: A Framework for Policy Design

    Energy Technology Data Exchange (ETDEWEB)

    Deshmukh, Ranjit [Univ. of California, Berkeley, CA (United States); Carvallo, Juan Pablo [Univ. of California, Berkeley, CA (United States); Gambhir, Ashwin [Univ. of California, Berkeley, CA (United States)

    2013-03-01

    We emphasize the importance of concurrently considering all components of a mini-grid policy, designing each component through the lenses of different stakeholders, and fostering mini-grids as an integral part of a country’s electricity access efforts. Policymakers have multiple options, and it is the combination of these in the institutional and financial capacity of the government context that will decide the success of the program. There are no silver bullet solutions, but a thorough understanding of the existing technical and institutional capacities, as well as the stakeholders’ interests and sociocultural context will enable the design of an effective policy instrument.

  14. Global forces and local currents in Argentina's science policy crossroads: restricted access or open knowledge

    Directory of Open Access Journals (Sweden)

    Horacio Javier Etchichury

    2014-11-01

    Full Text Available The article describes the tensions between two competing approaches to scientific policy in Argentina. The traditional vision favors autonomous research. The neoliberal conception fosters the link between science and markets. In the past few years, a neodevelopmentalist current also tries to stress relevance of scientific research. Finally, the article describes how the Open Access movement has entered the debate. The World Bank intervention and the human rights dimension of the question are discussed in depth. The article introduces the notion of open knowledge as a guiding criterion to design a human-rights based scientific policy.

  15. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  16. Access to artesunate-amodiaquine, quinine and other anti-malarials: policy and markets in Burundi.

    Science.gov (United States)

    Amuasi, John H; Diap, Graciela; Blay-Nguah, Samuel; Boakye, Isaac; Karikari, Patrick E; Dismas, Baza; Karenzo, Jeanne; Nsabiyumva, Lievin; Louie, Karly S; Kiechel, Jean-René

    2011-02-10

    Malaria is the leading cause of morbidity and mortality in post-conflict Burundi. To counter the increasing challenge of anti-malarial drug resistance and improve highly effective treatment Burundi adopted artesunate-amodiaquine (AS-AQ) as first-line treatment for uncomplicated Plasmodium falciparum malaria and oral quinine as second-line treatment in its national treatment policy in 2003. Uptake of this policy in the public, private and non-governmental (NGO) retail market sectors of Burundi is relatively unknown. This study was conducted to evaluate access to national policy recommended anti-malarials. Adapting a standardized methodology developed by Health Action International/World Health Organization (HAI/WHO), a cross-sectional survey of 70 (24 public, 36 private, and 10 NGO) medicine outlets was conducted in three regions of Burundi, representing different levels of transmission of malaria. The availability on day of the survey, the median prices, and affordability (in terms of number of days' wages to purchase treatment) of AS-AQ, quinine and other anti-malarials were calculated. Anti-malarials were stocked in all outlets surveyed. AS-AQ was available in 87.5%, 33.3%, and 90% of public, private, and NGO retail outlets, respectively. Quinine was the most common anti-malarial found in all outlet types. Non-policy recommended anti-malarials were mainly found in the private outlets (38.9%) compared to public (4.2%) and NGO (0%) outlets. The median price of a course of AS-AQ was US$0.16 (200 Burundi Francs, FBu) for the public and NGO markets, and 3.5-fold higher in the private sector (US$0.56 or 700 FBu). Quinine tablets were similarly priced in the public (US$1.53 or 1,892.50 FBu), private and NGO sectors (both US$1.61 or 2,000 FBu). Non-policy anti-malarials were priced 50-fold higher than the price of AS-AQ in the public sector. A course of AS-AQ was affordable at 0.4 of a day's wage in the public and NGO sectors, whereas, it was equivalent to 1.5 days worth

  17. The Brazil SimSmoke policy simulation model: the effect of strong tobacco control policies on smoking prevalence and smoking-attributable deaths in a middle income nation.

    Science.gov (United States)

    Levy, David; de Almeida, Liz Maria; Szklo, Andre

    2012-01-01

    Brazil has reduced its smoking rate by about 50% in the last 20 y. During that time period, strong tobacco control policies were implemented. This paper estimates the effect of these stricter policies on smoking prevalence and associated premature mortality, and the effect that additional policies may have. The model was developed using the SimSmoke tobacco control policy model. Using policy, population, and smoking data for Brazil, the model assesses the effect on premature deaths of cigarette taxes, smoke-free air laws, mass media campaigns, marketing restrictions, packaging requirements, cessation treatment programs, and youth access restrictions. We estimate the effect of past policies relative to a counterfactual of policies kept to 1989 levels, and the effect of stricter future policies. Male and female smoking prevalence in Brazil have fallen by about half since 1989, which represents a 46% (lower and upper bounds: 28%-66%) relative reduction compared to the 2010 prevalence under the counterfactual scenario of policies held to 1989 levels. Almost half of that 46% reduction is explained by price increases, 14% by smoke-free air laws, 14% by marketing restrictions, 8% by health warnings, 6% by mass media campaigns, and 10% by cessation treatment programs. As a result of the past policies, a total of almost 420,000 (260,000-715,000) deaths had been averted by 2010, increasing to almost 7 million (4.5 million-10.3 million) deaths projected by 2050. Comparing future implementation of a set of stricter policies to a scenario with 2010 policies held constant, smoking prevalence by 2050 could be reduced by another 39% (29%-54%), and 1.3 million (0.9 million-2.0 million) out of 9 million future premature deaths could be averted. Brazil provides one of the outstanding public health success stories in reducing deaths due to smoking, and serves as a model for other low and middle income nations. However, a set of stricter policies could further reduce smoking and save

  18. Northern Steps of EU Enlargement: The Impact of “Cohesion” Policies on Iceland’s Accession Process

    Directory of Open Access Journals (Sweden)

    Adriana Di Stefano

    2011-03-01

    Full Text Available This paper focuses on the EU accession process of Iceland, reading the latest northern steps of EU enlargement under a “cohesion” perspective, i.e., through the lens of the cohesion “theory”, namely the method resulting from interactions of the general principles of subsidiarity and cooperation or partnership. From the Mediterranean to the Arctic, the territorial dimension of cohesion policies, as grounded in different EU policies, plays different roles and meets a wide range of economic and social needs. By implementing Nordicum-Mediterraneum analogies, a cohesion-minded EU enlargement approach requires the overall reframing of territorial-based policies and a better allocation of shared responsibilities at the more efficient level of governance.

  19. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  20. Decrease in Suicide Rates after a Change of Policy Reducing Access to Firearms in Adolescents: A Naturalistic Epidemiological Study

    Science.gov (United States)

    Lubin, Gad; Werbeloff, Nomi; Halperin, Demian; Shmushkevitch, Mordechai; Weiser, Mark; Knobler, Haim Y.

    2010-01-01

    The use of firearms is a common means of suicide. We examined the effect of a policy change in the Israeli Defense Forces reducing adolescents' access to firearms on rates of suicide. Following the policy change, suicide rates decreased significantly by 40%. Most of this decrease was due to decrease in suicide using firearms over the weekend.…

  1. Static validation of licence conformance policies

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhof; Nielson, Flemming; Nielson, Hanne Riis

    2008-01-01

    Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to validate a number of more classical security policies, such as discretionary and mandatory access control policies, as well...... as communication protocols using symmetric and asymmetric cryptography. In this work we show how to develop a Flow Logic for validating the conformance of client software with respect to a licence conformance policy. Our approach is sufficiently flexible that it extends to fully open systems that can admit new...

  2. An approach to assessing multicity implementation of healthful food access policy, systems, and environmental changes.

    Science.gov (United States)

    Silberfarb, Laura Oliven; Savre, Sonja; Geber, Gayle

    2014-04-24

    Local governments play an increasingly important role in improving residents' access to healthful food and beverages to reduce obesity and chronic disease. Cities can use multiple strategies to improve community health through, for example, land use and zoning policies, city contracting and procurement practices, sponsorship of farmers markets and community gardens, and vending and concession practices in parks and recreation facilities. With 41 cities in the Hennepin County Human Services and Public Health Department jurisdiction, the county undertook to measure the extent to which cities were engaged in making policy, systems, and environmental (PSE) changes to increase residents' access to healthful food. The results revealed that some cities, particularly those with higher resident demand for healthful food, are making nationally recommended PSE changes, such as sponsoring farmers markets and community gardens. Cities have moved more slowly to make changes in areas with perceived negative cost consequences or lesser public demand, such as parks and recreation vending and concessions. This article describes the assessment process, survey tools, findings, and implications for other health departments seeking to undertake a similar assessment.

  3. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-01-01

    The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad

  4. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  5. Stem cell research funding policies and dynamic innovation: a survey of open access and commercialization requirements.

    Science.gov (United States)

    Lévesque, Maroussia; Kim, Jihyun Rosel; Isasi, Rosario; Knoppers, Bartha Maria; Plomer, Aurora; Joly, Yann

    2014-08-01

    This article compares and contrasts the pressures of both open access data sharing and commercialization policies in the context of publicly funded embryonic stem cell research (SCR). First, normative guidelines of international SCR organizations were examined. We then examined SCR funding guidelines and the project evaluation criteria of major funding organizations in the EU, the United Kingdom (UK), Spain, Canada and the United States. Our survey of policies revealed subtle pressures to commercialize research that include: increased funding availability for commercialization opportunities, assistance for obtaining intellectual property rights (IPRs) and legislation mandating commercialization. In lieu of open access models, funders are increasingly opting for limited sharing models or "protected commons" models that make the research available to researchers within the same region or those receiving the same funding. Meanwhile, there still is need for funding agencies to clarify and standardize terms such as "non-profit organizations" and "for-profit research," as more universities are pursuing for-profit or commercial opportunities.

  6. Negotiating Narratives, Accessing Asylum: Evaluating Language Policy as Multi-Level Practice, Beliefs and Management

    Science.gov (United States)

    Smith-Khan, Laura

    2017-01-01

    Theories of language policy increasingly emphasise focusing on the specific contexts in which language management occurs. In government settings, policy seeks to shape how individuals interact with officials. Australian asylum procedure is an area where policy aims at tight control. I examine how communication is managed in this setting, in which…

  7. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  8. Spectrum sharing in cognitive radio networks medium access control protocol based approach

    CERN Document Server

    Pandit, Shweta

    2017-01-01

    This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

  9. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  10. Access Denied: School Librarians' Responses to School District Policies on the Use of Social Media Tools

    Science.gov (United States)

    DiScala, Jeffrey; Weeks, Ann Carlson

    2013-01-01

    Public school districts often block access to online social media tools. While considered a preventive measure to ensure student safety and limit district liability, this policy strips school librarians and their collaborating teachers of opportunities to instruct students in using social media tools creatively and responsibly. Using one school…

  11. A multi-modal network approach to model public transport accessibility impacts of bicycle-train integration policies

    NARCIS (Netherlands)

    Geurs, Karst Teunis; La Paix Puello, Lissy Cesarina; van Weperen, Sander

    2016-01-01

    In the Netherlands, the bicycle plays an important in station access and, to a lesser extent, in station egress. There is however fairly little knowledge in the potential effects of bicycle-train integration policies. The aim of this paper is to examine the impacts of bicycle-train integration

  12. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  13. Removing financial barriers to access reproductive, maternal and newborn health services: the challenges and policy implications for human resources for health.

    Science.gov (United States)

    McPake, Barbara; Witter, Sophie; Ensor, Tim; Fustukian, Suzanne; Newlands, David; Martineau, Tim; Chirwa, Yotamu

    2013-09-22

    The last decade has seen widespread retreat from user fees with the intention to reduce financial constraints to users in accessing health care and in particular improving access to reproductive, maternal and newborn health services. This has had important benefits in reducing financial barriers to access in a number of settings. If the policies work as intended, service utilization rates increase. However this increases workloads for health staff and at the same time, the loss of user fee revenues can imply that health workers lose bonuses or allowances, or that it becomes more difficult to ensure uninterrupted supplies of health care inputs.This research aimed to assess how policies reducing demand-side barriers to access to health care have affected service delivery with a particular focus on human resources for health. We undertook case studies in five countries (Ghana, Nepal, Sierra Leone, Zambia and Zimbabwe). In each we reviewed financing and HRH policies, considered the impact financing policy change had made on health service utilization rates, analysed the distribution of health staff and their actual and potential workloads, and compared remuneration terms in the public sectors. We question a number of common assumptions about the financing and human resource inter-relationships. The impact of fee removal on utilization levels is mostly not sustained or supported by all the evidence. Shortages of human resources for health at the national level are not universal; maldistribution within countries is the greater problem. Low salaries are not universal; most of the countries pay health workers well by national benchmarks. The interconnectedness between user fee policy and HRH situations proves difficult to assess. Many policies have been changing over the relevant period, some clearly and others possibly in response to problems identified associated with financing policy change. Other relevant variables have also changed.However, as is now well

  14. Bangladesh policy on prevention and control of non-communicable diseases: a policy analysis.

    Science.gov (United States)

    Biswas, Tuhin; Pervin, Sonia; Tanim, Md Imtiaz Alam; Niessen, Louis; Islam, Anwar

    2017-06-19

    This paper is aimed at critically assessing the extent to which Non-Communicable Disease NCD-related policies introduced in Bangladesh align with the World Health Organization's (WHO) 2013-2020 Action Plan for the Global Strategy for the Prevention and Control of NCDs. The authors reviewed all relevant policy documents introduced by the Government of Bangladesh since its independence in 1971. The literature review targeted scientific and grey literature documents involving internet-based search, and expert consultation and snowballing to identify relevant policy documents. Information was extracted from the documents using a specific matrix, mapping each document against the six objectives of the WHO 2013-2020 Action Plan for the Global Strategy for the Prevention and Control of NCDs. A total of 51 documents were identified. Seven (14%) were research and/or surveys, nine were on established policies (17%), while seventeen (33%) were on action programmes. Five (10%) were related to guidelines and thirteen (25%) were strategic planning documents from government and non-government agencies/institutes. The study covered documents produced by the Government of Bangladesh as well as those by quasi-government and non-government organizations irrespective of the extent to which the intended policies were implemented. The policy analysis findings suggest that although the government has initiated many NCD-related policies or programs, they lacked proper planning, implementation and monitoring. Consequently, Bangladesh over the years had little success in effectively addressing the growing burden of non-communicable diseases. It is imperative that future research critically assess the effectiveness of national NCD policies by monitoring their implementation and level of population coverage.

  15. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  16. User Centric Policy Management

    Science.gov (United States)

    Cheek, Gorrell P.

    2013-01-01

    Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…

  17. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  18. Signalling, wage controls and monetary disinflation policy

    NARCIS (Netherlands)

    van Wijnbergen, S.J.G.; Persson, T.

    1993-01-01

    Focuses on wage control and monetary disinflation policy. How the crucial variable to control is the money supply and wage and price controls should be avoided because of their macroeconomic costs; The two types of government as being low-inflation governments and high-inflation governments; How

  19. Traditional vs. Contemporary Management Control Practices for Developing Public Health Policies.

    Science.gov (United States)

    Naranjo-Gil, David; Sánchez-Expósito, María Jesús; Gómez-Ruiz, Laura

    2016-07-14

    Public health policies must address multiple goals and complex community health needs. Recently, management control practices have emerged to provide a broader type of information for evaluating the effectiveness of healthcare policies, and relate activities and processes to multiple strategic outcomes. This study compares the effect of traditional and contemporary management control practices on the achievement of public health policies. It is also analyzed how two different uses of such practices (enabling vs. coercive) facilitate the achievement of public health policies. Relationships are explored using data collected from managers from public health agencies and public hospitals in Spain. The findings show that contemporary management control practices are more suitable than traditional practices to achieve public health policies. Furthermore, results show that public health policies are better achieved when managers use management control practices in an enabling way rather than in a coercive way.

  20. Position paper: A generic approach for security policies composition

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming

    2012-01-01

    When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic, that abst...

  1. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  2. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  3. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  4. Socioeconomic disparities in access to ART treatment and the differential impact of a policy that increased consumer costs.

    Science.gov (United States)

    Chambers, G M; Hoang, V P; Illingworth, P J

    2013-11-01

    What was the impact on access to assisted reproductive technology (ART) treatment by different socioeconomic status (SES) groups after the introduction of a policy that increased patient out-of-pocket costs? After the introduction of a policy that increased out-of-pocket costs in Australia, all SES groups experienced a similar percentage reduction in fresh ART cycles per 1000 women of reproductive age. Higher SES groups experienced a progressively greater reduction in absolute numbers of fresh ART cycles due to existing higher levels of utilization. Australia has supportive public funding arrangements for ARTs. Policies that substantially increase out-of-pocket costs for ART treatment create financial barriers to access and an overall reduction in utilization. Data from the USA suggests that disparities exist in access to ART treatment based on ethnicity, education level and income. Time series analysis of utilization of ART, intrauterine insemination (IUI) and clomiphene citrate by women from varying SES groups before and after the introduction of a change in the level of public funding for ART. Women undertaking fertility treatment in Australia between 2007 and 2010. Women from higher SES quintiles use more ART treatment than those in lower SES quintiles, which likely reflects a greater ability to pay for treatment and a greater need for ART treatment as indicated by the trend to later childbearing. In 2009, 10.13 and 5.17 fresh ART cycles per 1000 women of reproductive age were performed in women in the highest and lowest SES quintiles respectively. In the 12 months after the introduction of a policy that increased out-of-pocket costs from ∼$1500 Australian dollars (€1000) to ∼$2500 (€1670) for a fresh IVF cycle, there was a 21-25% reduction in fresh ART cycles across all SES quintiles. The absolute reduction in fresh ART cycles in the highest SES quintile was double that in the lowest SES quintile. In this study, SES was based on the average relative

  5. European healthcare policies for controlling drug expenditure.

    Science.gov (United States)

    Ess, Silvia M; Schneeweiss, Sebastian; Szucs, Thomas D

    2003-01-01

    In the last 20 years, expenditures on pharmaceuticals - as well as total health expenditures - have grown faster than the gross national product in all European countries. The aim of this paper was to review policies that European governments apply to reduce or at least slow down public expenditure on pharmaceutical products. Such policies can target the industry, the wholesalers and retailers, prescribers, and patients. The objectives of pharmaceutical policies are multidimensional and must take into account issues relating to public health, public expenditure and industrial incentives. Both price levels and consumption patterns determine the level of total drug expenditure in a particular country, and both factors vary greatly across countries. Licensing and pricing policies intend to influence the supply side. Three types of pricing policies can be recognised: product price control, reference pricing and profit control. Profit control is mainly used in the UK. Reference pricing systems were first used in Germany and The Netherlands and are being considered in other countries. Product price control is still the most common method for establishing the price of drugs. For the aim of fiscal consolidation, price-freeze and price-cut measures have been frequently used in the 1980s and 1990s. They have affected all types of schemes. For drug wholesalers and retailers, most governments have defined profit margins. The differences in price levels as well as the introduction of a Single European Pharmaceutical Market has led to the phenomenon of parallel imports among member countries of the European Union. This may be facilitated by larger and more powerful wholesalers and the vertical integration between wholesalers and retailers. To control costs, the use of generic drugs is encouraged in most countries, but only few countries allow pharmacists to substitute generic drugs for proprietary brands. Various interventions are used to reduce the patients' demand for drugs by

  6. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  7. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  8. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  9. Alcohol Control and Harm Reduction Policies in Lebanon | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Findings will document the current national alcohol policy and identify the direct and indirect influences of policy-relevant factors and psychosocial mediators on alcohol consumption and purchasing. Researchers will also assess the potential impact of specific alcohol-control policy packages. The results should help to ...

  10. A new public policy to ensure access to scientific information resources: the case of Chile

    Directory of Open Access Journals (Sweden)

    María Soledad Bravo-Marchant

    2012-11-01

    Full Text Available The design and implementation of public policies to grant access to scientific information is now a marked trend among numerous countries of Latin America. The creation of specific instruments, the allocation of an ongoing budget and the accumulation of experience in negotiation and contracting of national licences have all been clear signs of the achievements resulting from recent initiatives in these countries. This article reviews the experience of the Consorcio para el Acceso a la Información Cientifíca Electrónica (CINCEL Corporation, a Chilean consortium created in 2002, the public policy that made it possible and the evaluation experience of its main programme, the Electronic Library of Scientific Information (BEIC.

  11. Judicialization of Health Policy in the Definition of Access to Public Goods: Individual Rights versus Collective Rights

    Directory of Open Access Journals (Sweden)

    Telma Maria Gonçalves Menicucci

    2010-06-01

    Full Text Available The article analyses a form of judicialization of public policies in the health field. It has as its object lawsuits initiated against Belo Horizonte Municipality arguing for the provision of services or the acquisition of inputs not obtained in the public system via institutional access routes. The argument is that the individualized quest for the guarantee of the right to healthcare via the judicial path is a form of reproduction of the tensions produced in democratic societies between the social and the individual conceptions of citizenship. By ensuring access to goods by means of individual suits, the Judiciary interferes in the making of public choices taken on by public-sector managers, thus regulating opportunities for consumption according to a concentrating logic. And so the assertion of a constitutional right superposes the political right of the majority, represented by the Executive, to make choices as to the goods that are the object of public policies, with a relatively significant financial and budgetary impact.

  12. Evidence for Policy Making: Health Services Access and Regional Disparities in Kerman

    Directory of Open Access Journals (Sweden)

    Mina Anjomshoa

    2013-12-01

    Full Text Available Background and purpose: Health indices, regarding to their role in the development of society, are one of the most important indices at national level. Success of national development programs is largely dependent on the establishment of appropriate goals at the health sector, among which access to healthcare facilities is an essential requirement. The aim of this study was to examine the disparities in health services access across the Kerman province. Materials and Methods: This was a cross-sectional study. Study sample included the cities of Kerman province, ranked based on 15 health indices. Data was collected from statistical yearbook. The indices were weighted using Shannon entropy, then using the TOPSIS technique and the result were classified into three categories in terms of the level of development across towns. Results: The findings showed distinct regional disparities in health services across Kerman province and the significant difference was observed between the cities in terms of development. Shannon entropy introduced the number of pharmacologist per 10 thousand people as the most important indicator and the number of rural active health center per 1000 people as the less important indicator. According to TOPSIS, Kerman town (0.719 and Fahraj (0.1151 ranked the first and last in terms of access to health services respectively. Conclusion: There are significant differences between cities of Kerman province in terms of access to health care facilities and services. Therefore, it is recommended that officials and policy-makers determine resource allocation priorities according to the degree of development for a balanced and equitable distribution of health care facilities.

  13. Role-Based Access Control in Retrospect

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Wieringa, Roelf J.

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of

  14. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  15. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  16. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  17. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  18. Policy Driven Development: Flexible Policy Insertion for Large Scale Systems.

    Science.gov (United States)

    Demchak, Barry; Krüger, Ingolf

    2012-07-01

    The success of a software system depends critically on how well it reflects and adapts to stakeholder requirements. Traditional development methods often frustrate stakeholders by creating long latencies between requirement articulation and system deployment, especially in large scale systems. One source of latency is the maintenance of policy decisions encoded directly into system workflows at development time, including those involving access control and feature set selection. We created the Policy Driven Development (PDD) methodology to address these development latencies by enabling the flexible injection of decision points into existing workflows at runtime , thus enabling policy composition that integrates requirements furnished by multiple, oblivious stakeholder groups. Using PDD, we designed and implemented a production cyberinfrastructure that demonstrates policy and workflow injection that quickly implements stakeholder requirements, including features not contemplated in the original system design. PDD provides a path to quickly and cost effectively evolve such applications over a long lifetime.

  19. Discursive Policy Webs in a Globalisation Era: A Discussion of Access to Professions and Trades for Immigrant Professionals in Ontario, Canada

    Science.gov (United States)

    Goldberg, Michelle P.

    2006-01-01

    This article explores the link between discourse and policy using a discursive web metaphor. It develops the notion of policy as a discursive web based on a post-positivist framework that recognises the way multiple discourses from multiple voices interact in a complex web of power relationships to influence reality. Using Ontario's Access to…

  20. The role of public policies in reducing smoking: the Minnesota SimSmoke tobacco policy model.

    Science.gov (United States)

    Levy, David T; Boyle, Raymond G; Abrams, David B

    2012-11-01

    Following the landmark lawsuit and settlement with the tobacco industry, Minnesota pursued the implementation of stricter tobacco control policies, including tax increases, mass media campaigns, smokefree air laws, and cessation treatment policies. Modeling is used to examine policy effects on smoking prevalence and smoking-attributable deaths. To estimate the effect of tobacco control policies in Minnesota on smoking prevalence and smoking-attributable deaths using the SimSmoke simulation model. Minnesota data starting in 1993 are applied to SimSmoke, a simulation model used to examine the effect of tobacco control policies over time on smoking initiation and cessation. Upon validating the model against smoking prevalence, SimSmoke is used to distinguish the effect of policies implemented since 1993 on smoking prevalence. Using standard attribution methods, SimSmoke also estimates deaths averted as a result of the policies. SimSmoke predicts smoking prevalence accurately between 1993 and 2011. Since 1993, a relative reduction in smoking rates of 29% by 2011 and of 41% by 2041 can be attributed to tobacco control policies, mainly tax increases, smokefree air laws, media campaigns, and cessation treatment programs. Moreover, 48,000 smoking-attributable deaths will be averted by 2041. Minnesota SimSmoke demonstrates that tobacco control policies, especially taxes, have substantially reduced smoking prevalence and smoking-attributable deaths. Taxes, smokefree air laws, mass media, cessation treatment policies, and youth-access enforcement contributed to the decline in prevalence and deaths averted, with the strongest component being taxes. With stronger policies, for example, increasing cigarette taxes to $4.00 per pack, Minnesota's smoking rate could be reduced by another 13%, and 7200 deaths could be averted by 2041. Copyright © 2012 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  1. Achieving universal access to broadband

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    2009-01-01

    The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures...

  2. Older teen attitudes toward birth control access in pharmacies: a qualitative study.

    Science.gov (United States)

    Wilkinson, Tracey A; Miller, Courtney; Rafie, Samantha; Landau, Sharon Cohen; Rafie, Sally

    2018-03-01

    To examine adolescent attitudes toward accessing contraception through a new pharmacist prescribing model in the State of California. In-depth telephone interviews were conducted in summer 2015 with 30 females ages 18 to 19 in California. Participants were recruited using a social media advertisement. Semi-structured interviews utilized open-ended questions to understand teens' experiences with pharmacies, experiences obtaining contraception, and views on pharmacist prescribing of contraception. Responses were transcribed and qualitatively analyzed using an independent-coder method to identify salient themes. Participants were ethnically diverse and primarily living in suburban areas. All participants had completed high school and many had completed one year of college. Nearly all participants were supportive of California's new law allowing pharmacist prescribing of contraception. Thematic analyses revealed that while participants were satisfied with traditional service providers and valued those relationships, they appreciated the benefit of increased access and convenience of going directly to a pharmacy. Participants expected increased access to contraception in pharmacies would lead to both personal and societal benefits. They expressed concerns regarding parental involvement, as well as confidentiality in the pharmacy environment and with insurance disclosures. Older teens in California are very supportive of pharmacies and pharmacists as direct access points for contraception, but confidentiality concerns were noted. Policy makers and pharmacies can incorporate study findings when designing policies, services, and physical pharmacy spaces to better serve teens. Further research is warranted after pharmacies implement this new service to assess teen utilization and satisfaction as well as outcomes. Several states recently passed legislation enabling pharmacists to prescribe contraception and other states are considering similar legislation. Older teens are

  3. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  4. A review of promoting access to medicines in China - problems and recommendations.

    Science.gov (United States)

    Sun, Jing; Hu, Cecile Jia; Stuntz, Mark; Hogerzeil, Hans; Liu, Yuanli

    2018-02-20

    Despite recent reforms, distorting funding mechanisms and over-prescribing still maintain severe financial barriers to medicines access in China. Complicated and interrelated problems in the pharmaceutical sector require a common framework to be resolved as fragmented solutions do not work. We present a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and propose policy recommendations for promoting universal access to medicines in China. Drawing on multiple sources of information, including a review of published literatures and official national data, field investigations in six provinces and interviews with key opinion leaders, this paper presents a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and proposes policy recommendations for promoting universal access to medicines in China. Public expenditure on medicines has been strictly controlled since the national healthcare reforms of 2009. Yet total pharmaceutical expenditure (TPE) and total health expenditure growth rates continuously outpaced the growth of gross domestic product (GDP). With 2.4% of GDP, TPE now exceeds that of most high income countries. The distorted provider and consumer incentives in the Chinese health system have not fundamentally changed. Price-setting and reimbursement mechanisms do not promote cost-effective use of medicines. Inappropriate price controls and perverse financial incentives are the un-resolved root causes of preference of originator brands for some major diseases and shortages of low-cost and low-consumption medicines. In addition, access to expensive life-saving medicines is yet systematically addressed. The complicated and interdependent problems interact in a way that leads to significant system problems in China, which create dual challenges that both the developing country and the developed countries are facing. To further promote access to medicines, China should speed up

  5. A review of promoting access to medicines in China - problems and recommendations

    Directory of Open Access Journals (Sweden)

    Jing Sun

    2018-02-01

    Full Text Available Abstract Background Despite recent reforms, distorting funding mechanisms and over-prescribing still maintain severe financial barriers to medicines access in China. Complicated and interrelated problems in the pharmaceutical sector require a common framework to be resolved as fragmented solutions do not work. We present a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and propose policy recommendations for promoting universal access to medicines in China. Methods Drawing on multiple sources of information, including a review of published literatures and official national data, field investigations in six provinces and interviews with key opinion leaders, this paper presents a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and proposes policy recommendations for promoting universal access to medicines in China. Results Public expenditure on medicines has been strictly controlled since the national healthcare reforms of 2009. Yet total pharmaceutical expenditure (TPE and total health expenditure growth rates continuously outpaced the growth of gross domestic product (GDP. With 2.4% of GDP, TPE now exceeds that of most high income countries. The distorted provider and consumer incentives in the Chinese health system have not fundamentally changed. Price-setting and reimbursement mechanisms do not promote cost-effective use of medicines. Inappropriate price controls and perverse financial incentives are the un-resolved root causes of preference of originator brands for some major diseases and shortages of low-cost and low-consumption medicines. In addition, access to expensive life-saving medicines is yet systematically addressed. Conclusions The complicated and interdependent problems interact in a way that leads to significant system problems in China, which create dual challenges that both the developing country and the developed countries are

  6. Off-policy reinforcement learning for H∞ control design.

    Science.gov (United States)

    Luo, Biao; Wu, Huai-Ning; Huang, Tingwen

    2015-01-01

    The H∞ control design problem is considered for nonlinear systems with unknown internal system model. It is known that the nonlinear H∞ control problem can be transformed into solving the so-called Hamilton-Jacobi-Isaacs (HJI) equation, which is a nonlinear partial differential equation that is generally impossible to be solved analytically. Even worse, model-based approaches cannot be used for approximately solving HJI equation, when the accurate system model is unavailable or costly to obtain in practice. To overcome these difficulties, an off-policy reinforcement leaning (RL) method is introduced to learn the solution of HJI equation from real system data instead of mathematical system model, and its convergence is proved. In the off-policy RL method, the system data can be generated with arbitrary policies rather than the evaluating policy, which is extremely important and promising for practical systems. For implementation purpose, a neural network (NN)-based actor-critic structure is employed and a least-square NN weight update algorithm is derived based on the method of weighted residuals. Finally, the developed NN-based off-policy RL method is tested on a linear F16 aircraft plant, and further applied to a rotational/translational actuator system.

  7. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  8. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  9. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  10. Disintegrated care: the Achilles heel of international health policies in low and middle-income countries

    Directory of Open Access Journals (Sweden)

    Jean-Pierre Unger

    2006-09-01

    Full Text Available Purpose: To review the evidence basis of international aid and health policy. Context of case: Current international aid policy is largely neoliberal in its promotion of commoditization and privatisation. We review this policy's responsibility for the lack of effectiveness in disease control and poor access to care in low and middle-income countries. Data sources: National policies, international programmes and pilot experiments are examined in both scientific and grey literature. Conclusions and discussion: We document how health care privatisation has led to the pool of patients being cut off from public disease control interventions—causing health care disintegration—which in turn resulted in substandard performance of disease control. Privatisation of health care also resulted in poor access. Our analysis consists of three steps. Pilot local contracting-out experiments are scrutinized; national health care records of Colombia and Chile, two countries having adopted contracting-out as a basis for health care delivery, are critically examined against Costa Rica; and specific failure mechanisms of the policy in low and middle-income countries are explored. We conclude by arguing that the negative impact of neoliberal health policy on disease control and health care in low and middle-income countries justifies an alternative aid policy to improve both disease control and health care.

  11. Analysis on policies text of air pollution control in Beijing

    Science.gov (United States)

    ZHANG, Yujuan; WANG, Wen; ZHANG, Wei

    2017-04-01

    Air pollution is one of the most serious environmental problems, and it is also the inevitable result of the extensive economic development mode. The matter of air pollution in Beijing is becoming more and more serious since 2010, which has a great impact on the normal social production, living and human health. These hazards have been highly valued by the whole society. More than 30 years have been pasted since controlling the air pollution and the system of policies was relatively complete. These policies have improved the quality of atmospheric and prevented environment further deterioration. The policies performance is not obvious. It is urgent trouble to improve policy performance. This paper analyzes the 103 policies text of air pollution control in Beijing, and researches status, history and problems, and put forward suggestions on policy improvement and innovation at last.

  12. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  13. How social policies can improve financial accessibility of healthcare: a multi-level analysis of unmet medical need in European countries.

    Science.gov (United States)

    Israel, Sabine

    2016-03-05

    The article explores in how far financial accessibility of healthcare (FAH) is restricted for low-income groups and identifies social protection policies that can supplement health policies in guaranteeing universal access to healthcare. The article is aimed to advance the literature on comparative European social epidemiology by focussing on income-related barriers of healthcare take-up. The research is carried out on the basis of multi-level cross-sectional analyses using 2012 EU-SILC data for 30 European countries. The social policy data stems from EU-SILC beneficiary information. It is argued that unmet medical needs are a reality for many individuals within Europe - not only due to direct user fees but also due to indirect costs such as waiting time, travel costs, time not spent working. Moreover, low FAH affects not only the lowest income quintile but also the lower middle income class. The study observes that social allowance increases the purchasing power of both household types, thereby helping them to overcome financial barriers to healthcare uptake. Alongside healthcare system reform aimed at improving the pro-poor availability of healthcare facilities and financing, policies directed at improving FAH should aim at providing a minimum income base to the low-income quintile. Moreover, categorical policies should address households exposed to debt which form the key vulnerable group within the low-income classes.

  14. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  15. Gun Control: The Debate and Public Policy.

    Science.gov (United States)

    Watkins, Christine

    1997-01-01

    Provides an overview and background information on the debate over gun control, as well as several teaching ideas. Handouts include a list of related topics drawn from various disciplines (economics, U.S. history), seven arguments for and against gun control, and a set of policy evaluation guidelines. (MJP)

  16. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  17. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  18. User experience with a health insurance coverage and benefit-package access: implications for policy implementation towards expansion in Nigeria.

    Science.gov (United States)

    Mohammed, Shafiu; Aji, Budi; Bermejo, Justo Lorenzo; Souares, Aurelia; Dong, Hengjin; Sauerborn, Rainer

    2016-04-01

    Developing countries are devising strategies and mechanisms to expand coverage and benefit-package access for their citizens through national health insurance schemes (NHIS). In Nigeria, the scheme aims to provide affordable healthcare services to insured-persons and their dependants. However, inclusion of dependants is restricted to four biological children and a spouse per user. This study assesses the progress of implementation of the NHIS in Nigeria, relating to coverage and benefit-package access, and examines individual factors associated with the implementation, according to users' perspectives. A retrospective, cross-sectional survey was done between October 2010 and March 2011 in Kaduna state and 796 users were randomly interviewed. Questions regarding coverage of immediate-family members and access to benefit-package for treatment were analysed. Indicators of coverage and benefit-package access were each further aggregated and assessed by unit-weighted composite. The additive-ordinary least square regression model was used to identify user factors that may influence coverage and benefit-package access. With respect to coverage, immediate-dependants were included for 62.3% of the users, and 49.6 rated this inclusion 'good' (49.6%). In contrast, 60.2% supported the abolishment of the policy restriction for non-inclusion of enrolees' additional children and spouses. With respect to benefit-package access, 82.7% of users had received full treatments, and 77.6% of them rated this as 'good'. Also, 14.4% of users had been refused treatments because they could not afford them. The coverage of immediate-dependants was associated with age, sex, educational status, children and enrolment duration. The benefit-package access was associated with types of providers, marital status and duration of enrolment. This study revealed that coverage of family members was relatively poor, while benefit-package access was more adequate. Non-inclusion of family members could

  19. An Access Control Model for the Uniframe Framework

    National Research Council Canada - National Science Library

    Crespi, Alexander M

    2005-01-01

    ... security characteristics from the properties of individual components would aid in the creation of more secure systems In this thesis, a framework for characterizing the access control properties...

  20. Barriers to adopting and implementing local-level tobacco control policies.

    Science.gov (United States)

    Satterlund, Travis D; Cassady, Diana; Treiber, Jeanette; Lemp, Cathy

    2011-08-01

    Although California communities have been relatively successful in adopting and implementing a wide range of local tobacco control policies, the process has not been without its setbacks and barriers. Little is known about local policy adoption, and this paper examines these processes related to adopting and implementing outdoor smoke-free policies, focusing on the major barriers faced by local-level tobacco control organizations in this process. Ninety-six projects funded by the California Tobacco Control Program submitted final evaluation reports pertaining to an outdoor smoking objective, and the reports from these projects were analyzed. The barriers were grouped in three primary areas: politically polarizing barriers, organizational barriers, and local political orientation. The barriers identified in this study underscore the need for an organized action plan in adopting local tobacco policy. The authors also suggest potential strategies to offset the barriers, including: (1) having a "champion" who helps to carry an objective forward; (2) tapping into a pool of youth volunteers; (3) collecting and using local data as a persuasive tool; (4) educating the community in smoke-free policy efforts; (5) working strategically within the local political climate; and (6) demonstrating to policymakers the constituent support for proposed policy.

  1. Why Have Tobacco Control Policies Stalled? Using Genetic Moderation to Examine Policy Impacts

    Science.gov (United States)

    Fletcher, Jason M.

    2012-01-01

    Background Research has shown that tobacco control policies have helped produce the dramatic decline in use over the decades following the 1964 surgeon general’s report. However, prevalence rates have stagnated during the past two decades in the US, even with large tobacco taxes and expansions of clean air laws. The observed differences in tobacco control policy effectiveness and why policies do not help all smokers are largely unexplained. Objective The aim of this study was to determine the importance of genetics in explaining response to tobacco taxation policy by testing the potential of gene-policy interaction in determining adult tobacco use. Methods A moderated regression analysis framework was used to test interactive effects between genotype and tobacco policy in predicting tobacco use. Cross sectional data of US adults from the National Health and Nutrition Examination Survey (NHANES) linked with genotype and geocodes were used to identify tobacco use phenotypes, state-level taxation rates, and variation in the nicotinic acetylcholine receptor (CHRNA6) genotype. Tobacco use phenotypes included current use, number of cigarettes smoked per day, and blood serum cotinine measurements. Results Variation in the nicotinic acetylcholine receptor was found to moderate the influence of tobacco taxation on multiple measures of tobacco use. Individuals with the protective G/G polymorphism (51% of the sample) responded to taxation while others had no response. The estimated differences in response by genotype were C/C genotype: b = −0.016 se  = 0.018; G/C genotype: b = 0.014 se  = 0.017; G/G genotype: b = −0.071 se 0.029. Conclusions This study provides novel evidence of “gene-policy” interaction and suggests a genetic mechanism for the large differences in response to tobacco policies. The inability for these policies to reduce use for individuals with specific genotypes suggests alternative methods may be needed to further reduce use

  2. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  3. Achieving Universal Access to Broadband

    Directory of Open Access Journals (Sweden)

    Morten FALCH

    2009-01-01

    Full Text Available The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures to be applied. The paper concludes that other policy measure than the classical universal service obligation are in play, and discusses various policy measures taking the Lisbon process as a point of departure. Available policy measures listed in the paper include, universal service obligation, harmonization, demand stimulation, public support for extending the infrastructure, public private partnerships (PPP, and others.

  4. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  5. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  6. The migrant in Argentina and the access to their rights. A brief overview of the rules, the policies and their stories

    Directory of Open Access Journals (Sweden)

    Abigail Gómez

    2014-06-01

    Full Text Available Argentina receives immigrants from neighboring countries with serious deficiencies as regards their rights. The Argentinean government had to implement different policies to protect them, incorporating international treaties on human rights in their internal legal system and making public policies. Simultaneously, obstacles can be observed, when having access to these rights on an equal condition with Argentinean citizens. It is pertinent to analyze this situation using a methodological tool like an ethnographic study. The analysis will be divided into two parts, on the one hand, the migrant’s tools to have access to these basic human rights will be described, and on the other hand, it will be analyzed through court decisions, interviews and NGOs documents, if those rights are indeed satisfied. As a result, it is evident that while immigrants in Argentina have free access to benefits which in their countries are difficult to achieve, there are, still quantitative and qualitative inefficiencies, especially in health and education.

  7. The role of public policies in reducing smoking prevalence: results from the Michigan SimSmoke tobacco policy simulation model.

    Science.gov (United States)

    Levy, David T; Huang, An-Tsun; Havumaki, Joshua S; Meza, Rafael

    2016-05-01

    Michigan has implemented several of the tobacco control policies recommended by the World Health Organization MPOWER goals. We consider the effect of those policies and additional policies consistent with MPOWER goals on smoking prevalence and smoking-attributable deaths (SADs). The SimSmoke tobacco control policy simulation model is used to examine the effect of past policies and a set of additional policies to meet the MPOWER goals. The model is adapted to Michigan using state population, smoking, and policy data starting in 1993. SADs are estimated using standard attribution methods. Upon validating the model, SimSmoke is used to distinguish the effect of policies implemented since 1993 against a counterfactual with policies kept at their 1993 levels. The model is then used to project the effect of implementing stronger policies beginning in 2014. SimSmoke predicts smoking prevalence accurately between 1993 and 2010. Since 1993, a relative reduction in smoking rates of 22 % by 2013 and of 30 % by 2054 can be attributed to tobacco control policies. Of the 22 % reduction, 44 % is due to taxes, 28 % to smoke-free air laws, 26 % to cessation treatment policies, and 2 % to youth access. Moreover, 234,000 SADs are projected to be averted by 2054. With additional policies consistent with MPOWER goals, the model projects that, by 2054, smoking prevalence can be further reduced by 17 % with 80,000 deaths averted relative to the absence of those policies. Michigan SimSmoke shows that tobacco control policies, including cigarette taxes, smoke-free air laws, and cessation treatment policies, have substantially reduced smoking and SADs. Higher taxes, strong mass media campaigns, and cessation treatment policies would further reduce smoking prevalence and SADs.

  8. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  9. Analysis and control design of sustainable policies for greenhouse gas emissions

    International Nuclear Information System (INIS)

    Chu, Bing; Duncan, Stephen; Papachristodoulou, Antonis; Hepburn, Cameron

    2013-01-01

    Reducing greenhouse gas emissions is now an urgent priority. Systems control theory, and in particular feedback control, can be helpful in designing policies that achieve sustainable levels of emissions of CO 2 (and other greenhouse gases) while minimizing the impact on the economy, and at the same time explicitly addressing the high levels of uncertainty associated with predictions of future emissions. In this paper, we describe preliminary results for an approach where model predictive control (MPC) is applied to a model of the UK economy (UK 4see model) as a test bed to design sustainable policies for greenhouse gas emissions. Using feedback control, the policies are updated on the basis of the actual emissions, rather than on the predicted level of emissions. The basic structure and principle of the UK 4see model is described and its implementation in Simulink is presented. A linearized state space model is obtained and model predictive control is applied to design policies for CO 2 emissions. Simulation results are presented to demonstrate the effectiveness of the proposed method. The preliminary results obtained in this paper illustrate the strength of the proposed design approach and form the basis for future research on using systems control theory to design optimal sustainable policies

  10. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  11. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  12. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  13. Fuzzy Privacy Decision for Context-Aware Access Personal Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie

    2007-01-01

    A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.

  14. Energy efficiency and renewable energy policy in the Czech Republic within the framework of accession to the European Union

    International Nuclear Information System (INIS)

    Wees, M.T. van; Uyterlinde, M.A.; Maly, M.

    2002-01-01

    The main barrier for end-use energy efficiency and renewable energy in the Czech Republic is the lack of a stable political and regulatory framework. Market incentives can only properly work if the market conditions and restrictions are clear and stable. However, no comprehensive policies and regulation have been implemented in the Czech Republic. Although the acquis communautaire of the European Union includes regulation on energy efficiency and renewable energy, this topic remains low on the negotiation agenda for accession. This paper reports on the current situation in the Czech Republic, including the potentials for end-use energy efficiency and renewable energy, on the existing policy and regulatory framework, and on the remaining gaps with the requirements of accession to the European Union. Also, the impact of the recent increase of nuclear capacity on energy efficiency and renewable energy in the Czech Republic is discussed

  15. Alcohol Control Policies in 46 African Countries: Opportunities for Improvement.

    Science.gov (United States)

    Ferreira-Borges, Carina; Esser, Marissa B; Dias, Sónia; Babor, Thomas; Parry, Charles D H

    2015-07-01

    There is little information on the extent to which African countries are addressing alcohol consumption and alcohol-related harm, which suggests that evaluations of national alcohol policies are needed in this region. The aim of this article is to examine the strength of a mix of national alcohol control policies in African countries, as well as the relationship between alcohol policy restrictiveness scores and adult alcohol per capita consumption (APC) among drinkers at the national level. We examined national alcohol policies of 46 African countries, as of 2012, in four regulatory categories (price, availability, marketing and drink-driving), and analyzed the restrictiveness of national alcohol policies using an adapted Alcohol Policy Index (API). To assess the validity of the policy restrictiveness scores, we conducted correlational analyses between policy restrictiveness scores and APC among drinkers in 40 countries. Countries attained a mean score of 44.1 of 100 points possible, ranging from 9.1 (Sao Tomé and Principe) to 75.0 (Algeria), with low scores indicating low policy restrictiveness. Policy restrictiveness scores were negatively correlated with and APC among drinkers (rs = -0.353, P = 0.005). There is great variation in the strength of alcohol control policies in countries throughout the African region. Tools for comparing the restrictiveness of alcohol policies across countries are available and are an important instrument to monitor alcohol policy developments. The negative correlation between policy restrictiveness and alcohol consumption among drinkers suggests the need for stronger alcohol policies as well as increased training and capacity building at the country level. © The Author 2015. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  16. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  17. Examining the Impact of the National Institutes of Health Public Access Policy on the Citation Rates of Journal Articles

    Science.gov (United States)

    De Groote, Sandra L.; Shultz, Mary; Smalheiser, Neil R.

    2015-01-01

    Purpose To examine whether National Institutes of Health (NIH) funded articles that were archived in PubMed Central (PMC) after the release of the 2008 NIH Public Access Policy show greater scholarly impact than comparable articles not archived in PMC. Methods A list of journals across several subject areas was developed from which to collect article citation data. Citation information and cited reference counts of the articles published in 2006 and 2009 from 122 journals were obtained from the Scopus database. The articles were separated into categories of NIH funded, non-NIH funded and whether they were deposited in PubMed Central. An analysis of citation data across a five-year timespan was performed on this set of articles. Results A total of 45,716 articles were examined, including 7,960 with NIH-funding. An analysis of the number of times these articles were cited found that NIH-funded 2006 articles in PMC were not cited significantly more than NIH-funded non-PMC articles. However, 2009 NIH funded articles in PMC were cited 26% more than 2009 NIH funded articles not in PMC, 5 years after publication. This result is highly significant even after controlling for journal (as a proxy of article quality and topic). Conclusion Our analysis suggests that factors occurring between 2006 and 2009 produced a subsequent boost in scholarly impact of PubMed Central. The 2008 Public Access Policy is likely to be one such factor, but others may have contributed as well (e.g., growing size and visibility of PMC, increasing availability of full-text linkouts from PubMed, and indexing of PMC articles by Google Scholar). PMID:26448551

  18. Examining the Impact of the National Institutes of Health Public Access Policy on the Citation Rates of Journal Articles.

    Science.gov (United States)

    De Groote, Sandra L; Shultz, Mary; Smalheiser, Neil R

    2015-01-01

    To examine whether National Institutes of Health (NIH) funded articles that were archived in PubMed Central (PMC) after the release of the 2008 NIH Public Access Policy show greater scholarly impact than comparable articles not archived in PMC. A list of journals across several subject areas was developed from which to collect article citation data. Citation information and cited reference counts of the articles published in 2006 and 2009 from 122 journals were obtained from the Scopus database. The articles were separated into categories of NIH funded, non-NIH funded and whether they were deposited in PubMed Central. An analysis of citation data across a five-year timespan was performed on this set of articles. A total of 45,716 articles were examined, including 7,960 with NIH-funding. An analysis of the number of times these articles were cited found that NIH-funded 2006 articles in PMC were not cited significantly more than NIH-funded non-PMC articles. However, 2009 NIH funded articles in PMC were cited 26% more than 2009 NIH funded articles not in PMC, 5 years after publication. This result is highly significant even after controlling for journal (as a proxy of article quality and topic). Our analysis suggests that factors occurring between 2006 and 2009 produced a subsequent boost in scholarly impact of PubMed Central. The 2008 Public Access Policy is likely to be one such factor, but others may have contributed as well (e.g., growing size and visibility of PMC, increasing availability of full-text linkouts from PubMed, and indexing of PMC articles by Google Scholar).

  19. Access to health care as a human right in international policy: critical reflections and contemporary challenges.

    Science.gov (United States)

    Castillo, Camilo Hernán Manchola; Garrafa, Volnei; Cunha, Thiago; Hellmann, Fernando

    2017-07-01

    Using the United Nations (UN) and its subordinate body, the World Health Organization (WHO), as a frame of reference, this article explores access to healthcare as a human right in international intergovernmental policies. First, we look at how the theme of health is treated within the UN, focusing on the concept of global health. We then discuss the concept of global health from a human rights perspective and go on to outline the debate surrounding universal coverage versus universal access as a human right, addressing some important ethical questions. Thereafter, we discuss universal coverage versus universal access using the critical and constructivist theories of international relations as a frame of reference. Finally, it is concluded that, faced with the persistence of huge global health inequalities, the WHO began to reshape itself, leaving behind the notion of health as a human right and imposing the challenge of reducing the wide gap that separates international intergovernmental laws from reality.

  20. School-based obesity policy, social capital, and gender differences in weight control behaviors.

    Science.gov (United States)

    Zhu, Ling; Thomas, Breanca

    2013-06-01

    We examined the associations among school-based obesity policies, social capital, and adolescents' self-reported weight control behaviors, focusing on how the collective roles of community and adopted policies affect gender groups differently. We estimated state-level ecologic models using 1-way random effects seemingly unrelated regressions derived from panel data for 43 states from 1991 to 2009, which we obtained from the Centers for Disease Control and Prevention's Youth Risk Behavior Surveillance System. We used multiplicative interaction terms to assess how social capital moderates the effects of school-based obesity policies. School-based obesity policies in active communities were mixed in improving weight control behaviors. They increased both healthy and unhealthy weight control behaviors among boys but did not increase healthy weight control behaviors among girls. Social capital is an important contextual factor that conditions policy effectiveness in large contexts. Heterogeneous behavioral responses are associated with both school-based obesity policies and social capital. Building social capital and developing policy programs to balance outcomes for both gender groups may be challenging in managing childhood obesity.

  1. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  2. Framing access to medicines in developing countries: an analysis of media coverage of Canada's Access to Medicines Regime.

    Science.gov (United States)

    Esmail, Laura C; Phillips, Kaye; Kuek, Victoria; Cosio, Andrea Perez; Kohler, Jillian Clare

    2010-01-04

    In September 2003, the Canadian government committed to developing legislation that would facilitate greater access to affordable medicines for developing countries. Over the course of eight months, the legislation, now known as Canada's Access to Medicines Regime (CAMR), went through a controversial policy development process and the newspaper media was one of the major venues in which the policy debates took place. The purpose of this study was to examine how the media framed CAMR to determine how policy goals were conceptualized, which stakeholder interests controlled the public debate and how these variables related to the public policy process. We conducted a qualitative content analysis of newspaper coverage of the CAMR policy and implementation process from 2003-2008. The primary theoretical framework for this study was framing theory. A total of 90 articles from 11 Canadian newspapers were selected for inclusion in our analysis. A team of four researchers coded the articles for themes relating to access to medicines and which stakeholders' voice figured more prominently on each issue. Stakeholders examined included: the research-based industry, the generic industry, civil society, the Canadian government, and developing country representatives. The most frequently mentioned themes across all documents were the issues of drug affordability, intellectual property, trade agreements and obligations, and development. Issues such as human rights, pharmaceutical innovation, and economic competitiveness got little media representation. Civil society dominated the media contents, followed far behind by the Canadian government, the research-based and generic pharmaceutical industries. Developing country representatives were hardly represented in the media. Media framing obscured the discussion of some of the underlying policy goals in this case and failed to highlight issues which are now significant barriers to the use of the legislation. Using the media to engage

  3. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  4. Energy access and transition to cleaner cooking fuels and technologies in Sri Lanka: Issues and policy limitations

    International Nuclear Information System (INIS)

    Wickramasinghe, Anoja

    2011-01-01

    Easy energy access is a trigger for human, social, and economic development. A research project was undertaken in Sri Lanka to broaden the understanding of human dimension of energy access and technologies. A questionnaire survey, covering 2269 households, gathered data on socio-economic contexts and issues influencing a transition towards clean cooking facilities. The findings reveal that the transition is impeded by four factors: the lack of motivation and the pressure for switching over to cleaner facilities, the lack of modern energy technology options, the financial risks, and the lack of financing and other support. The paper describes the delicate two-way interrelation between women earning wages and the transitions to cleaner cooking fuels and technologies. The findings suggest the need for a policy framework involving the stakeholders, financing and standardised technologies. To make a change it is proposed to introduce a national, integrated policy incorporating financing and energy governance. - Highlights: ► Households in Sri Lanka lack access to modern energy technology options for cooking. ► Cooking with fuel wood and residues is the norm in Sri Lanka, particularly in rural households. ► A survey of rural households revealed that most cannot afford to switch to cleaner cooking options. ► Most households have little awareness of the health impacts of biomass cooking. ► Women in regular formal employment are more likely to value cleaner cooking options that save time.

  5. Cross-Layer Admission Control Policy for CDMA Beamforming Systems

    Directory of Open Access Journals (Sweden)

    Sheng Wei

    2007-01-01

    Full Text Available A novel admission control (AC policy is proposed for the uplink of a cellular CDMA beamforming system. An approximated power control feasibility condition (PCFC, required by a cross-layer AC policy, is derived. This approximation, however, increases outage probability in the physical layer. A truncated automatic retransmission request (ARQ scheme is then employed to mitigate the outage problem. In this paper, we investigate the joint design of an AC policy and an ARQ-based outage mitigation algorithm in a cross-layer context. This paper provides a framework for joint AC design among physical, data-link, and network layers. This enables multiple quality-of-service (QoS requirements to be more flexibly used to optimize system performance. Numerical examples show that by appropriately choosing ARQ parameters, the proposed AC policy can achieve a significant performance gain in terms of reduced outage probability and increased system throughput, while simultaneously guaranteeing all the QoS requirements.

  6. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  7. Evaluation of Tobacco Control Policies in Bangladesh | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Evaluation of Tobacco Control Policies in Bangladesh. Bangladesh introduced its first comprehensive tobacco control act in 2005, in an attempt to address the country's high prevalence of tobacco use. ... Institution. University of Dhaka. Pays d' institution. Bangladesh. Site internet. http://www.univdhaka.edu ...

  8. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  9. A national survey of health service infrastructure and policy impacts on access to computerised CBT in Scotland

    Directory of Open Access Journals (Sweden)

    Kenicer David

    2012-09-01

    Full Text Available Abstract Background NICE recommends computerised cognitive behavioural therapy (cCBT for the treatment of several mental health problems such as anxiety and depression. cCBT may be one way that services can reduce waiting lists and improve capacity and efficiency. However, there is some doubt about the extent to which the National Health Service (NHS in the UK is embracing this new health technology in practice. This study aimed to investigate Scottish health service infrastructure and policies that promote or impede the implementation of cCBT in the NHS. Methods A telephone survey of lead IT staff at all health board areas across Scotland to systematically enquire about the ability of local IT infrastructure and IT policies to support delivery of cCBT. Results Overall, most of the health boards possess the required software to use cCBT programmes. However, the majority of NHS health boards reported that they lack dedicated computers for patient use, hence access to cCBT at NHS sites is limited. Additionally, local policy in the majority of boards prevent staff from routinely contacting patients via email, skype or instant messenger, making the delivery of short, efficient support sessions difficult. Conclusions Conclusions: Overall most of the infrastructure is in place but is not utilised in ways that allow effective delivery. For cCBT to be successfully delivered within a guided support model, as recommended by national guidelines, dedicated patient computers should be provided to allow access to online interventions. Additionally, policy should allow staff to support patients in convenient ways such as via email or live chat. These measures would increase the likelihood of achieving Scottish health service targets to reduce waiting time for psychological therapies to 18 weeks.

  10. Feedback control policies employed by people using intracortical brain-computer interfaces

    Science.gov (United States)

    Willett, Francis R.; Pandarinath, Chethan; Jarosiewicz, Beata; Murphy, Brian A.; Memberg, William D.; Blabe, Christine H.; Saab, Jad; Walter, Benjamin L.; Sweet, Jennifer A.; Miller, Jonathan P.; Henderson, Jaimie M.; Shenoy, Krishna V.; Simeral, John D.; Hochberg, Leigh R.; Kirsch, Robert F.; Bolu Ajiboye, A.

    2017-02-01

    Objective. When using an intracortical BCI (iBCI), users modulate their neural population activity to move an effector towards a target, stop accurately, and correct for movement errors. We call the rules that govern this modulation a ‘feedback control policy’. A better understanding of these policies may inform the design of higher-performing neural decoders. Approach. We studied how three participants in the BrainGate2 pilot clinical trial used an iBCI to control a cursor in a 2D target acquisition task. Participants used a velocity decoder with exponential smoothing dynamics. Through offline analyses, we characterized the users’ feedback control policies by modeling their neural activity as a function of cursor state and target position. We also tested whether users could adapt their policy to different decoder dynamics by varying the gain (speed scaling) and temporal smoothing parameters of the iBCI. Main results. We demonstrate that control policy assumptions made in previous studies do not fully describe the policies of our participants. To account for these discrepancies, we propose a new model that captures (1) how the user’s neural population activity gradually declines as the cursor approaches the target from afar, then decreases more sharply as the cursor comes into contact with the target, (2) how the user makes constant feedback corrections even when the cursor is on top of the target, and (3) how the user actively accounts for the cursor’s current velocity to avoid overshooting the target. Further, we show that users can adapt their control policy to decoder dynamics by attenuating neural modulation when the cursor gain is high and by damping the cursor velocity more strongly when the smoothing dynamics are high. Significance. Our control policy model may help to build better decoders, understand how neural activity varies during active iBCI control, and produce better simulations of closed-loop iBCI movements.

  11. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  12. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  13. Towards understanding the drivers of policy change: a case study of infection control policies for multi-drug resistant tuberculosis in South Africa.

    Science.gov (United States)

    Saidi, Trust; Salie, Faatiema; Douglas, Tania S

    2017-05-30

    Explaining policy change is one of the central tasks of contemporary policy analysis. In this article, we examine the changes in infection control policies for multi-drug resistant tuberculosis (MDR-TB) in South Africa from the time the country made the transition to democracy in 1994, until 2015. We focus on MDR-TB infection control and refer to decentralised management as a form of infection control. Using Kingdon's theoretical framework of policy streams, we explore the temporal ordering of policy framework changes. We also consider the role of research in motivating policy changes. Policy documents addressing MDR-TB in South Africa over the period 1994 to 2014 were extracted. Literature on MDR-TB infection control in South Africa was extracted from PubMed using key search terms. The documents were analysed to identify the changes that occurred and the factors driving them. During the period under study, five different policy frameworks were implemented. The policies were meant to address the overwhelming challenge of MDR-TB in South Africa, contextualised by high prevalence of HIV infection, that threatened to undermine public health programmes and the success of antiretroviral therapy rollouts. Policy changes in MDR-TB infection control were supported by research evidence and driven by the high incidence and complexity of the disease, increasing levels of dissatisfaction among patients, challenges of physical, human and financial resources in public hospitals, and the ideologies of the political leadership. Activists and people living with HIV played an important role in highlighting the importance of MDR-TB as well as exerting pressure on policymakers, while the mass media drew public attention to infection control as both a cause of and a solution to MDR-TB. The critical factors for policy change for infection control of MDR-TB in South Africa were rooted in the socioeconomic and political environment, were supported by extensive research, and can be framed

  14. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  15. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  16. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  17. Estimating the Potential Impact of Tobacco Control Policies on Adverse Maternal and Child Health Outcomes in the United States Using the SimSmoke Tobacco Control Policy Simulation Model.

    Science.gov (United States)

    Levy, David; Mohlman, Mary Katherine; Zhang, Yian

    2016-05-01

    Numerous studies document the causal relationship between prenatal smoking and adverse maternal and child health (MCH) outcomes. Studies also reveal the impact that tobacco control policies have on prenatal smoking. The purpose of this study is to estimate the effect of tobacco control policies on prenatal smoking prevalence and adverse MCH outcomes. The US SimSmoke simulation model was extended to consider adverse MCH outcomes. The model estimates prenatal smoking prevalence and, applying standard attribution methods, uses estimates of MCH prevalence and relative smoking risks to estimate smoking-attributable MCH outcomes over time. The model then estimates the effect of tobacco control policies on adverse birth outcomes averted. Different tobacco control policies have varying impacts on the number of smoking-attributable adverse MCH birth outcomes. Higher cigarette taxes and comprehensive marketing bans individually have the biggest impact with a 5% to 10% reduction across all outcomes for the period from 2015 to 2065. The policies with the lowest impact (2%-3% decrease) during this period are cessation treatment, health warnings, and complete smoke-free laws. Combinations of all policies with each tax level lead to 23% to 28% decreases across all outcomes. Our findings demonstrate the substantial impact of strong tobacco control policies for preventing adverse MCH outcomes, including long-term health implications for children exposed to low birth weight and preterm birth. These benefits are often overlooked in discussions of tobacco control. © The Author 2015. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  18. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  19. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  20. The rise and fall of dental therapy in Canada: a policy analysis and assessment of equity of access to oral health care for Inuit and First Nations communities.

    Science.gov (United States)

    Leck, Victoria; Randall, Glen E

    2017-07-20

    Inequality between most Canadians and those from Inuit and First Nations communities, in terms of both access to oral health care services and related health outcomes, has been a long-standing problem. Efforts to close this equity gap led to the creation of dental therapy training programs. These programs were designed to produce graduates who would provide services in rural and northern communities. The closure of the last dental therapy program in late 2011 has ended the supply of dental therapists and governments do not appear to have any alternative solutions to the growing gap in access to oral health care services between most Canadians and those from Inuit and First Nations communities. A policy analysis of the rise and fall of the dental therapy profession in Canada was conducted using historical and policy documents. The analysis is framed within Kingdon's agenda-setting framework and considers why dental therapy was originally pursued as an option to ensure equitable access to oral health care for Inuit and First Nations communities and why this policy has now been abandoned with the closure of Canada's last dental therapy training school. The closure of the last dental therapy program in Canada has the potential to further reduce access to dental care in some Inuit and First Nations communities. Overlaps between federal and provincial jurisdiction have contributed to the absence of a coordinated policy approach to address the equity gap in access to dental care which will exacerbate the inequalities in comparison to the general population. The analysis suggests that while a technically feasible policy solution is available there continues to be no politically acceptable solution and thus it remains unlikely that a window of opportunity for policy change will open any time soon. In the absence of federal government leadership, the most viable option forward may be incremental policy change. Provincial governments could expand the scope of practice for

  1. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  2. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  3. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  4. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  5. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Science.gov (United States)

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  6. Support the Open Access Movement

    CERN Multimedia

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  7. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  8. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  9. State Public Policies and the Racial/Ethnic Stratification of College Access and Choice in the State of Maryland

    Science.gov (United States)

    Perna, Laura W.; Steele, Patricia; Woda, Susan; Hibbert, Taifa

    2005-01-01

    This study uses descriptive analyses of data from multiple sources to examine changes during the 1990s in the racial/ethnic stratification of college access and choice in Maryland and to explore state public policies that may have influenced changes in the demand for and supply of higher education for students of different racial/ethnic groups…

  10. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  11. Educational linguistic policies and the problem of the access paradox to literate practices and social inclusion: Interpretations under the light of applied linguistics

    Directory of Open Access Journals (Sweden)

    Rosângela Hammes Rodrigues

    2016-10-01

    Full Text Available http://dx.doi.org/10.5007/1984-8412.2016v13n3p1444 In this essay I discuss the issue of educational public policies for social inclusion and of educational linguistic policies, and the issue of the accessibility paradox and social inclusion, because accessibility and inclusion alone may not promote equality between individuals and cultural diversity, but maintain and reproduce existing relations of domination. This happens because the access and the relation with social interactions mediated by secondary genres, dominant literacies and linguistic variety of prestige are, first of all, the interaction with practices and discourses of the dominant ideology, possibly representing another means for its maintenance. Based on the studies developed by the Bakhtin Circle, Paulo Freire, and Hilary Janks, I analyze how we can address this paradox at school through plurivalence and sign dialectic, and through a problematizing, critical education.

  12. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  13. Case studies of natural resource access in Jharkhand, India

    DEFF Research Database (Denmark)

    Sareen, Siddharth

    This policy brief illustrates that decentralisation can only effectively support residents’ access to natural resources if it both resolves policy overlaps at multiple levels to bring about inclusive and equitable access and aligns policies with ground realities for specific natural resources....

  14. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  15. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  16. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  17. Information Security and Wireless: Alternate Approaches for Controlling Access to Critical Information

    National Research Council Canada - National Science Library

    Nandram, Winsome

    2004-01-01

    .... Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.

  18. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  19. Impact of Scheduling Policies on Control System Performance

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Ravn, Anders Peter; Nielsen, Jens Frederik Dalsgaard

    2003-01-01

    It is well known that jitter has an impact on control system performance, and this is often used as an argument for static scheduling policies, e.g. a time triggered architecture. However, it is only completion jitter that seriously disturbs standard linear control algorithms in a way similar to ...

  20. Air Pollution Control Policies in China: A Retrospective and Prospects.

    Science.gov (United States)

    Jin, Yana; Andersson, Henrik; Zhang, Shiqiu

    2016-12-09

    With China's significant role on pollution emissions and related health damage, deep and up-to-date understanding of China's air pollution policies is of worldwide relevance. Based on scientific evidence for the evolution of air pollution and the institutional background of environmental governance in China, we examine the development of air pollution control policies from the 1980s and onwards. We show that: (1) The early policies, until 2005, were ineffective at reducing emissions; (2) During 2006-2012, new instruments which interact with political incentives were introduced in the 11th Five-Year Plan, and the national goal of reducing total sulfur dioxide (SO₂) emissions by 10% was achieved. However, regional compound air pollution problems dominated by fine particulate matter (PM 2.5 ) and ground level ozone (O₃) emerged and worsened; (3) After the winter-long PM 2.5 episode in eastern China in 2013, air pollution control policies have been experiencing significant changes on multiple fronts. In this work we analyze the different policy changes, the drivers of changes and key factors influencing the effectiveness of policies in these three stages. Lessons derived from the policy evolution have implications for future studies, as well as further reforming the management scheme towards air quality and health risk oriented directions.

  1. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  2. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  3. Nuclear Export Control Policy in Korea - Present and future

    International Nuclear Information System (INIS)

    Kim, Jongsook

    2008-01-01

    The International community has been facing with the continued challenges for possession and proliferation of WMD over the past years. In addition, it is known that the terrorist groups are interested in acquiring WMD. The black market of WMD related materials and technologies show also the one of seriousness of our challenges. A number of international treaties, agreements and initiatives to control the proliferation of weapons of N, B, C and their delivery system have been existed to deal with these challenges, but their missions are challenged greatly in recent a series of nuclear issues by Iran and North Korea. The paper reviews the current international export control status and Korea export control system and policy. It also addresses some agenda to be done as future export control policy in Korea

  4. Design and Implementation of Linux Access Control Model

    Institute of Scientific and Technical Information of China (English)

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  5. Probing into the effectiveness of self-isolation policies in epidemic control

    International Nuclear Information System (INIS)

    Crokidakis, Nuno; Duarte Queirós, Sílvio M

    2012-01-01

    In this work, we inspect the reliability of controlling and quelling an epidemic disease mimicked by a susceptible–infected–susceptible (SIS) model defined on a complex network by means of current and implementable quarantine and isolation policies. Specifically, we consider that each individual in the network is originally linked to individuals of two types: members of the same household and acquaintances. The topology of this network evolves, taking into account a probability q that aims at representing the quarantine or isolation process in which the connection with acquaintances is severed according to standard policies of control of epidemics. Within current policies of self-isolation and standard infection rates, our results show that the propagation is either only controllable for hypothetical rates of compliance or not controllable at all

  6. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  7. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  8. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  9. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  10. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    Science.gov (United States)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective

  11. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  12. The Scope of the Common Commercial Policy after Lisbon: The Daiichi Sankyo and Conditional Access Services Grand Chamber Judgments

    NARCIS (Netherlands)

    Ankersmit, L.J.

    2014-01-01

    This case note discusses two important recent judgments rendered by the ECJ on the scope of the Common Commercial Policy. In Daiichi Sankyo (Case C-414/11), the Court overturned its previous case law on TRIPs in light of the entry into force of the Lisbon Treaty. In Conditional Access Services (Case

  13. Off-policy integral reinforcement learning optimal tracking control for continuous-time chaotic systems

    International Nuclear Information System (INIS)

    Wei Qing-Lai; Song Rui-Zhuo; Xiao Wen-Dong; Sun Qiu-Ye

    2015-01-01

    This paper estimates an off-policy integral reinforcement learning (IRL) algorithm to obtain the optimal tracking control of unknown chaotic systems. Off-policy IRL can learn the solution of the HJB equation from the system data generated by an arbitrary control. Moreover, off-policy IRL can be regarded as a direct learning method, which avoids the identification of system dynamics. In this paper, the performance index function is first given based on the system tracking error and control error. For solving the Hamilton–Jacobi–Bellman (HJB) equation, an off-policy IRL algorithm is proposed. It is proven that the iterative control makes the tracking error system asymptotically stable, and the iterative performance index function is convergent. Simulation study demonstrates the effectiveness of the developed tracking control method. (paper)

  14. Promoting Evidence to Policy Link on the Control of Infectious Diseases of Poverty in Nigeria: Outcome of A Multi-Stakeholders Policy Dialogue

    Science.gov (United States)

    Uneke, Chigozie Jesse; Ebeh Ezeoha, Abel; Uro-Chukwu, Henry; Ezeonu, Chinonyelum Thecla; Ogbu, Ogbonnaya; Onwe, Friday; Edoga, Chima

    2015-01-01

    Background: In Nigeria, malaria, schistosomiasis and lymphatic filariasis are among infectious diseases of poverty (IDP) with severe health burden and require effective policy strategies for their control. In this study, we investigated the value of policy brief and policy dialogue as excellent policymaking mechanisms that enable policymakers to adapt effective evidence informed policy for IDP control. Methods: A policy brief was developed on the control of malaria, schistosomiasis and lymphatic filariasis and subjected to deliberations in a one-day multi-stakeholder policy dialogue held in Ebonyi State Nigeria. A modified cross sectional intervention study design was used in this investigation. Structured pre-tested questionnaires were used to evaluate the policy brief document and policy dialogue process at the end of the policy dialogue. Results: Forty-seven policymakers participated in the dialogue. An analysis of the response on the policy brief regarding context, different features of the problem; policy options and key implementation considerations indicated the mean ratings (MNRs) mostly ranged from 6.40-6.85 on 7 point scale. The over-all assessment of the policy brief had MNR at 6.54. The analysis of the response on the policy dialogue regarding the level of priority of policy issue, opportunity to discuss different features of the problem and options for addressing the problem, and the MNRs mostly ranged from 6.50-6.82. The overall assessment of the policy dialogue had MNR at 6.72. Conclusion: Policy dialogues can allow research evidence to be considered together with views, experiences and tacit knowledge of policymakers and can enhance evidence-to-policy link. PMID:26290826

  15. Influence of export control policy on the competitiveness of machine tool producing organizations

    Science.gov (United States)

    Ahrstrom, Jeffrey D.

    The possible influence of export control policies on producers of export controlled machine tools is examined in this quantitative study. International market competitiveness theories hold that market controlling policies such as export control regulations may influence an organization's ability to compete (Burris, 2010). Differences in domestic application of export control policy on machine tool exports may impose throttling effects on the competitiveness of participating firms (Freedenberg, 2010). Commodity shipments from Japan, Germany, and the United States to the Russian market will be examined using descriptive statistics; gravity modeling of these specific markets provides a foundation for comparison to actual shipment data; and industry participant responses to a user developed survey will provide additional data for analysis using a Kruskal-Wallis one-way analysis of variance. There is scarce academic research data on the topic of export control effects within the machine tool industry. Research results may be of interest to industry leadership in market participation decisions, advocacy arguments, and strategic planning. Industry advocates and export policy decision makers could find data of interest in supporting positions for or against modifications of export control policies.

  16. Synergies in the Asian energy system: Climate change, energy security, energy access and air pollution

    International Nuclear Information System (INIS)

    Vliet, Oscar van; Krey, Volker; McCollum, David; Pachauri, Shonali; Nagai, Yu; Rao, Shilpa; Riahi, Keywan

    2012-01-01

    We use the MESSAGE model to examine multiple dimensions of sustainable development for three Asian regions in a set of scenarios developed for the Asian Modelling Exercise. Using climate change mitigation as a starting point for the analysis, we focus on the interaction of climate and energy with technology choice, energy security, energy access, and air pollution, which often have higher policy priority than climate change. Stringent climate policies drive the future energy supply in Asia from being dominated by coal and oil to a more diversified system based mostly on natural gas, coal with CCS, nuclear and renewable energy. The increase in diversity helps to improve the energy security of individual countries and regions. Combining air pollution control policies and universal energy access policies with climate policy can further help to reduce both outdoor and indoor air pollution related health impacts. Investments into the energy system must double by 2030 to achieve stringent climate goals, but are largely offset by lower costs for O and M and air pollution abatement. Strong focus on end-use efficiency also helps lowering overall total costs and allows for limiting or excluding supply side technologies from the mitigation portfolio. Costs of additional energy access policies and measures are a small fraction of total energy system costs. - Highlights: ► Half of added investments in energy offset by lower costs for O and M and air pollution. ► Costs for achieving universal energy access much smaller than energy system costs. ► Combined emissions and access policies further reduce air pollution impacts on health. ► Strong focus on end-use efficiency allows for more flexibility on energy sources. ► Stringent climate policy can improve energy security of Asian regions.

  17. RBAC Driven Least Privilege Architecture For Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hull, Julie [Honeywell International Inc., Golden Valley, MN (United States); Markham, Mark [Honeywell International Inc., Golden Valley, MN (United States)

    2014-01-25

    The concept of role based access control (RBAC) within the IT environment has been studied by researchers and was supported by NIST (circa 1992). This earlier work highlighted the benefits of RBAC which include reduced administrative workload and policies which are easier to analyze and apply. The goals of this research were to expand the application of RBAC in the following ways. Apply RBAC to the control systems environment: The typical RBAC model within the IT environment is used to control a user’s access to files. Within the control system environment files are replaced with measurement (e.g., temperature) and control (e.g. valve) points organized as a hierarchy of control assets (e.g. a boiler, compressor, refinery unit). Control points have parameters (e.g., high alarm limit, set point, etc.) associated with them. The RBAC model is extended to support access to points and their parameters based upon roles while at the same time allowing permissions for the points to be defined at the asset level or point level directly. In addition, centralized policy administration with distributed access enforcement mechanisms was developed to support the distributed architecture of distributed control systems and SCADA; Extend the RBAC model to include access control for software and devices: The established RBAC approach is to assign users to roles. This work extends that notion by first breaking the control system down into three layers 1) users, 2) software and 3) devices. An RBAC model is then created for each of these three layers. The result is that RBAC can be used to define machine-to-machine policy enforced via the IP security (IPsec) protocol. This highlights the potential to use RBAC for machine-to-machine connectivity within the internet of things; and Enable dynamic policy based upon the operating mode of the system: The IT environment is generally static with respect to policy. However, large cyber physical systems such as industrial controls have various

  18. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  19. The Impact of the Collapse of Communism and EU Accession on Language Education Policy and Practice in Central and Eastern Europe: Two Case-Studies Focussing on English and Russian as Foreign Languages in Hungary and Eastern Germany

    Science.gov (United States)

    Bruen, Jennifer; Sheridan, Vera

    2016-01-01

    This paper considers the impact of geopolitical factors, and in particular the collapse of Communism and EU accession, on language education policy and practice in Central and Eastern Europe (CEE). CEE is understood here as referring to the former soviet-controlled, eastern bloc counties of Bulgaria, the Czech Republic, East Germany, Hungary,…

  20. Asymmetric forecasting and commitment policy in a robust control problem

    OpenAIRE

    Taro Ikeda

    2013-01-01

    This paper provides a piece of results regarding asymmetric forecasting and commitment monetary policy with a robust control algorithm. Previous studies provide no clarification of the connection between asymmetric preference and robust commitment policy. Three results emerge from general equilibrium modeling with asymmetric preference: (i) the condition for system stability implies an average inflation bias with respect to asymmetry (ii) the effect of asymmetry can be mitigated if policy mak...

  1. Air Pollution Control Policies in China: A Retrospective and Prospects

    Science.gov (United States)

    Jin, Yana; Andersson, Henrik; Zhang, Shiqiu

    2016-01-01

    With China’s significant role on pollution emissions and related health damage, deep and up-to-date understanding of China’s air pollution policies is of worldwide relevance. Based on scientific evidence for the evolution of air pollution and the institutional background of environmental governance in China, we examine the development of air pollution control policies from the 1980s and onwards. We show that: (1) The early policies, until 2005, were ineffective at reducing emissions; (2) During 2006–2012, new instruments which interact with political incentives were introduced in the 11th Five-Year Plan, and the national goal of reducing total sulfur dioxide (SO2) emissions by 10% was achieved. However, regional compound air pollution problems dominated by fine particulate matter (PM2.5) and ground level ozone (O3) emerged and worsened; (3) After the winter-long PM2.5 episode in eastern China in 2013, air pollution control policies have been experiencing significant changes on multiple fronts. In this work we analyze the different policy changes, the drivers of changes and key factors influencing the effectiveness of policies in these three stages. Lessons derived from the policy evolution have implications for future studies, as well as further reforming the management scheme towards air quality and health risk oriented directions. PMID:27941665

  2. Air Pollution Control Policies in China: A Retrospective and Prospects

    Directory of Open Access Journals (Sweden)

    Yana Jin

    2016-12-01

    Full Text Available With China’s significant role on pollution emissions and related health damage, deep and up-to-date understanding of China’s air pollution policies is of worldwide relevance. Based on scientific evidence for the evolution of air pollution and the institutional background of environmental governance in China, we examine the development of air pollution control policies from the 1980s and onwards. We show that: (1 The early policies, until 2005, were ineffective at reducing emissions; (2 During 2006–2012, new instruments which interact with political incentives were introduced in the 11th Five-Year Plan, and the national goal of reducing total sulfur dioxide (SO2 emissions by 10% was achieved. However, regional compound air pollution problems dominated by fine particulate matter (PM2.5 and ground level ozone (O3 emerged and worsened; (3 After the winter-long PM2.5 episode in eastern China in 2013, air pollution control policies have been experiencing significant changes on multiple fronts. In this work we analyze the different policy changes, the drivers of changes and key factors influencing the effectiveness of policies in these three stages. Lessons derived from the policy evolution have implications for future studies, as well as further reforming the management scheme towards air quality and health risk oriented directions.

  3. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  4. International trade agreements: a threat to tobacco control policy.

    Science.gov (United States)

    Shaffer, E R; Brenner, J E; Houston, T P

    2005-08-01

    International covenants establish a role for governments in ensuring the conditions for human health and wellbeing, which has been recognised as a central human right. International trade agreements, conversely, prioritize the rights of corporations over health and human rights. International trade agreements are threatening existing tobacco control policies and restrict the possibility of implementing new controls. This situation is unrecognised by many tobacco control advocates in signatory nations, especially those in developing countries. Recent agreements on eliminating various trade restrictions, including those on tobacco, have expanded far beyond simply international movement of goods to include internal tobacco distribution regulations and intellectual property rules regulating advertising and labelling. Our analysis shows that to the extent trade agreements protect the tobacco industry, in itself a deadly enterprise, they erode human rights principles and contribute to ill health. The tobacco industry has used trade policy to undermine effective barriers to tobacco importation. Trade negotiations provide an unwarranted opportunity for the tobacco industry to assert its interests without public scrutiny. Trade agreements provide the industry with additional tools to obstruct control policies in both developed and developing countries and at every level. The health community should become involved in reversing these trends, and help promote additional measures to protect public health.

  5. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  6. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  7. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  8. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  9. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  10. RESEARCH Improving access and quality of care in a TB control ...

    African Journals Online (AJOL)

    or treatment. Improving access and quality of care in a. TB control programme. Vera Scott, Virginia Azevedo, Judy Caldwell. Objectives. To use a quality improvement approach to improve access to and quality of tuberculosis (TB) diagnosis and care in. Cape Town. Methods. Five HIV/AIDS/sexually transmitted infections/TB.

  11. Tobacco control policy development in the European Union: do political factors matter?

    NARCIS (Netherlands)

    Bosdriesz, Jizzo R.; Willemsen, Marc C.; Stronks, Karien; Kunst, Anton E.

    2015-01-01

    There has been much variation between European countries in the development of tobacco control policy. Not much is known about the factors that shape this variation. This study aimed to assess the role of political factors in tobacco control policy development. We used data from 11 European

  12. Measuring Physical Accessibility with Space-Time Prisms in a GIS: A Case Study of Access to Health-Care Facilities

    OpenAIRE

    Lee, Ming S.; McNally, Michael G.

    2002-01-01

    Physical accessibility is a measurement of opportunities available to people in a geographical region. The purpose of such a measurement is for the redirection of regional and transportation policies toward the provision of quality of life. Public policies should provide individuals with more options to choose from, and these options should be more equally distributed among the population. A physical accessibility measure can reflect the efficiency of policies in addressing these issues. This...

  13. Ethics policies and ethics work in cross-national genetic research and data sharing

    DEFF Research Database (Denmark)

    Hoeyer, Klaus; Tupasela, Aaro; Rasmussen, Malene B.

    2017-01-01

    of scientific work. This paper takes its point of departure in the practices of a Danish laboratory with great experience in international collaboration regarding genetic research. We focus on a simple query, what makes genetic material and health data flow, and which hopes and concerns travel along with them......In recent years, cross-national collaboration in medical research has gained increased policy attention. Policies are developed to enhance data sharing, ensure open-access, and harmonize international standards and ethics rules in order to promote access to existing resources and increase...... scientific output. In tandem with this promotion of data sharing, numerous ethics policies are developed to control data flows and protect privacy and confidentiality. Both sets of policy making, however, pay limited attention to the moral decisions and social ties enacted in the everyday routines...

  14. Policy Gradient Adaptive Dynamic Programming for Data-Based Optimal Control.

    Science.gov (United States)

    Luo, Biao; Liu, Derong; Wu, Huai-Ning; Wang, Ding; Lewis, Frank L

    2017-10-01

    The model-free optimal control problem of general discrete-time nonlinear systems is considered in this paper, and a data-based policy gradient adaptive dynamic programming (PGADP) algorithm is developed to design an adaptive optimal controller method. By using offline and online data rather than the mathematical system model, the PGADP algorithm improves control policy with a gradient descent scheme. The convergence of the PGADP algorithm is proved by demonstrating that the constructed Q -function sequence converges to the optimal Q -function. Based on the PGADP algorithm, the adaptive control method is developed with an actor-critic structure and the method of weighted residuals. Its convergence properties are analyzed, where the approximate Q -function converges to its optimum. Computer simulation results demonstrate the effectiveness of the PGADP-based adaptive control method.

  15. Computational Models Used to Assess US Tobacco Control Policies.

    Science.gov (United States)

    Feirman, Shari P; Glasser, Allison M; Rose, Shyanika; Niaura, Ray; Abrams, David B; Teplitskaya, Lyubov; Villanti, Andrea C

    2017-11-01

    Simulation models can be used to evaluate existing and potential tobacco control interventions, including policies. The purpose of this systematic review was to synthesize evidence from computational models used to project population-level effects of tobacco control interventions. We provide recommendations to strengthen simulation models that evaluate tobacco control interventions. Studies were eligible for review if they employed a computational model to predict the expected effects of a non-clinical US-based tobacco control intervention. We searched five electronic databases on July 1, 2013 with no date restrictions and synthesized studies qualitatively. Six primary non-clinical intervention types were examined across the 40 studies: taxation, youth prevention, smoke-free policies, mass media campaigns, marketing/advertising restrictions, and product regulation. Simulation models demonstrated the independent and combined effects of these interventions on decreasing projected future smoking prevalence. Taxation effects were the most robust, as studies examining other interventions exhibited substantial heterogeneity with regard to the outcomes and specific policies examined across models. Models should project the impact of interventions on overall tobacco use, including nicotine delivery product use, to estimate preventable health and cost-saving outcomes. Model validation, transparency, more sophisticated models, and modeling policy interactions are also needed to inform policymakers to make decisions that will minimize harm and maximize health. In this systematic review, evidence from multiple studies demonstrated the independent effect of taxation on decreasing future smoking prevalence, and models for other tobacco control interventions showed that these strategies are expected to decrease smoking, benefit population health, and are reasonable to implement from a cost perspective. Our recommendations aim to help policymakers and researchers minimize harm and

  16. Better Monetary Control may Increase the Inflationary Bias of Policy

    NARCIS (Netherlands)

    O.H. Swank (Otto)

    1994-01-01

    textabstractExplores the implications of imperfect monetary control and uncertainty about the trade-off between output and inflation to discretionary policy. Impact of imperfect control of money growth on policymakers' incentive to create surprises; Consequences of imperfect control of money growth

  17. A controlled community-based trial to promote smoke-free policy in rural communities.

    Science.gov (United States)

    Hahn, Ellen J; Rayens, Mary Kay; Adkins, Sarah; Begley, Kathy; York, Nancy

    2015-01-01

    Rural, tobacco-growing areas are disproportionately affected by tobacco use, secondhand smoke, and weak tobacco control policies. The purpose was to test the effects of a stage-specific, tailored policy-focused intervention on readiness for smoke-free policy, and policy outcomes in rural underserved communities. A controlled community-based trial including 37 rural counties. Data were collected annually with community advocates (n = 330) and elected officials (n = 158) in 19 intervention counties and 18 comparison counties over 5 years (average response rate = 68%). Intervention communities received policy development strategies from community advisors tailored to their stage of readiness and designed to build capacity, build demand, and translate and disseminate science. Policy outcomes were tracked over 5 years. Communities receiving the stage-specific, tailored intervention had higher overall community readiness scores and better policy outcomes than the comparison counties, controlling for county-level smoking rate, population size, and education. Nearly one-third of the intervention counties adopted smoke-free laws covering restaurants, bars, and all workplaces compared to none of the comparison counties. The stage-specific, tailored policy-focused intervention acted as a value-added resource to local smoke-free campaigns by promoting readiness for policy, as well as actual policy change in rural communities. Although actual policy change and percent covered by the policies were modest, these areas need additional resources and efforts to build capacity, build demand, and translate and disseminate science in order to accelerate smoke-free policy change and reduce the enormous toll from tobacco in these high-risk communities. © 2014 National Rural Health Association.

  18. [Tobacco control policies and perinatal health].

    Science.gov (United States)

    Peelen, M J; Sheikh, A; Kok, M; Hajenius, P; Zimmermann, L J; Kramer, B W; Hukkelhoven, C W; Reiss, I K; Mol, B W; Been, J V

    2017-01-01

    Study the association between the introduction of tobacco control policies in the Netherlands and changes in perinatal outcomes. National quasi-experimental study. We used Netherlands Perinatal Registry data (now called Perined) for the period 2000-2011. We studied whether the introduction of smoke-free legislation in workplaces plus a tobacco tax increase and mass media campaign in January 2004, and extension of the smoke-free law to the hospitality industry accompanied by another tax increase and media campaign in July 2008, was associated with changes in perinatal outcomes. We studied all singleton births (gestational age: 24+0 to 42+6 weeks). Our primary outcome measures were: perinatal mortality, preterm birth and being small-for-gestational-age (SGA). Interrupted time series logistic regression analyses were performed to investigate changes in these outcomes occurred after the introduction of the aforementioned tobacco control policies (ClinicalTrials.gov: NCT02189265). Among 2,069,695 singleton births, 13,027 (0.6%) perinatal deaths, 116,043 (5.6%) preterm live-births and 187,966 (9.1%) SGA live-births were observed. The policies introduced in January 2004 were not associated with significant changes in any of the primary outcome measures. A -4.4% (95% CI: -6.4 to -2.4; p hospitality industry, a further tax increase and another media campaign. This translates to an estimated over 500 cases of SGA being averted per year. A reduction in SGA births, but not preterm birth or perinatal mortality, was observed in the Netherlands after extension of the smoke-free workplace law to include bars and restaurants, in conjunction with a tax increase and media campaign in 2008.

  19. Air Pollution Control Policies in China: A Retrospective and Prospects

    OpenAIRE

    Jin, Yana; Andersson, Henrik; Zhang, Shiqiu

    2016-01-01

    With China’s significant role on pollution emissions and related health damage, deep and up-to-date understanding of China’s air pollution policies is of worldwide relevance. Based on scientific evidence for the evolution of air pollution and the institutional background of environmental governance in China, we examine the development of air pollution control policies from the 1980s and onwards. We show that: (1) The early policies, until 2005, were ineffective at reducing emissions; (2) Duri...

  20. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    delays and also by the choice of the time instances at which sensor information is accessed. In order to optimize the latter, we introduce an information quality metric and a mathematical model based on Markov chains, which are compared performance-wise to a heuristic approach for finding this parameter......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  1. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  2. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  3. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  4. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  5. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  6. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  7. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  8. Development of an omnibus policy for tobacco control in the Philippine department of health

    Directory of Open Access Journals (Sweden)

    Lee Edson Yarcia

    2018-03-01

    Tobacco control regime complexes and regulatory gaps result from the difficulty of determining issuance provisions that have been impliedly repealed. The analytical tool developed threshed out repealed provisions, which would allow actors and stakeholders to fulfil individual mandates. Both Omnibus Policy on Tobacco Control and 2017-2030 Policy Development Plan on Tobacco Control would guide the DOH in formulating policies that strengthen the Philippines´ compliance with the FCTC.

  9. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  10. IMPROVING ACCESS TO DRUGS

    Directory of Open Access Journals (Sweden)

    Max Joseph Herman

    2012-11-01

    Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs

  11. Exploring perceptions of HIV risk and health service access among Zimbabwean migrant women in Johannesburg: a gap in health policy in South Africa?

    Science.gov (United States)

    Munyewende, Pascalia; Rispel, Laetitia C; Harris, Bronwyn; Chersich, Matthew

    2011-01-01

    We present qualitative data from a 2005 exploratory study, recently published studies, and an analysis of the Department of Health's strategic plan to highlight the need for a broader policy debate on health-care access for migrants in South Africa. We conducted in-depth interviews with 15 Zimbabwean women living in inner-city Johannesburg to document the special characteristics of this group of migrants, enquiring about their perceptions of HIV risk, and experiences of health services in South Africa. We identified access barriers, namely perceptions of relatively low HIV risk, severely constrained financial circumstances, uncertain legal status, and experiences of unresponsive health workers. We recommend that migrant-health rights be placed on South Africa's policy agenda, migrants be included in HIV prevention programs and that health workers be sensitized to the needs of migrants.

  12. A New Regulation Policy for Accounting and Control of Nuclear Material

    Energy Technology Data Exchange (ETDEWEB)

    Kim, K. H.; Kim, M. S.; Ahn, S. H. [Korea Institute of Nuclear nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-05-15

    Nuclear Safety and Security Commission(NSSC) has amended two public notices about the regulation of nuclear material accounting and control(NMAC). Those notices were declared in November 2014 and entry into force since 2015. According to this legislation, a new type of NMAC inspection system was introduced and facility rules for NMAC approved by the government should be revised subsequently. These changes were one of the preemptive actions to cope with the emergence of new international safeguards policy and increasing demand on advanced nuclear technology. Generally, the regulation policy affects the nuclear business including research and development. Therefore, understanding of the new policy and its making process may help stakeholders to minimize unnecessary financial and operational burden. This study describes background, features, and institutionalization of the new regulation policy for NMAC. The new regulation policy for NMAC was established and institutionalized to preemptively cope with the internal and external demand on 'better' national system of accounting and control of nuclear material. This new policy and regulation system may call not only the regulator but also nuclear business operators for new works to make their system more effective and efficient.

  13. A New Regulation Policy for Accounting and Control of Nuclear Material

    International Nuclear Information System (INIS)

    Kim, K. H.; Kim, M. S.; Ahn, S. H.

    2016-01-01

    Nuclear Safety and Security Commission(NSSC) has amended two public notices about the regulation of nuclear material accounting and control(NMAC). Those notices were declared in November 2014 and entry into force since 2015. According to this legislation, a new type of NMAC inspection system was introduced and facility rules for NMAC approved by the government should be revised subsequently. These changes were one of the preemptive actions to cope with the emergence of new international safeguards policy and increasing demand on advanced nuclear technology. Generally, the regulation policy affects the nuclear business including research and development. Therefore, understanding of the new policy and its making process may help stakeholders to minimize unnecessary financial and operational burden. This study describes background, features, and institutionalization of the new regulation policy for NMAC. The new regulation policy for NMAC was established and institutionalized to preemptively cope with the internal and external demand on 'better' national system of accounting and control of nuclear material. This new policy and regulation system may call not only the regulator but also nuclear business operators for new works to make their system more effective and efficient

  14. Evaluation of Tobacco Control Policies in Bangladesh | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The three-year evaluation is expected to shed light on such issues as the price ... the effects of tobacco control policies; and changes in the form of tobacco use. ... Minister Bibeau announces appointments of IDRC's President and new ...

  15. A lost chance? Birth control policies in the Mao's China (1949-1976

    Directory of Open Access Journals (Sweden)

    Daniel Gomá

    2010-12-01

    Full Text Available This article analyzes the birth control policies in China during the Maoist era (1949- 1976. Considering Chinese and foreign sources, it is explained how the different campaigns of family planning took place and how these campaigns were subjected positively and negatively to the policies of the supreme leader Mao Zedong. Although only the last one had a real impact on the fight against overpopulation, all campaigns helped to promote the necessity of confronting this phenomenon. More importantly, they laid the foundations of the birth control policies that currently take place in China.

  16. Dynamic RACH Partition for Massive Access of Differentiated M2M Services

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2016-03-01

    Full Text Available In machine-to-machine (M2M networks, a key challenge is to overcome the overload problem caused by random access requests from massive machine-type communication (MTC devices. When differentiated services coexist, such as delay-sensitive and delay-tolerant services, the problem becomes more complicated and challenging. This is because delay-sensitive services often use more aggressive policies, and thus, delay-tolerant services get much fewer chances to access the network. To conquer the problem, we propose an efficient mechanism for massive access control over differentiated M2M services, including delay-sensitive and delay-tolerant services. Specifically, based on the traffic loads of the two types of services, the proposed scheme dynamically partitions and allocates the random access channel (RACH resource to each type of services. The RACH partition strategy is thoroughly optimized to increase the access performances of M2M networks. Analyses and simulation demonstrate the effectiveness of our design. The proposed scheme can outperform the baseline access class barring (ACB scheme, which ignores service types in access control, in terms of access success probability and the average access delay.

  17. Public Smoking Bans, Youth Access Laws, and Cigarette Sales at Vending Machines

    OpenAIRE

    Kvasnicka, Michael

    2010-01-01

    Tobacco control policies have proliferated in many countries in recent years, in particular youth access laws and public smoking bans. The effectiveness of youth access laws is still disputed, however, as are the costs of public smoking bans to the hospitality industry. Using a unique data set on cigarette sales at more than 100k vending machines that provides first objective evidence on the outgoing and customer behavior of smokers, we study both outcome dimensions by investigating several r...

  18. Policy environment for prevention, control and management of cardiovascular diseases in primary health care in Kenya.

    Science.gov (United States)

    Asiki, Gershim; Shao, Shuai; Wainana, Carol; Khayeka-Wandabwa, Christopher; Haregu, Tilahun N; Juma, Pamela A; Mohammed, Shukri; Wambui, David; Gong, Enying; Yan, Lijing L; Kyobutungi, Catherine

    2018-05-09

    In Kenya, cardiovascular diseases (CVDs) accounted for more than 10% of total deaths and 4% of total Disability-Adjusted Life Years (DALYs) in 2015 with a steady increase over the past decade. The main objective of this paper was to review the existing policies and their content in relation to prevention, control and management of CVDs at primary health care (PHC) level in Kenya. A targeted document search in Google engine using keywords "Kenya national policy on cardiovascular diseases" and "Kenya national policy on non-communicable diseases (NCDs)" was conducted in addition to key informant interviews with Kenyan policy makers. Relevant regional and international policy documents were also included. The contents of documents identified were reviewed to assess how well they aligned with global health policies on CVD prevention, control and management. Thematic content analysis of the key informant interviews was also conducted to supplement the document reviews. A total of 17 documents were reviewed and three key informants interviewed. Besides the Tobacco Control Act (2007), all policy documents for CVD prevention, control and management were developed after 2013. The national policies were preceded by global initiatives and guidelines and were similar in content with the global policies. The Kenya health policy (2014-2030), The Kenya Health Sector Strategic and Investment Plan (2014-2018) and the Kenya National Strategy for the Prevention and Control of Non-communicable diseases (2015-2020) had strategies on NCDs including CVDs. Other policy documents for behavioral risk factors (The Tobacco Control Act 2007, Alcoholic Drinks Control (Licensing) Regulations (2010)) were available. The National Nutrition Action Plan (2012-2017) was available as a draft. Although Kenya has a tiered health care system comprising primary healthcare, integration of CVD prevention and control at PHC level was not explicitly mentioned in the policy documents. This review revealed

  19. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    grids, which targets a reduction of over- and under voltage level situations by adjusting reactive power production of selected low voltage grid assets. The paper models different information access schemes between remote assets and controller, which is activated only when certain voltage thresholds...... stochastic models. We investigate in this paper the suitability for using these two metrics for optimization in a voltage grid control scenario. We conclude that, while the mismatch probability is very useful compared to the simpler information age metric from a network designers and operators point of view...

  20. An encryption scheme for a secure policy updating

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, M.; Petkovic, M.; Obaidat, M.S.; Tsihrintzis, G.A.; Filipe, J.

    2012-01-01

    Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the

  1. Effectiveness of hospital-wide methicillin-resistant Staphylococcus aureus (MRSA infection control policies differs by ward specialty.

    Directory of Open Access Journals (Sweden)

    Rosemarie Sadsad

    Full Text Available Methicillin-resistant Staphylococcus aureus (MRSA is a major cause of preventable nosocomial infections and is endemic in hospitals worldwide. The effectiveness of infection control policies varies significantly across hospital settings. The impact of the hospital context towards the rate of nosocomial MRSA infections and the success of infection control is understudied. We conducted a modelling study to evaluate several infection control policies in surgical, intensive care, and medical ward specialties, each with distinct ward conditions and policies, of a tertiary public hospital in Sydney, Australia. We reconfirm hand hygiene as the most successful policy and find it to be necessary for the success of other policies. Active screening for MRSA, patient isolation in single-bed rooms, and additional staffing were found to be less effective. Across these ward specialties, MRSA transmission risk varied by 13% and reductions in the prevalence and nosocomial incidence rate of MRSA due to infection control policies varied by up to 45%. Different levels of infection control were required to reduce and control nosocomial MRSA infections for each ward specialty. Infection control policies and policy targets should be specific for the ward and context of the hospital. The model we developed is generic and can be calibrated to represent different ward settings and pathogens transmitted between patients indirectly through health care workers. This can aid the timely and cost effective design of synergistic and context specific infection control policies.

  2. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  3. Influence of health-insurance access and hospital retention policies on childhood cancer treatment in Kenya.

    Science.gov (United States)

    Mostert, S; Njuguna, F; van de Ven, P M; Olbara, G; Kemps, L J P A; Musimbi, J; Strother, R M; Aluoch, L M; Skiles, J; Buziba, N G; Sitaresmi, M N; Vreeman, R C; Kaspers, G J L

    2014-05-01

    Kenyan national policies for public hospitals dictate that patients are retained on hospital wards until their hospital bills are paid, but this payment process differs for patients with or without access to National Hospital Insurance Fund (NHIF) at diagnosis. Whether these differences impact treatment outcomes has not been described. Our study explores whether childhood cancer treatment outcomes in Kenya are influenced by health-insurance status and hospital retention policies. This study combined retrospective review of medical records with an illustrative case report. We identified children diagnosed with malignancies at a large Kenyan academic hospital between 2007 and 2009, their treatment outcomes, and health-insurance status at diagnosis. Between 2007 and 2009, 222 children were diagnosed with malignancies. Among 180 patients with documented treatment outcome, 54% abandoned treatment, 22% had treatment-related death, 4% progressive/relapsed disease, and 19% event-free survival. Health-insurance status at diagnosis was recorded in 148 children: 23% had NHIF and 77% had no NHIF. For children whose families had NHIF compared with those who did not, the relative risk for treatment abandonment relative to event-free survival was significantly smaller (relative-risk ratio = 0.31, 95% CI = 0.12-0.81, P = 0.016). The case report illustrates difficulties that Kenyan families might face when their child is diagnosed with cancer, has no NHIF, and is retained in hospital. Children with NHIF at diagnosis had significantly lower chance of abandoning treatment and higher chance of survival. Childhood cancer treatment outcomes could be improved by interventions that prevent treatment abandonment and improve access to NHIF. Hospital retention of patients over unpaid medical bills must stop. © 2013 Wiley Periodicals, Inc.

  4. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance......It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...

  5. Domestic politics, citizen activism, and U.S. nuclear arms control policy

    International Nuclear Information System (INIS)

    Knopf, J.W.

    1991-01-01

    The author seeks to ascertain whether and how citizens' movements concerning nuclear arms control and disarmament affect US arms control policy. The author employs a comparative case study methodology. He examines cases of the Eisenhower and Kennedy Administrations during the period of protest against nuclear testing, and the Reagan Administration during the nuclear weapons freeze campaign and the subsequent campaign for a comprehensive test ban. He hows there are four mechanisms through which public advocacy efforts can influence arms control policy, identifies the conditions under which each can be effective, and details the type of impact each mechanism has. Domestic activism interacts with broader public opinion in a way that creates electoral pressure; with elite-level debates in a way that removes a consensus behind presidential policy or changes the winning coalition in Congress; with bureaucratic politics, by generating ideas that have utility for some agents within the Executive; or with the public diplomacy of foreign governments, especially the Soviet Union. Citizens' movements had an impact on policy in each of the cases studied. The type and extent of impact, and the mechanisms involved in giving activism influence, are different for each case

  6. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  7. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  8. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  9. Influence of Special Needs Education Policy on Access to Secondary School Education by Learners with Hearing Impairments in Nandi County, Kenya

    Science.gov (United States)

    Muhombe, Joseph Andrew; Rop, Naftali K.; Ogola, Fredrick O.; Wesonga, Justus Nyongesa

    2015-01-01

    This study sought to examine influence of Special Needs Education Policy on access to secondary school education by learners with hearing impairments in Nandi County, Kenya. The study was informed by the Multiple Intelligences theory and the Dewey theory of Progressivism. The findings showed that majority of the respondents were aware of the…

  10. Perspectives of policy and political decision makers on access to formal dementia care: expert interviews in eight European countries.

    Science.gov (United States)

    Broda, Anja; Bieber, Anja; Meyer, Gabriele; Hopper, Louise; Joyce, Rachael; Irving, Kate; Zanetti, Orazio; Portolani, Elisa; Kerpershoek, Liselot; Verhey, Frans; Vugt, Marjolein de; Wolfs, Claire; Eriksen, Siren; Røsvik, Janne; Marques, Maria J; Gonçalves-Pereira, Manuel; Sjölund, Britt-Marie; Woods, Bob; Jelley, Hannah; Orrell, Martin; Stephan, Astrid

    2017-08-03

    As part of the ActifCare (ACcess to Timely Formal Care) project, we conducted expert interviews in eight European countries with policy and political decision makers, or representatives of relevant institutions, to determine their perspectives on access to formal care for people with dementia and their carers. Each ActifCare country (Germany, Ireland, Italy, The Netherlands, Norway, Portugal, Sweden, United Kingdom) conducted semi-structured interviews with 4-7 experts (total N = 38). The interview guide addressed the topics "Complexity and Continuity of Care", "Formal Services", and "Public Awareness". Country-specific analysis of interview transcripts used an inductive qualitative content analysis. Cross-national synthesis focused on similarities in themes across the ActifCare countries. The analysis revealed ten common themes and two additional sub-themes across countries. Among others, the experts highlighted the need for a coordinating role and the necessity of information to address issues of complexity and continuity of care, demanded person-centred, tailored, and multidisciplinary formal services, and referred to education, mass media and campaigns as means to raise public awareness. Policy and political decision makers appear well acquainted with current discussions among both researchers and practitioners of possible approaches to improve access to dementia care. Experts described pragmatic, realistic strategies to influence dementia care. Suggested innovations concerned how to achieve improved dementia care, rather than transforming the nature of the services provided. Knowledge gained in these expert interviews may be useful to national decision makers when they consider reshaping the organisation of dementia care, and may thus help to develop best-practice strategies and recommendations.

  11. Open access policy at Reviews in Health Care

    Directory of Open Access Journals (Sweden)

    Silvia Maina

    2011-07-01

    Full Text Available [The abstract of this article is not available. Here are the first sentence of the interview with Peter Suber. The complete interview is freely available upon registration]Peter Suber (http://bit.ly/suber is Berkman Fellow at Harvard University, Senior Researcher at SPARC, the Open Access Project Director at Public Knowledge, and Research Professor of Philosophy at Earlham College. He conducts research, writing, consulting, and advocacy on open access and related topics.Q: The aim of open access is to remove access barriers to publication. Don’t you think that fee-based model can be an obstacle for authors in less-developed countries?A: Fee-based OA journals don’t work as well as no-fee OA journals in fields and countries where most research is unfunded. But it’s important to remember that the vast majority of OA journals (70% charge no publication fees at all. The percentage is even higher for OA journals published in developing countries. For example, nearly all the OA journals published in India are no-fee. It’s equally important to remember that green OA, or OA through repositories, is an inexpensive alternative to gold OA, or OA through journals.

  12. The ERS role on Tobacco Control Policy in Europe

    Directory of Open Access Journals (Sweden)

    Christina Gratziou

    2016-03-01

    Full Text Available The European Respiratory Society is an international medical organisation that brings together physicians, healthcare professionals, scientists and other experts working in respiratory medicine. Its aim is to alleviate suffering from respiratory diseases and promote lung health globally through science, education and advocacy. ERS has since its founding in 1990 demonstrated strong commitment to tobacco control. Through scientific assemblies, education courses, various alliances and collaboration (Framework Convention Alliance, European Chronic Disease Alliance, World Health Organisation etc. As well as a Tobacco Control Committee (TCC dedicated to advocacy, ERS constantly strives to promote strong and evidence-based policies to reduce the burden of tobacco related diseases. One of the main outcome of the TCC is the creation of Smokehaz, a website aimed at providing policy-makers with scientific information on the Health hazards associated with smoking. Recently, ERS created the Latin-America Working Group which aims at strengthening tobacco control activities in Spain, Portugal and Latin-American countries.

  13. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    In this study, a fuzzy expert system Trust-Based Access Control (TBAC) model for improving the Quality of crowdsourcing using emotional affective computing is presented. This model takes into consideration a pre-processing module consisting of three inputs such as crowd-workers category, trust metric and emotional ...

  14. Smoking inequalities and tobacco control policies in Europe

    NARCIS (Netherlands)

    Kuipers, M.A.G.

    2016-01-01

    Smoking is the worlds’ leading avoidable cause of mortality and kills 6 million people each year. Individuals of lower socioeconomic status are more likely to initiate smoking and less likely to quit smoking. Tobacco control policies have been implemented in the last decades, but although smoking

  15. Policy-relevant behaviours predict heavier drinking and mediate the relationship with age, gender and education status: Analysis from the International Alcohol Control study.

    Science.gov (United States)

    Casswell, Sally; Huckle, Taisia; Wall, Martin; Parker, Karl; Chaiyasong, Surasak; Parry, Charles D H; Viet Cuong, Pham; Gray-Phillip, Gaile; Piazza, Marina

    2018-02-21

    To investigate behaviours related to four alcohol policy variables (policy-relevant behaviours) and demographic variables in relation to typical quantities of alcohol consumed on-premise in six International Alcohol Control study countries. General population surveys with drinkers using a comparable survey instrument and data analysed using path analysis in an overall model and for each country. typical quantities per occasion consumed on-premise; gender, age; years of education, prices paid, time of purchase, time to access alcohol and liking for alcohol advertisements. In the overall model younger people, males and those with fewer years of education consumed larger typical quantities. Overall lower prices paid, later time of purchase and liking for alcohol ads predicted consuming larger typical quantities; this was found in the high-income countries, less consistently in the high-middle-income countries and not in the low middle-income country. Three policy-relevant behaviours (prices paid, time of purchase, liking for alcohol ads) mediated the relationships between age, gender, education and consumption in high-income countries. International Alcohol Control survey data showed a relationship between policy-relevant behaviours and typical quantities consumed and support the likely effect of policy change (trading hours, price and restrictions on marketing) on heavier drinking. The path analysis also revealed policy-relevant behaviours were significant mediating variables between the effect of age, gender and educational status on consumption. However, this relationship is clearest in high-income countries. Further research is required to understand better how circumstances in low-middle-income countries impact effects of policies. © 2018 The Authors Drug and Alcohol Review published by John Wiley & Sons Australia, Ltd on behalf of Australasian Professional Society on Alcohol and other Drugs.

  16. Expanding Fiscal Policies for Global and National Tobacco Control ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project aims to accelerate the adoption of effective fiscal policies for public ... control and/or innovative financing mechanisms in low- and middle-income ... from the health sciences, medicine, chemistry and engineering departments.

  17. Integrating CERN e-groups into TWiki access control.

    CERN Document Server

    Jones, PL; Hoymr, N; CERN. Geneva. IT Department

    2010-01-01

    Wikis allow for easy collaborative editing of documents on the web for users located in different buildings, cities or even countries. TWiki culture lends to open free form editing and most pages are world readable and editable by CERN authenticated users, however access control is possible and is used to protect sensitive documents. This note discusses the integration of E-groups for authorisation purposes at CERN.

  18. Policy framework for utilisation. A pillar of better accessibility

    International Nuclear Information System (INIS)

    2008-01-01

    The goals and frameworks for traffic and transport policy for the Netherlands to 2020 are described in the Mobility Document. Whereas government policy previously viewed mobility as a problem or as something permissible, the assumption is now that mobility is a must. Mobility, for people as well as goods, is a prerequisite for society and the economy to function well. The Mobility Document contains ambitious goals to deal with current and anticipated traffic and transport problems: door to door, faster, cleaner and safer. Three interrelated pillars are to help achieve these goals: Building, Pricing and Utilisation. Work is being done on the Building and Pricing pillars; Utilisation is elaborated further in this policy framework. The Policy Framework for Utilisation is an elaboration of the Mobility Document for the 2008-2020 period and aims for faster, cleaner, safer travel from door to door. The purpose of this policy framework is to describe the direction of development of utilisation, in terms of content as well as process, to indicate actions that are required and to provide perspective on the expected effects. The policy framework is in line with current developments or plans, caters to new opportunities (technological and otherwise), encourages the innovative potential of the market and provides room for joint ventures between the government and the market. It will result in actions for the short term and provide direction for activities and developments for the longer term

  19. Policy environments matters: Access to higher education of non-traditional students in Denmark. Paper presented at the 56th CIES conference, San Juan, Puerto Rico, 22-27 April

    DEFF Research Database (Denmark)

    Milana, Marcella

    2012-01-01

    Despite the massification of higher education that has brought about an increase in the enrollment rates of non-traditional students, and the internationalization of higher education, which has led towards cross-national homogenization when it comes to the typology of educational programs run...... by universities, access of non-traditional students is still a much debated issue. The scope of this paper is to critically examine the policy environment, and related practice, which supports (or hampers) access to higher education of non-traditional students, with a special attention to adult and mature...... from a common ideal that results from cross-national cooperation implemented through the Bologna process. The data source includes relevant scientific literature, policy documents as well as interviews with policy makers, representatives of higher education institutions and non-traditional students...

  20. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  1. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  2. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  3. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  4. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  5. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  6. International Guidelines on Human Rights and Drug Control: A Tool for Securing Women's Rights in Drug Control Policy.

    Science.gov (United States)

    Schleifer, Rebecca; Pol, Luciana

    2017-06-01

    Discrimination and inequality shape women's experiences of drug use and in the drug trade and the impact of drug control efforts on them, with disproportionate burdens faced by poor and otherwise marginalized women. In recent years, UN member states and UN drug control and human rights entities have recognized this issue and made commitments to integrate a 'gender perspective' into drug control policies, with 'gender' limited to those conventionally deemed women. But the concept of gender in international law is broader, rooted in socially constructed and culturally determined norms and expectations around gender roles, sex, and sexuality. Also, drug control policies often fail to meaningfully address the specific needs and circumstances of women (inclusively defined), leaving them at risk of recurrent violations of their rights in the context of drugs. This article explores what it means to 'mainstream' this narrower version of gender into drug control efforts, using as examples various women's experiences as people who use drugs, in the drug trade, and in the criminal justice system. It points to international guidelines on human rights and drug control as an important tool to ensure attention to women's rights in drug control policy design and implementation.

  7. Realizing IoT service's policy privacy over publish/subscribe-based middleware.

    Science.gov (United States)

    Duan, Li; Zhang, Yang; Chen, Shiping; Wang, Shiyao; Cheng, Bo; Chen, Junliang

    2016-01-01

    The publish/subscribe paradigm makes IoT service collaborations more scalable and flexible, due to the space, time and control decoupling of event producers and consumers. Thus, the paradigm can be used to establish large-scale IoT service communication infrastructures such as Supervisory Control and Data Acquisition systems. However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all the events from the subscribed event type with no choice. Few existing publish/subscribe middleware have built-in mechanisms to address the above issues. In this paper, we present a novel access control framework, which is capable of preserving IoT service's policy privacy. In particular, we adopt the publish/subscribe paradigm as the IoT service communication infrastructure to facilitate the protection of IoT services policy privacy. The key idea in our policy-privacy solution is using a two-layer cooperating method to match bi-directional privacy control requirements: (a) data layer for protecting IoT events; and (b) application layer for preserving the privacy of service policy. Furthermore, the anonymous-set-based principle is adopted to realize the functionalities of the framework, including policy embedding and policy encoding as well as policy matching. Our security analysis shows that the policy privacy framework is Chosen-Plaintext Attack secure. We extend the open source Apache ActiveMQ broker by building into a policy-based authorization mechanism to enforce the privacy policy. The performance evaluation results indicate that our approach is scalable with reasonable overheads.

  8. The passage of tobacco control law 174 in Lebanon: reflections on the problem, policies and politics.

    Science.gov (United States)

    Nakkash, R T; Torossian, L; El Hajj, T; Khalil, J; Afifi, R A

    2018-06-01

    Progress in tobacco control policy making has occurred worldwide through advocacy campaigns involving multiple players- civil society groups, activists, academics, media and policymakers. The Framework Convention on Tobacco Control (FCTC)-the first ever global health treaty-outlines evidence-based tobacco control policies. Lebanon ratified the FCTC in 2005, but until 2011, tobacco control policies remained rudimentary and not evidence-based. Beginning in 2009, a concerted advocacy campaign was undertaken by a variety of stakeholders with the aim of accelerating the process of adopting a strong tobacco control policy. The campaign was successful, and Law 174 passed the Lebanese Parliament in August 2011. In this article, we analyse the policy making process that led to the adoption of Law 174 using Kingdon's model. The analysis relies on primary and secondary data sources including historical records of key governmental decisions, documentation of the activities of the concerted advocacy campaign and in-depth interviews with key stakeholders. We describe the opening of a window of opportunity as a result of the alignment of the problem, policy and politics streams. Furthermore, findings revealed that despite the challenge of persistent tobacco industry interference and established power relations between the industry, its allies and policymakers; policy entrepreneurs succeeded in supporting the alignment of the streams, and influencing the passage of the law. Kingdon's multiple stream approach was useful in explaining how tobacco control became an emerging policy issue at the front of the policy agenda in Lebanon.

  9. Socioeconomic inequalities in the impact of tobacco control policies on adolescent smoking

    DEFF Research Database (Denmark)

    Pförtner, Timo-Kolja; Hublet, Anne; Schnohr, Christina Warrer

    2016-01-01

    INTRODUCTION: There are concerns that tobacco control policies may be less effective in reducing smoking among disadvantaged socioeconomic groups and thus may contribute to inequalities in adolescent smoking. This study examines how the association between tobacco control policies and smoking of 15...... regression analyses were conducted to assess the association of weekly smoking with components of the Tobacco Control Scale (TCS), and to assess whether this association varied according to family affluence (FAS). Analyses were carried out per gender and adjusted for national wealth and general smoking rate...

  10. IMPACTS OF GROUP-BASED SIGNAL CONTROL POLICY ON DRIVER BEHAVIOR AND INTERSECTION SAFETY

    Directory of Open Access Journals (Sweden)

    Keshuang TANG

    2008-01-01

    Full Text Available Unlike the typical stage-based policy commonly applied in Japan, the group-based control (often called movement-based in the traffic control industry in Japan refers to such a control pattern that the controller is capable of separately allocating time to each signal group instead of stage based on traffic demand. In order to investigate its applicability at signalized intersections in Japan, an intersection located in Yokkaichi City of Mie Prefecture was selected as an experimental application site by the Japan Universal Traffic Management Society (UTMS. Based on the data collected at the intersection before and after implementing the group-based control policy respectively, this study evaluated the impacts of such a policy on driver behavior and intersection safety. To specify those impacts, a few models utilizing cycle-based data were first developed to interpret the occurrence probability and rate of red-light-running (RLR. Furthermore, analyses were performed on the yellow-entry time (Ye of the last cleared vehicle and post encroachment time (PET during the phase switching. Conclusions supported that the group-based control policy, along with certain other factors, directly or indirectly influenced the RLR behavior of through and right-turn traffics. Meanwhile, it has potential safety benefits as well, indicated by the declined Ye and increased PET values.

  11. 21 CFR 1401.2 - The Office of National Drug Control Policy-organization and functions.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false The Office of National Drug Control Policy-organization and functions. 1401.2 Section 1401.2 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY PUBLIC AVAILABILITY OF INFORMATION § 1401.2 The Office of National Drug Control Policy—organization and functions. (a) The Office of National Drug...

  12. Tobacco control policy in France: from war to compromise and collaboration

    Directory of Open Access Journals (Sweden)

    Alain Braillon

    2012-09-01

    Full Text Available BACKGROUND: Absence of an effective tobacco control policy costs lives and tobacco prevention is policy-sensitive. We describe the historical record of tobacco control in France. METHODS: Public policies and main decisions (laws, regulations, health plans for tobacco control were considered from 1950 to 2010. Data for cigarette sales and relative price of cigarettes were obtained from official databases. Sales are expressed in number of cigarettes. The relative price of cigarettes is the nominal price divided by the Consumer Price Index. RESULTS: The first step Veil Law (1976 blunted the steady increase in cigarette sales observed since World War II. The second period began with the Evin Law (1991. This law banned tobacco advertising and withdrew tobacco from the Consumer Price Index allowing for marked and repeated increases in taxes. Sales decreased over the next 6 years, from 97.1 billion to 83.0 billion in 1997 but then remained steady for 5 years (83.5 billion in 2001. The first Cancer Plan (2003 imposed three tax increases in a year (39% increase in price. Cigarette sales decreased to 54.9 billion in 2004. This period ended in 2004 when a moratorium on tobacco taxes was announced. The policies which have been implemented since President Sarkozy was elected in 2007 were flawed and protected the interests of the tobacco industry: prevalence of smoking is now increasing, mainly among the younger generation. Since 1991, the cigarette market has nearly halved but the decline has been a stop-and-go erratic process. The two 5-year periods (1997-2002 and 2005 -2010 during which consumption leveled off seem to demonstrate that government-driven health policies could have been influenced by commercial interests. CONCLUSION: Tobacco control efforts, especially tobacco tax increases, need to be sustained and shielded from the influence of the tobacco industry.

  13. Pollution control through innovation and technological development. Environmental policy concepts of the BDI

    Energy Technology Data Exchange (ETDEWEB)

    Meller, E

    1987-02-01

    Increasing acceptance of pollution control tasks call for enhanced innovative power both of industry and politics. One pre-requisite of boosting innovation is an environmental policy concept fit into the framework of the economic policy: A clear environmental strategy stating priorities and foreseeable, fixed data for the required adjustment of industry, selection of pollution control measures by means of verifiable cost-benefit analyses in cooperation with industry, embedding environmental policy in the context of the free market system and harmonization of means and methods on an international level. (orig./HSCH).

  14. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  15. Financial sustainability versus access and quality in a challenged health system: an examination of the capitation policy debate in Ghana.

    Science.gov (United States)

    Atuoye, Kilian Nasung; Vercillo, Siera; Antabe, Roger; Galaa, Sylvester Zackaria; Luginaah, Isaac

    2016-11-01

    Policy makers in low and middle-income countries are frequently confronted with challenges of increasing health access for poor populations in a sustainable manner. After several years of trying out different health financing mechanisms, health insurance has recently emerged as a pro-poor health financing policy. Capitation, a fixed fee periodically paid to health service providers for anticipated services, is one of the payment policies in health insurance. This article examines claims and counter-claims made by coalitions and individual stakeholders in a capitation payment policy debate within Ghana's National Health Insurance Scheme. Using content analysis of public and parliamentary proceedings, we situate the debate within policy making and health insurance literature. We found that the ongoing capitation payment debate stems from challenges in implementation of earlier health insurance claims payment systems, which reflect broader systemic challenges facing the health insurance scheme in Ghana. The study illustrates the extent to which various sub-systems in the policy debate advance arguments to legitimize their claims about the contested capitation payment system. In addition, we found that the health of poor communities, women and children are being used as surrogates for political and individual arguments in the policy debate. The article recommends a more holistic and participatory approach through persuasion and negotiation to join interests and core evidence together in the capitation policy making in Ghana and elsewhere with similar contexts. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Big Data for Public Health Policy-Making: Policy Empowerment.

    Science.gov (United States)

    Mählmann, Laura; Reumann, Matthias; Evangelatos, Nikolaos; Brand, Angela

    2018-04-04

    Digitization is considered to radically transform healthcare. As such, with seemingly unlimited opportunities to collect data, it will play an important role in the public health policy-making process. In this context, health data cooperatives (HDC) are a key component and core element for public health policy-making and for exploiting the potential of all the existing and rapidly emerging data sources. Being able to leverage all the data requires overcoming the computational, algorithmic, and technological challenges that characterize today's highly heterogeneous data landscape, as well as a host of diverse regulatory, normative, governance, and policy constraints. The full potential of big data can only be realized if data are being made accessible and shared. Treating research data as a public good, creating HDC to empower citizens through citizen-owned health data, and allowing data access for research and the development of new diagnostics, therapies, and public health policies will yield the transformative impact of digital health. The HDC model for data governance is an arrangement, based on moral codes, that encourages citizens to participate in the improvement of their own health. This then enables public health institutions and policymakers to monitor policy changes and evaluate their impact and risk on a population level. © 2018 S. Karger AG, Basel.

  17. 2003-2004 ACADEMIC TRAINING PROGRAMME (Renewable) Energy Policy in the EU Members States and the Accession States

    CERN Multimedia

    Françoise Benz

    2003-01-01

    13, 14, 15, 16, 17 October 2003 2003-2004 ACADEMIC TRAINING PROGRAMME LECTURE SERIES Main Auditorium bldg. 500 (Renewable) Energy Policy in the EU Members States and the Accession States D. Reiche / Free University of Berlin, D The aim of this lecture is to discuss the transformation of the energy sectors in the EU with the main focus on obstacles and success conditions for renewable energy sources. Besides the EU-15 and the ten states which will join the EU in 2004, Bulgaria and Romania which will probably join in 2007 as well as Turkey are analysed. The factors which influence renewable energy development are described as the path dependencies/starting positions in energy policy (natural conditions for the RES, availability of fossil resources, use of nuclear power), the instruments for promoting renewable energies (as feed-in tariffs or quota obligations), the economic (level of energy prices, for example), technological (i.e. grid capacity), and cognitive environment.

  18. Exposure to tobacco marketing and support for tobacco control policies.

    Science.gov (United States)

    Hammond, David; Costello, Mary-Jean; Fong, Geoffrey T; Topham, Jennifer

    2006-01-01

    To examine the salience of tobacco marketing on postsecondary campuses and student support for tobacco control policies. Face-to-face surveys were conducted with 1690 students at 3 universities in southwestern Ontario. Virtually all (97%) students reported noticing tobacco marketing in the past year, and 35% reported noticing marketing on campus. There was strong support for smoke-free restrictions on campus, including restaurants and bars (82%), and for prohibitions on campus marketing. The presence of campus policies was associated with reduced exposure to marketing and increased policy support. There is strong support among students to remove tobacco marketing from campus and to introduce comprehensive smoke-free restrictions.

  19. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  20. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an