WorldWideScience

Sample records for public key certificate

  1. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  2. 76 FR 48807 - Public Key Infrastructure (PKI) Certificate Action Form

    Science.gov (United States)

    2011-08-09

    ... Infrastructure (PKI) technology to support electronic commerce between the USPTO and its customers. PKI is a set... security for its electronic commerce systems, the USPTO uses PKI technology to protect the integrity and... DEPARTMENT OF COMMERCE United States Patent and Trademark Office Public Key Infrastructure (PKI...

  3. Security Issues of the Digital Certificates within Public Key Infrastructures

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.

  4. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  5. 76 FR 126 - Requirement for Commercial Users To Use Commercial Public Key Information (PKI) Certificate

    Science.gov (United States)

    2011-01-03

    ... DEPARTMENT OF DEFENSE Department of the Army Requirement for Commercial Users To Use Commercial..., SDDC will require all commercial accounts accessing transportation systems and applications to use a commercial PKI certificate or Transportation Workers Identification Credential (TWIC). This requirement will...

  6. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  7. The Whys and Hows of Certification. Public Librarian Certification Law.

    Science.gov (United States)

    Wisconsin State Dept. of Public Instruction, Madison. Div. of Library Services.

    Under Wisconsin state law (Administrative Code P1-6.03) any librarian employed in a public library system or any municipal public library, except in a city of the first class, supported in whole or in part by public funds, must hold state certification. Qualifications are delineated for three grades of certification: grade 1, for public libraries…

  8. Public key infrastructure building trusted applications and web services

    CERN Document Server

    Vacca, John R

    2004-01-01

    OVERVIEW OF PKI TECHNOLOGYPublic Key Infrastructures (PKIs): What Are They?Type of Certificate Authorities (CAS) ServicesPKI StandardsTypes of Vendor and Third-Party CA SystemsProtecting Private KeysCA System AttacksStolen Private Keys: What Can Be Done?Certificate Practice StatementsPKI ReadinessANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURESPKI Design IssuesCost Justification and ConsiderationPKI Standards Design IssuesPKI Architectural Design ConsiderationsIMPLEMENTING PKIRequirementsImplementation ScheduleImplementation CostsPKI PerformanceMANAGING PKIRequesting a CertificateObtaining a

  9. Architectural Building A Public Key Infrastructure Integrated Information Space

    Directory of Open Access Journals (Sweden)

    Vadim Ivanovich Korolev

    2015-10-01

    Full Text Available The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature. It performs the analysis of trust models at the formation of certificates and their use. The article describes the relationships between the trust model and the architecture public key infrastructure. It contains conclusions in respect of the options for building the public key infrastructure for integrated informationspace.

  10. Certification Manual for Wisconsin Public Librarians. Bulletin No. 94111.

    Science.gov (United States)

    Lamb, Donald K.

    This manual contains the guidelines and procedures for public librarian certification and certification renewal in Wisconsin. Certification is not required for library personnel other than administrators, but nonadministrators may apply for certification at the level for which they are eligible. Requirements for voluntary library certification are…

  11. Wisconsin Certification Manual for Public Librarians. Bulletin No. 7075.

    Science.gov (United States)

    Wisconsin State Dept. of Public Instruction, Madison. Div. of Library Services.

    Designed to be used as a guide for public librarians and boards of trustees in meeting the requirements of Wisconsin's public librarian certification law, this manual is divided into two major sections covering public librarian certification and certification renewal/continuing education requirements. The first section includes discussions of…

  12. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  13. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  14. Public-key encryption with chaos

    Science.gov (United States)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  15. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  16. 78 FR 76701 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-12-18

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and... December 7, [[Page 76702

  17. 78 FR 75441 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-12-11

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and... Novermber 30, 2013. The following Applications for Certificates of Public Convenience and Necessity and...

  18. 78 FR 68134 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-11-13

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and... October 26, 2013. The following Applications for Certificates of Public Convenience and Necessity and...

  19. 78 FR 25782 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-05-02

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and... April 20, 2013. The following Applications for Certificates of Public Convenience and Necessity and...

  20. 78 FR 20372 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits; Notice of...

    Science.gov (United States)

    2013-04-04

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits; Notice of Applications for Certificates of Public Convenience and... March 23, 2013 The following Applications for Certificates of Public Convenience and Necessity and...

  1. 78 FR 19354 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-03-29

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and... March 16, 2013. The following Applications for Certificates of Public Convenience and Necessity and...

  2. 49 CFR 1150.23 - Modified certificate of public convenience and necessity.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Modified certificate of public convenience and..., ACQUIRE, OR OPERATE RAILROAD LINES Modified Certificate of Public Convenience and Necessity § 1150.23 Modified certificate of public convenience and necessity. (a) The operator must file a notice with the...

  3. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  4. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  5. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...... in the case the adversary is granted access to partial information about the secret state of the primitive. To do so, we work in an extension of the standard black-box model, a new framework where possible leakage from the secret state is taken into account. In particular, we give the first construction...

  6. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  7. The Public-Key-Infrastructure of the Radiological Society of Germany

    International Nuclear Information System (INIS)

    Schuetze, B.; Kaemmerer, M.; Klos, G.; Mildenberger, P.

    2006-01-01

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law

  8. The Public-Key-Infrastructure of the Radiological Society of Germany

    Energy Technology Data Exchange (ETDEWEB)

    Schuetze, B. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)]. E-mail: schuetze@medizin-informatik.org; Kaemmerer, M. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Klos, G. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Mildenberger, P. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)

    2006-03-15

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law.

  9. No certificate, no chocolate

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Are you already ready to use “certificates” to log into CERN or to connect to the global “eduroam” wireless network? No, I am not talking about your birth certificate, medical certificates or academic certificates. I am referring to “certificates” used for authentication where you would usually use a password.   These digital certificates are a valid alternative to cumbersome passwords. Like the aforementioned personal certificates, a digital certificate is an official document that proves who you are or your qualifications. Your personal digital CERN certificate is tied to your digital identity at CERN. In that respect, a digital certificate is like a password. It is a credential that you must not share with anybody else! With your digital certificate, I can impersonate you and take over your mailbox, your web sessions and more… Digital certificates bind your digital identity to a public/private-key infrastructu...

  10. 75 FR 53999 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-09-02

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart Q) Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air... following Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits...

  11. 78 FR 63273 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2013-10-23

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart Q) Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air... following Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits...

  12. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  13. Certification of Public Librarians in the United States; A Detailed Summary of Legal and Voluntary Certification Plans for Public Librarians Based on Information Supplied by the Various Certificating State Agencies or other Appropriate Sources, 2nd Edition.

    Science.gov (United States)

    Frame, Ruth R.; Coyne, John R.

    Contained in this report is a detailed summary of legal and voluntary certification plans for public librarians in each of the 50 states. Descriptions of the certification plans for public librarians are based on information supplied by state agencies in September 1971. Each plan is identified by the descriptive terms--mandatory, permissive or…

  14. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Directory of Open Access Journals (Sweden)

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  15. Maintenance of Certification®, Maintenance of Public Trust

    Science.gov (United States)

    Chung, Kevin C.; Clapham, Philip J.; Lalonde, Donald H.

    2010-01-01

    The Maintenance of Certification® (MOC) program has been well received by many physicians, but faced significant opposition from others, who complain that it is overly tedious, costly, and irrelevant to their practice. This article offers a consolidated and concise history of the MOC program and a summary of what plastic surgeons need to know to successfully complete the American Board of Plastic Surgery’s (ABPS) own MOC requirements. The authors have justified each step of the ABPS’s MOC process in terms of how it improves the quality of care delivered to Plastic Surgery patients. Finally, a summary of research is presented that demonstrates both that the public supports the MOC process for all physicians and that continuing education and formal assessment and improvement initiatives have been linked in multiple studies to a better and more evidence-based medical practice. PMID:21285803

  16. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  17. Public information. Key issue paper no. 5

    International Nuclear Information System (INIS)

    Kyd, D.

    2000-01-01

    Nuclear power was welcomed from the outset because it promised highly economic and convenient energy, especially electricity. Even today, nuclear projects espoused by developing nations can stimulate enthusiasm and national pride. However, public unease concerning nuclear power safety was magnified by the accidents at Three Mile Island in 1979 and Chernobyl in 1986. The perceived problem of transport and long term storage of nuclear waste has added to public concerns, as has the risk of the possible proliferation of nuclear weapons. Public information strategies must recognize and seek to address these fears by pointing to the many cumulative years of trouble-free nuclear operations and by stressing the strict rules and oversight designed to protect workers and the public from accidents and radioactive releases. It is against this background that the following material has been compiled. It comes from a variety of sources and reflects the experience mainly of industrialized countries that have national nuclear programs. It is important to underline that it is descriptive rather than prescriptive in nature for two reasons: first, the IAEA is essentially a forum for pooling collective knowledge in this as in other fields; and secondly, the IAEA would not presume to offer a universal formula, since national circumstances vary according to specific political, demographic, social and other factors. Hence only certain parts of this paper may be of direct relevance to any given national situation. (author)

  18. Public health - threats, concerns and key actions

    DEFF Research Database (Denmark)

    Czeskleba-Dupont, Rolf

    Public health is discussed departing from priorities related to the precautionary principle with special reference to air pollution from wood burning in individual stoves and the susceptibility of vulnerable groups, i.a. people with genetic predispositions for a lack of detoxifying capacity....

  19. ISO 9001 - Certificates by industrial sector in the world as a key decision variable

    Directory of Open Access Journals (Sweden)

    Katarzyna Hys

    2015-12-01

    Full Text Available The aim of this article is to present and analyse trends in the scope of the implementation of quality certificates compliant with the ISO 9001 standard. The analysis will concern the trend in the sectoral approach all over the world. The preparation of data, their analysis and drawing conclusions have been made on the basis of the desk research method. The data was gathered by means of an analysis of source materials such as, among others: announcements, press releases, reports for industries, publicly available reports of companies and research institutions, information from the Internet.The main conclusion is the fact that the number of certificates compliant with the ISO 9001 standard is constantly growing in the world. The kind of business activity determines the engagement in the certificate implementation. The subject of research provided conclusions and at the same time, became an inspiration for defining research issues such as the ex-post analysis of the information available, drawing conclusions and drawing up directions of development. The retrospective analysis in the scope of the sectoral analysis of ISO 9001 trends, drawing conclusions and drawing up evolution directions is the author’s original contribution.

  20. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  1. Certification of Public Librarians in the United States. A Detailed Summary of Legally Mandated and Voluntary Certification Plans for Public Librarians Based on Information Supplied by the Various Certificating State Agencies or Other Appropriate Sources. 3rd Edition.

    Science.gov (United States)

    Coe, Mary J., Ed.

    This report contains summaries of legally mandated and voluntary certification plans for public librarians in the United States based on information supplied by the various certifying state agencies or other appropriate sources in April 1979. Each plan is identified by the descriptive terms "mandatory" (certification required by law--23 states),…

  2. The public health leadership certificate: a public health and primary care interprofessional training opportunity.

    Science.gov (United States)

    Matson, Christine C; Lake, Jeffrey L; Bradshaw, R Dana; Matson, David O

    2014-03-01

    This article describes a public health leadership certificate curriculum developed by the Commonwealth Public Health Training Center for employees in public health and medical trainees in primary care to share didactic and experiential learning. As part of the program, trainees are involved in improving the health of their communities and thus gain a blended perspective on the effectiveness of interprofessional teams in improving population health. The certificate curriculum includes eight one-credit-hour didactic courses offered through an MPH program and a two-credit-hour, community-based participatory research project conducted by teams of trainees under the mentorship of health district directors. Fiscal sustainability is achieved by sharing didactic courses with MPH degree students, thereby enabling trainees to take advantage of a reduced, continuing education tuition rate. Public health employee and primary care trainees jointly learn knowledge and skills required for community health improvement in interprofessional teams and gain an integrated perspective through opportunities to question assumptions and broaden disciplinary approaches. At the same time, the required community projects have benefited public health in Virginia.

  3. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  4. 75 FR 39036 - Public Housing Assessment System (PHAS): Management Operations Certification

    Science.gov (United States)

    2010-07-07

    ... System (PHAS): Management Operations Certification AGENCY: Office of the Chief Information Officer, HUD... management operations. The information is used to assess the management performance of PHAs. DATES: Comments... following information: Title of Proposal: Public Housing Assessment System (PHAS): Management Operations...

  5. Simple Public Key Infrastructure Protocol Analysis and Design

    National Research Council Canada - National Science Library

    Vidergar, Alexander G

    2005-01-01

    ...). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis...

  6. Vehicle Authentication via Monolithically Certified Public Key and Attributes

    OpenAIRE

    Dolev, Shlomi; Krzywiecki, Łukasz; Panwar, Nisha; Segal, Michael

    2015-01-01

    Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work, we propose a viable solution for coping with Man-in-the-Middle attacks. Conventionally, Public Key Infrastructure (PKI) is utilized for a secure communication with the pre-certified public key. H...

  7. Publication of research projects for certification as medical specialists at a peruvian university, 2007-2010

    OpenAIRE

    Ticse, Ray; Hospital Nacional Cayetano Heredia. Lima, Perú. Facultad de Medicina, Universidad Peruana Cayetano Heredia. Lima, Perú. Médico internista endocrinólogo; magíster en Epidemiología Clínica.; Ygreda, Patricia; Facultad de Medicina, Universidad Peruana Cayetano Heredia. Lima, Perú. Médico cirujano.; Samalvides, Frine; Hospital Nacional Cayetano Heredia. Lima, Perú. Facultad de Medicina, Universidad Peruana Cayetano Heredia. Lima, Perú. Médico infectólogo.

    2014-01-01

    In order to determine the frequency of publication in a scientific journal of the research projects done for medical specialty certification, a search was conducted in Google Scholar, Pubmed, biomedical databases and Peruvian medical society journals. These publications were research projects carried out by medical residents graduated from the Faculty of Medicine at the Universidad Peruana Cayetano Heredia, to obtain the certification of medical specialist. Of 351 medical residents graduated ...

  8. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  9. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  10. 78 FR 66670 - Housing Counseling Program: New Certification Requirements; Extension of Public Comment Period

    Science.gov (United States)

    2013-11-06

    ... Counseling Program: New Certification Requirements; Extension of Public Comment Period AGENCY: Office of the... inviting public comment on proposed changes to the Housing Counseling Program regulations for the purpose... housing counseling statute. This document announces that HUD is extending the public comment period, for...

  11. 75 FR 27855 - Certifications Pursuant to Section 609 of Public Law 101-162

    Science.gov (United States)

    2010-05-18

    ... DEPARTMENT OF STATE [Public Notice 7013] Certifications Pursuant to Section 609 of Public Law 101... Law 101-162 (``Section 609''), that 13 nations have adopted programs to reduce the incidental capture... 609 of Public Law 101-162 prohibits imports of certain categories of shrimp unless the President...

  12. Certificates.

    Science.gov (United States)

    Fry, F

    1994-06-01

    The Concise Oxford English Dictionary defines 'dilemma' as "an argument forcing one to choose one of two alternatives both unfavourable to him (or her)". This is situation that frequently confronts the general practitioner. In this article a personal solution to the problem of 'certificates' is presented. Not every one will necessarily agree with the solutions presented and some may find them unacceptable, or have better solutions. The author warmly welcomes correspondence, either personal, or in the form of Letters to the Editor, as this is a subject in which consensus decisions are important.

  13. 76 FR 69320 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-08

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... certificate of public convenience and necessity for Route 568 to engage in scheduled foreign air...

  14. 75 FR 57544 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2010-09-21

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... the transfer from ASTAR to AUSA of ASTAR's certificates of public convenience and necessity...

  15. 76 FR 20435 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-04-12

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (formerly... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  16. 77 FR 49478 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-08-16

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... Application of Rhoades Aviation, Inc. d/b/a Transair requesting a certificate of public convenience and...

  17. 78 FR 45011 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2013-07-25

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... reissuance of Pinnacle's certificates of public convenience and necessity in the name of ``ENDEAVOR AIR, INC...

  18. 77 FR 54945 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-09-06

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... disclaim jurisdiction over the transfer of its certificates of public convenience and necessity to...

  19. 75 FR 29601 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-05-26

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (formerly... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  20. 76 FR 68256 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-03

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... Corporation (``JetBlue'') requesting a certificate of public convenience and necessity and requests the...

  1. 76 FR 10085 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-02-23

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... its certificate of public convenience and necessity in that name. Renee V. Wright, Program Manager...

  2. 49 CFR 30.13 - Restrictions on Federal public works projects: Certification.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Restrictions on Federal public works projects... WORKS CONTRACTS TO SUPPLIERS OF GOODS AND SERVICES OF COUNTRIES THAT DENY PROCUREMENT MARKET ACCESS TO U.S. CONTRACTORS § 30.13 Restrictions on Federal public works projects: Certification. As prescribed...

  3. Unbelievable security : Matching AES using public key systems

    NARCIS (Netherlands)

    Lenstra, A.K.; Boyd, C.

    2001-01-01

    The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite

  4. Public-Key Encryption with Non-interactive Opening

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hofheinz, Dennis; Kiltz, Eike

    2008-01-01

    We formally define the primitive of public-key encryption with non-interactive opening (PKENO), where the receiver of a ciphertext C can, convincingly and without interaction, reveal what the result was of decrypting C, without compromising the scheme’s security. This has numerous applications...

  5. Public-key Encryption with Registered Keyword Search

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is

  6. An application of different dioids in public key cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com [Technical University of Sofia, Faculty of Applied Mathematics and Informatics, 8 Kliment Ohridski St., Sofia 1000 (Bulgaria)

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme is presented.

  7. An application of different dioids in public key cryptography

    International Nuclear Information System (INIS)

    Durcheva, Mariana I.

    2014-01-01

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme is presented

  8. Efficient quantum secure communication with a publicly known key

    International Nuclear Information System (INIS)

    Li Chunyan; Li Xihan; Deng Fuguo; Zhou Hongyu

    2008-01-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently. (general)

  9. Lower and Upper Bounds for Deniable Public-Key Encryption

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian

    2011-01-01

    the parties to change their internal state to make it look like a given ciphertext decrypts to a message different from what it really decrypts to. Deniable encryption was in this way introduced to allow to deny a message exchange and hence combat coercion. Depending on which parties can be coerced...... that it is impossible to construct a non-interactive bi-deniable public-key encryption scheme with better than polynomial security. Specifically, we give an explicit bound relating the security of the scheme to how efficient the scheme is in terms of key size. Our impossibility result establishes a lower bound...

  10. Key-phrase based classification of public health web pages.

    Science.gov (United States)

    Dolamic, Ljiljana; Boyer, Célia

    2013-01-01

    This paper describes and evaluates the public health web pages classification model based on key phrase extraction and matching. Easily extendible both in terms of new classes as well as the new language this method proves to be a good solution for text classification faced with the total lack of training data. To evaluate the proposed solution we have used a small collection of public health related web pages created by a double blind manual classification. Our experiments have shown that by choosing the adequate threshold value the desired value for either precision or recall can be achieved.

  11. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  12. Practical Implementation of Various Public Key Infrastructure Models

    Directory of Open Access Journals (Sweden)

    Dmitriy Anatolievich Melnikov

    2016-03-01

    Full Text Available The paper proposes a short comparative analysis of the contemporary models of public key infrastructure (PKI and the issues of the PKI models real implementation. The Russian model of PKI is presented. Differences between the North American and West Europe models of PKI and Russian model of PKI are described. The problems of creation and main directions of further development and improvement of the Russian PKI and its integration into the global trust environment are defined.

  13. Improved security proofs and constructions for public-key cryptography

    OpenAIRE

    Pan, Jiaxin (M. Sc.)

    2016-01-01

    Diese Arbeit verbessert die Sicherheitsanalyse und Konstruktierbarkeit von Public-Key-Kryptographie: Der erste Teil der Arbeit schlägt einen vereinfachten Sicherheitsbeweis für digitale Signaturverfahren von kanonischen Identifikationsschemata über die klassischen Fiat-Shamir-Transformation im Random Oracle Modell vor. Der zweite Teil der Arbeit schlägt eine neue Variante der Message Authentication Codes (MACs) vor, die sogenannten affinen MACs. Außerdem wird eine generische Transform...

  14. Quality certification as a key success factor in international marketing of food products

    DEFF Research Database (Denmark)

    Jørgensen, Niels; Marcussen, Carl Henrik

    1996-01-01

    delivery service and a stable quality have a high priority, which is indeed closely connected to the quality management system. The ISO 9000 certification in itself is, however, not generally considered as that important but there are differences between the three countries. I Germany an ISO 9000......Executive summary 1. During recent years Danish producers of processed pork have experienced an increasing competition in the Western European markets. In this connection it has been maintained that a better quality and especially an ISO 9000 certification of the quality management systems...... retail chains, catering firms and food processing companies have been interviewed about their criteria for choosing suppliers and what part the quality management systems of the suppliers and perhaps an ISO certification would play in this connection. 4. It appears from the investigation that in general...

  15. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-09-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  16. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  17. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  18. 77 FR 27833 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  19. 76 FR 10084 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  20. 76 FR 72025 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-21

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  1. 77 FR 37732 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-06-22

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  2. 75 FR 39324 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-07-08

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary: Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  3. 77 FR 47691 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-08-09

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  4. 77 FR 59243 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-09-26

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  5. 76 FR 33400 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-08

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  6. 77 FR 67731 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-11-13

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  7. 76 FR 42762 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-07-19

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  8. 76 FR 13444 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-03-11

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  9. 77 FR 13682 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-03-07

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  10. 76 FR 70210 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-10

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  11. 76 FR 20434 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-04-12

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under subpart B (formerly subpart Q) of...

  12. 78 FR 56984 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2013-09-16

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  13. 78 FR 17389 - Texas Eastern Transmission, LP; Notice of Application for Certificate of Public Convenience and...

    Science.gov (United States)

    2013-03-21

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket Nos. CP13-84-000; PF12-19-000] Texas Eastern Transmission, LP; Notice of Application for Certificate of Public Convenience and Necessity and Authorization for Abandonment Take notice that on February 27, 2013, Texas Eastern...

  14. 76 FR 68257 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-03

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  15. 77 FR 39793 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-07-05

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  16. 77 FR 70208 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-11-23

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  17. 76 FR 35939 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-20

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  18. 76 FR 51458 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under subpart B (formerly subpart Q) of...

  19. 76 FR 27167 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-05-10

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  20. 76 FR 35938 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-20

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  1. 75 FR 60491 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2010-09-30

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  2. 77 FR 31421 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-05-25

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  3. 77 FR 46146 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-08-02

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  4. 77 FR 27832 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of...

  5. Error-correcting pairs for a public-key cryptosystem

    International Nuclear Information System (INIS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-01-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t -bounded decoding algorithms which is achieved in the case the code has a t -error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t -ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t -error correcting pair. (paper)

  6. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  7. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Science.gov (United States)

    2010-04-19

    ... GENERAL SERVICES ADMINISTRATION [Wildlife Order 187; 4-D-FL-1218] Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property Pursuant to section 2 of Public Law 537, 80th Congress, approved May 19, 1948 (16 U.S.C. 667c), notice is hereby given that: 1. The General...

  8. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  9. A Review of RSA and Public-Key Cryptosystems | Rabah | Botswana ...

    African Journals Online (AJOL)

    ... study and analyze the RSA cryptosystems – a public-key cryptographic algorithm - a system that uses two sets of keys; one for encryption and the other for decryption. Key Words: Public-key cryptography, DH, RSA, Internet Security and attacks, Digital Signature, Message digest, Authentication, Secure Socket Layer (SSL)

  10. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  11. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  12. Argumentation Key to Communicating Climate Change to the Public

    Science.gov (United States)

    Bleicher, R. E.; Lambert, J. L.

    2012-12-01

    Argumentation plays an important role in how we communicate climate change science to the public and is a key component integrated throughout the Next Generation Science Standards. A scientific argument can be described as a disagreement between explanations with data being used to justify each position. Argumentation is social process where two or more individuals construct and critique arguments (Kuhn & Udell, 2003; Nussbaum, 1997). Sampson, Grooms, and Walker's (2011) developed a framework for understanding the components of a scientific argument. The three components start with a claim (a conjecture, conclusion, explanation, or an answer to a research question). This claim must fit the evidence (observations that show trends over time, relationships between variables or difference between groups). The evidence must be justified with reasoning (explains how the evidence supports the explanation and whey it should count as support). In a scientific argument, or debate, the controversy focuses on how data were collected, what data can or should be included, and what inferences can be made based on a set of evidence. Toulmin's model (1969) also includes rebutting or presenting an alternative explanation supported by counter evidence and reasoning of why the alternative is not the appropriate explanation for the question of the problem. The process of scientific argumentation should involve the construction and critique of scientific arguments, one that involves the consideration of alternative hypotheses (Lawson, 2003). Scientific literacy depends as much on the ability to refute and recognize poor scientific arguments as much as it does on the ability to present an effective argument based on good scientific data (Osborne, 2010). Argument is, therefore, a core feature of science. When students learn to construct a sound scientific argument, they demonstrate critical thinking and a mastery of the science being taught. To present a convincing argument in support of

  13. Public engagement with CCS: barriers, key issues and ways forward

    Science.gov (United States)

    Xenias, Dimitrios

    2017-04-01

    Although Carbon Capture and Storage (CCS) is recognised as a crucial transition technology to a low-carbon world, it has not been popular with the public or some governments (e.g. the UK). Also, despite its use in industrial processes for decades, CCS remains and unfamiliar technology for most publics. It is therefore important to foster top-down and bottom-up acceptance of large scale CCS. In an exploratory round of interviews we canvassed the views of British, Dutch, German and Norwegian experts (N=13) with previous experience in public engagement with CCS. They identified barriers and drivers for CCS deployment and public engagement with CCS. Thematic analysis revealed a small number of recurrent issues, including: (a) lack of political leadership on CCS; (b) lack of public knowledge on relevant technologies and (c) difficulty communicating why CCS is necessary. Emphasis on these barriers varied with the level of experts' engagement with the public. More interestingly, although most experts agreed on the importance of public engagement, their views divided between 'why' engage and 'how' best to do this. In a subsequent expert survey (N=99) interview findings were reinforced: public support was seen as important for CCS roll-out (72%), though lower than political support and funding. The survey also showed that local public was expected to experience most risks, while global public will experience most benefits; whereas local business is seen to benefit more than global. Experts were overwhelmingly positive about CCS - risks outweigh benefits, and are confident that CCS will play a major role in climate change mitigation (along with reduced energy demand and renewables). These findings will be expanded on and triangulated in a follow-up public survey which will benefit those involved with public engagement with CCS.

  14. Public Acceptance, a Key Issue of Nuclear Energy

    International Nuclear Information System (INIS)

    Stritar, A.

    1996-01-01

    A brief history of public acceptance of nuclear energy in Slovenia is given. While in former Yugoslavia a problem of public acceptance virtually did not exist because of undemocratic social system, it grew larger and larger with the process of democratization in late eighties. The first democratic government in Slovenia had to abandon its original idea for an early closure of the nuclear power plant Krsko. In 1995 and 1996 there were two attempts to organize the national referendum about the future of the plant. The lessons learned from the public debates in recent years could help other countries entering the nuclear program to prepare and implement efficient public information strategy. (author)

  15. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  16. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  17. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  18. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  19. Teaching Public Administration: Key Themes 1996-2016

    Science.gov (United States)

    Fenwick, John

    2018-01-01

    In this article, the aim is to explore some of the key themes to emerge in the journal during the past two decades. Each selected theme will be reviewed in the light of issues raised in particular papers. The aim of this approach is, first, to facilitate reflection upon the contribution of the journal as its subject matter has moved from a concern…

  20. Key elements for a measurement framework for public sector innovation

    DEFF Research Database (Denmark)

    Bloch, Carter Walter; Lopez-Bassols, Vladimir

    2013-01-01

    This document provides an overview of recent NESTI work on developing guidelines for measuring public sector innovation (PSI). The paper includes an update on various ongoing activities which will contribute to the development of a measurement framework for PSI and outlines a number of areas which...

  1. Information Secrecy And Public-Key Cryptography | Mekuria | Zede ...

    African Journals Online (AJOL)

    The subject and need of information secrecy with emphasis to the choice of fully using an already established public channel is to be discussed. Related histories and current achievements made in the area of information hiding, notable persons who changed the course of its progress from ancient times to this last ...

  2. Informing the educators: one of the keys to public acceptance

    International Nuclear Information System (INIS)

    Mattox, G.C.; Reynolds, A.B.; Brenizer, J.S.

    1986-01-01

    One of the most difficult barriers to overcome in the task of gaining greater public acceptance of nuclear power is the widespread lack of correct information about the true risks and benefits of nuclear energy. The news media are the most prevalent sources of information for the public but they are highly constrained by the limits of space, time, and reader/viewer interest span in being able to cover this complex subject with any degree of completeness, much less with any degree of accuracy. Another source of information for the general public is the educational system, and while it also has its limitations, they are somewhat different from those faced by the media, and the educational system is generally considered to be a more credible information source than the media. This paper report on three programs undertaken in 1985 and 1986 by the Virginia Section of the American Nuclear Society (ANS) in conjunction with the University of Virginia (UVA), the Virginia State Department of Education, and various nuclear industry participants. Each program had its unique features, successes, an failures. All-in-all, these programs have been reported as being quite successful in helping to reach the public through informing the educators

  3. Design and implementation of PKI-based certification authority

    Science.gov (United States)

    Zheng, Ying; Bai, Qinghai; Zhao, Linna; Chun, Hua; Chen, Jing

    2015-12-01

    PKI achieves the management of public key by certificates. It combines the user's public key and his or her identification formation through a trusted third-party organization CA, in order to authenticate the user's identity on the Internet, thus ensuring the authenticity, integrity, confidentiality, and non- repudiation of the information transmitted on the Internet. CA is the most critical agency in the PKI system, mainly responsible for issuing and managing certificates. On the basis of the actual needs of an enterprise, in this paper the author designs and develops a small-sized PKI-based Certification Authority equipped with the functions of root CA initialization, certificate application, certificate issuance, certificate revocation, and the generation of certificate revocation list. The author also points out the problems that need to be mentioned in the design and development.

  4. Key Performance Indicators of Public Universities Based on Quality Assessment Criteria in Thailand

    Science.gov (United States)

    Sukboonyasatit, Kritsana; Thanapaisarn, Chaiwit; Manmar, Lampang

    2011-01-01

    The research objective was to develop public universities' key performance indicators. Qualitative research and interviews were employed with each public university's senior executive and quality assessors. The sample group was selected by the office of the public sector development commission and Thailand's public universities can be separated…

  5. 7 CFR Appendix D to Subpart B of... - Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to...

    Science.gov (United States)

    2010-01-01

    ...—Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to 7 CFR 1744.30... 7 Agriculture 11 2010-01-01 2010-01-01 false Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to 7 CFR 1744.30 D Appendix D to Subpart B of Part 1744...

  6. 7 CFR Appendix B to Subpart B of... - Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to...

    Science.gov (United States)

    2010-01-01

    ...—Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to 7 CFR 1744.30... 7 Agriculture 11 2010-01-01 2010-01-01 false Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to 7 CFR 1744.30(c) B Appendix B to Subpart B of Part 1744...

  7. Sustainability as the key to prioritize investments in public infrastructures

    International Nuclear Information System (INIS)

    Pardo-Bosch, Francesc; Aguado, Antonio

    2016-01-01

    Infrastructure construction, one of the biggest driving forces of the economy nowadays, requires a huge analysis and clear transparency to decide what projects have to be executed with the few resources available. With the aim to provide the public administrations a tool with which they can make their decisions easier, the Sustainability Index of Infrastructure Projects (SIIP) has been defined, with a multi-criteria decision system called MIVES, in order to classify non-uniform investments. This index evaluates, in two inseparable stages, the contribution to the sustainable development of each infrastructure project, analyzing its social, environmental and economic impact. The result of the SIIP allows to decide the order with which projects will be prioritized. The case of study developed proves the adaptability and utility of this tool for the ordinary budget management.

  8. Sustainability as the key to prioritize investments in public infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Pardo-Bosch, Francesc, E-mail: francesc.pardo@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain); Political Science Department, University of California - Berkeley (United States); Aguado, Antonio, E-mail: antonio.aguado@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain)

    2016-09-15

    Infrastructure construction, one of the biggest driving forces of the economy nowadays, requires a huge analysis and clear transparency to decide what projects have to be executed with the few resources available. With the aim to provide the public administrations a tool with which they can make their decisions easier, the Sustainability Index of Infrastructure Projects (SIIP) has been defined, with a multi-criteria decision system called MIVES, in order to classify non-uniform investments. This index evaluates, in two inseparable stages, the contribution to the sustainable development of each infrastructure project, analyzing its social, environmental and economic impact. The result of the SIIP allows to decide the order with which projects will be prioritized. The case of study developed proves the adaptability and utility of this tool for the ordinary budget management.

  9. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a new category of public key encryption schemes which supports equality test between ciphertexts. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform equality test between their

  10. Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  11. A public health certificate for all medical students: concepts and strategies.

    Science.gov (United States)

    Dow Velarde, L; Kaufman, A; Wiese, W; Wallerstein, N

    2007-05-01

    The goal of integrating a Public Health Certificate (PHC) into the medical school curriculum is meant to provide basic public health skills and knowledge to all future physicians, ultimately broadening the health workforce's capacity to address community health needs. The faculty at the University of New Mexico's (UNM) School of Medicine (SOM), in collaboration with multiple community stakeholders, created a PHC equivalent to 15 graduate level units. The PHC will be required of all medical students matriculating in 2010. The authors, community leaders, university administrators, faculty, staff, and students met to address the many tasks required of such broad curricular and policy change. The tasks required piloting innovations in curriculum design and implementation, working within the bureaucratic structure, fostering collaboration, nurturing leadership skills, marketing the new ideas, and designing credible evaluation strategies. We have engaged the stakeholders; surveyed our resources; produced and implemented ongoing evaluation; examined implementation strategies; developed, implemented and pilot tested the PHC courses; and engaged faculty from the Department of Family & Community Medicine in faculty development seminars. Introduction of a PHC for all students is feasible with planning tools such as the Logic Model.

  12. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud.

    Science.gov (United States)

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  13. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

    Directory of Open Access Journals (Sweden)

    Shyamala Devi Munisamy

    2015-01-01

    Full Text Available Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider’s premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  14. Expectations of residents and tourists of agriculture-related certification systems: analysis of public perceptions

    Directory of Open Access Journals (Sweden)

    Yuta Uchiyama

    2017-06-01

    Conclusion: It is necessary to evaluate the GIAHS's contribution to tourism and industry when municipalities and international organizations manage the GIAHS sites. Considering the gaps between residents and tourists and taking measures to resolve them can contribute to managing certificated areas by collaboration of stakeholders. Regarding products aimed at branding, consumers need to be informed about the GIAHS as a regional certification in addition to product certification to share the historical and environmental characteristics of agricultural products.

  15. 2008 Key Student Outcomes Indicators for BC Diploma, Associate Degree, and Certificate Programs: Survey Results by Institution

    Science.gov (United States)

    Ministry of Advanced Education and Labour Market Development, 2009

    2009-01-01

    The BC Diploma, Associate Degree, and Certificate Student Outcomes (DACSO) Survey (formerly the BC College and Institute Student Outcomes Survey) collects and disseminates information about former students' post-secondary experiences and their subsequent labour market and further education experiences. The survey is administered annually to former…

  16. Electronic signature for medical documents--integration and evaluation of a public key infrastructure in hospitals.

    Science.gov (United States)

    Brandner, R; van der Haak, M; Hartmann, M; Haux, R; Schmücker, P

    2002-01-01

    Our objectives were to determine the user-oriented and legal requirements for a Public Key Infrastructure (PKI) for electronic signatures for medical documents, and to translate these requirements into a general model for a signature system. A prototype of this model was then implemented and evaluated in clinical routine use. Analyses of documents, processes, interviews, observations, and of the available literature supplied the foundations for the development of the signature system model. Eight participants of the Department of Dermatology of the Heidelberg University Medical Center evaluated the implemented prototype from December 2000 to January 2001, during the course of an intervention study. By means of questionnaires, interviews, observations and database analyses, the usefulness and user acceptance of the electronic signature and its integration into electronic discharge letters were established. Since the major part of medical documents generated in a hospital are signature-relevant, they will require electronic signatures in the future. A PKI must meet the multitude of responsibilities and security needs required in a hospital. Also, the signature functionality must be integrated directly into the workflow surrounding document creation. A developed signature model, fulfilling user-oriented and legal requirements, was implemented using hard and software components that conform to the German Signature Law. It was integrated into the existing hospital information system of the Heidelberg University Medical Center. At the end of the intervention study, the average acceptance scores achieved were mean = 3.90; SD = 0.42 on a scale of 1 (very negative attitude) to 5 (very positive attitude) for the electronic signature procedure. Acceptance of the integration into computer-supported discharge letter writing reached mean = 3.91; SD = 0.47. On average, the discharge letters were completed 7.18 days earlier. The electronic signature is indispensable for the

  17. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  18. Measuring Public Leadership: Developing Scales for Four Key Public Leadership Roles

    NARCIS (Netherlands)

    Tummers, Lars; Knies, Eva|info:eu-repo/dai/nl/313875421

    2016-01-01

    This article on public leadership contributes to the literature by (1) focusing on the ‘public’ aspect of leadership and (2) developing quantitative scales for measuring four public leadership roles. These roles all refer to the extent to which public leaders actively support their employees in

  19. Security of public key encryption technique based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Wang Kai; Pei Wenjiang; Zou Liuhua; Cheung Yiuming; He Zhenya

    2006-01-01

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP) m , where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications

  20. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  1. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    Science.gov (United States)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  2. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    Science.gov (United States)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  3. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  4. Passing the English as a second language (ESL) supplemental texes exam keys to certification and language proficient learners

    CERN Document Server

    Wilmore, Elaine L

    2014-01-01

    Master the TExES with down-to-earth test prep strategies ESL certification is attainable if one understands the domains and competencies represented in the test and masters test prep skills. Dr. Elaine Wilmore, known for her popular TExES preparation seminars, synthesizes her knowledge and experiences and gives readers a practical approach to passing the ESL Supplemental Exam. Written in a conversational tone, the book uses real examples to help readers connect theory with actual practice and offers: Thorough discussions of relevant concepts related to domains and competencies Tables and graph

  5. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  6. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    detection 49 [6,7] , authentication, access control, key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...83 84 85 aims to achieve: (a) resiliency against misbehaving nodes 86 in the network to maintain minimum security vulnerabil- 87 ity; (b...neighbor will decreas the misbehaving node’s direct competence trust. Fur thermore, this neighbor when acting as a recommended public key management in

  7. Cryptanalysis of the public key encryption based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Zhang Linhua

    2008-01-01

    Recently, Ranjan proposed a novel public key encryption technique based on multiple chaotic systems [Phys Lett 2005;95]. Unfortunately, Wang soon gave a successful attack on its special case based on Parseval's theorem [Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press]. In this letter, we give an improved example which can avoid the attack and point out that Wang cannot find the essential drawback of the technique. However, further experimental result shows Ruanjan's encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated

  8. Image encryption based on nonlinear encryption system and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Chi, Yingying

    2015-03-01

    Recently, optical asymmetric cryptosystem (OACS) has became the focus of discussion and concern of researchers. Some researchers pointed out that OACS was not tenable because of misunderstanding the concept of asymmetric cryptosystem (ACS). We propose an improved cryptosystem using RSA public-key algorithm based on existing OACS and the new system conforms to the basic agreement of public key cryptosystem. At the beginning of the encryption process, the system will produce an independent phase matrix and allocate the input image, which also conforms to one-time pad cryptosystem. The simulation results show that the validity of the improved cryptosystem and the high robustness against attack scheme using phase retrieval technique.

  9. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  10. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2016-01-01

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  11. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen

    2016-04-06

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  12. Toekomstvaste fysieke toegangsystemen : Public Key Infrastructure als oplossing voor fysiek toegangbeheer

    NARCIS (Netherlands)

    Kleinhuis, G.; Olk, J.G.E.

    2011-01-01

    Voor fysieke toegangssystemen wordt veelal gebruik gemaakt van toegangspassen met een contactlose chip. Soms zijn deze passen ook nog voorzien van een PKI (Public Key Infrastructure) contactchip voor toegang tot ICT en/of het plaatsen van een digitale handtekening. Ook voor fysieke toegang bied PKI

  13. Gaussian elimination in split unitary groups with an application to public-key cryptography

    Directory of Open Access Journals (Sweden)

    Ayan Mahalanobis

    2017-07-01

    Full Text Available Gaussian elimination is used in special linear groups to solve the word problem. In this paper, we extend Gaussian elimination to split unitary groups. These algorithms have an application in building a public-key cryptosystem, we demonstrate that.

  14. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  15. Public perceptions of key performance indicators of healthcare in Alberta, Canada.

    Science.gov (United States)

    Northcott, Herbert C; Harvey, Michael D

    2012-06-01

    To examine the relationship between public perceptions of key performance indicators assessing various aspects of the health-care system. Cross-sequential survey research. Annual telephone surveys of random samples of adult Albertans selected by random digit dialing and stratified according to age, sex and region (n = 4000 for each survey year). The survey questionnaires included single-item measures of key performance indicators to assess public perceptions of availability, accessibility, quality, outcome and satisfaction with healthcare. Cronbach's α and factor analysis were used to assess the relationship between key performance indicators focusing on the health-care system overall and on a recent interaction with the health-care system. The province of Alberta, Canada during the years 1996-2004. Four thousand adults randomly selected each survey year. Survey questions measuring public perceptions of healthcare availability, accessibility, quality, outcome and satisfaction with healthcare. Factor analysis identified two principal components with key performance indicators focusing on the health system overall loading most strongly on the first component and key performance indicators focusing on the most recent health-care encounter loading most strongly on the second component. Assessments of the quality of care most recently received, accessibility of that care and perceived outcome of care tended to be higher than the more general assessments of overall health system quality and accessibility. Assessments of specific health-care encounters and more general assessments of the overall health-care system, while related, nevertheless comprise separate dimensions for health-care evaluation.

  16. An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

    Directory of Open Access Journals (Sweden)

    Sumalatha GUNNALA

    2018-04-01

    Full Text Available The Asymmetric Key Cryptosystem (AKC or Public Key Encryption (PKE is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Based Encryption (ABE is an expansion of asymmetric key encryption scheme that allows users to encrypt and decrypt the plaintext messages using the key based on the user’s credentials, called attributes, like social security number, PAN (Permanent Account Number, email ids or Aadhar number etc. Most of the existing ABE schemes rely on the multiple attributes from which the access control policies are derived. These policies define the users’ private keys, required for the decryption process and access to the confidential information. In this paper, we proposed a new attribute based asymmetric cryptosystem that uses the features of both the schemes: PKE and ABE. Here, we used a value of an attribute, personal to the user, for the encryption and the decryption process. This scheme assures that the receiver will only be able to access the secret data if recipient is shared with the valid attribute value. The asymmetric nature is this scheme is based on the concept of p-sylow sub-group assumption. In addition, the randomization factor is used in the encipherment process to strengthen the cipher further. The development of this cryptosystem is an embodiment where the merits of randomized asymmetric encryption technique and the attribute based encryption are integrated to achieve the authentication on top of confidentiality to secure the information transmission over the public networks.

  17. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  18. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  19. Shor-Preskill-type security proof for quantum key distribution without public announcement of bases

    International Nuclear Information System (INIS)

    Hwang, Won-Young; Wang Xiangbin; Matsumoto, Keiji; Kim, Jaewan; Lee, Hai-Woong

    2003-01-01

    We give a Shor-Preskill-type security proof to quantum key distribution without public announcement of bases [W.Y. Hwang et al., Phys. Lett. A 244, 489 (1998)]. First, we modify the Lo-Chau protocol once more so that it finally reduces to the quantum key distribution without public announcement of bases. Then we show how we can estimate the error rate in the code bits based on that in the checked bits in the proposed protocol, which is the central point of the proof. We discuss the problem of imperfect sources and that of large deviation in the error rate distributions. We discuss when the bases sequence must be discarded

  20. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    Science.gov (United States)

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  1. Understanding price elasticities to inform public health research and intervention studies: key issues.

    Science.gov (United States)

    Nghiem, Nhung; Wilson, Nick; Genç, Murat; Blakely, Tony

    2013-11-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies.

  2. Blockchain-based Public Key Infrastructure for Inter-Domain Secure Routing

    OpenAIRE

    de la Rocha Gómez-Arevalillo , Alfonso; Papadimitratos , Panos

    2017-01-01

    International audience; A gamut of secure inter-domain routing protocols has been proposed in the literature. They use traditional PGP-like and centralized Public Key Infrastructures for trust management. In this paper, we propose our alternative approach for managing security associations, Secure Blockchain Trust Management (SBTM), a trust management system that instantiates a blockchain-based PKI for the operation of securerouting protocols. A main motivation for SBTM is to facilitate gradu...

  3. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-06-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  4. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  5. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  6. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017.

    Science.gov (United States)

    Watson, Crystal R; Watson, Matthew; Sell, Tara Kirk

    2017-09-01

    To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained.

  7. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  8. Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

    Directory of Open Access Journals (Sweden)

    Shuai Han

    2017-01-01

    Full Text Available KDM[F]-CCA security of public-key encryption (PKE ensures the privacy of key-dependent messages f(sk which are closely related to the secret key sk, where f∈F, even if the adversary is allowed to make decryption queries. In this paper, we study the design of KDM-CCA secure PKE. To this end, we develop a new primitive named Auxiliary-Input Authenticated Encryption (AIAE. For AIAE, we introduce two related-key attack (RKA security notions, including IND-RKA and weak-INT-RKA. We present a generic construction of AIAE from tag-based hash proof system (HPS and one-time secure authenticated encryption (AE and give an instantiation of AIAE under the Decisional Diffie-Hellman (DDH assumption. Using AIAE as an essential building block, we give two constructions of efficient KDM-CCA secure PKE based on the DDH and the Decisional Composite Residuosity (DCR assumptions. Specifically, (i our first PKE construction is the first one achieving KDM[Faff]-CCA security for the set of affine functions and compactness of ciphertexts simultaneously. (ii Our second PKE construction is the first one achieving KDM[Fpolyd]-CCA security for the set of polynomial functions and almost compactness of ciphertexts simultaneously. Our PKE constructions are very efficient; in particular, they are pairing-free and NIZK-free.

  9. In science communication, why does the idea of the public deficit always return? Exploring key influences.

    Science.gov (United States)

    Suldovsky, Brianne

    2016-05-01

    Despite mounting criticism, the deficit model remains an integral part of science communication research and practice. In this article, I advance three key factors that contribute to the idea of the public deficit in science communication, including the purpose of science communication, how communication processes and outcomes are conceptualized, and how science and scientific knowledge are defined. Affording science absolute epistemic privilege, I argue, is the most compelling factor contributing to the continued use of the deficit model. In addition, I contend that the deficit model plays a necessary, though not sufficient, role in science communication research and practice. Areas for future research are discussed. © The Author(s) 2016.

  10. 7 CFR 1901.507 - Certificates of beneficial ownership issued by the FmHA or its successor agency under Public Law...

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS... Farmers Home Administration or its successor agency under Public Law 103-354. The rate of interest paid on... social security number. (2) The registration of all certificates owned by the same person, organization...

  11. 77 FR 54944 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-09-06

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... public convenience and necessity authorizing it to conduct foreign charter air transportation of persons...

  12. Understanding key influencers' attitudes and beliefs about healthy public policy change for obesity prevention.

    Science.gov (United States)

    Raine, Kim D; Nykiforuk, Candace I J; Vu-Nguyen, Karen; Nieuwendyk, Laura M; VanSpronsen, Eric; Reed, Shandy; Wild, T Cameron

    2014-11-01

    As overweight and obesity is a risk factor for chronic diseases, the development of environmental and healthy public policy interventions across multiple sectors has been identified as a key strategy to address this issue. In 2009, a survey was developed to assess the attitudes and beliefs regarding health promotion principles, and the priority and acceptability of policy actions to prevent obesity and chronic diseases, among key policy influencers in Alberta and Manitoba, Canada. Surveys were mailed to 1,765 key influencers from five settings: provincial government, municipal government, school boards, print media companies, and workplaces with greater than 500 employees. A total of 236 surveys were completed with a response rate of 15.0%. Findings indicate nearly unanimous influencer support for individual-focused policy approaches and high support for some environmental policies. Restrictive environmental and economic policies received weakest support. Obesity was comparable to smoking with respect to perceptions as a societal responsibility versus a personal responsibility, boding well for the potential of environmental policy interventions for obesity prevention. This level of influencer support provides a platform for more evidence to be brokered to policy influencers about the effectiveness of environmental policy approaches to obesity prevention. © 2014 The Obesity Society.

  13. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Directory of Open Access Journals (Sweden)

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  14. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  15. Public/private partners. Key factors in creating a strategic alliance for community health.

    Science.gov (United States)

    Nelson, J C; Rashid, H; Galvin, V G; Essien, J D; Levine, L M

    1999-04-01

    The rapidly evolving American health system creates economic and societal incentives for public and private health organizations to collaborate. Despite the apparent benefits of collaboration, there is a paucity of information available to help local agencies develop partnerships. This study, itself a collaboration between a school of public health (SPH) and a Georgia health district, was undertaken to identify critical factors necessary to successfully initiate and sustain a public/private community health collaboration. Professional staff at the SPH conducted 26 standardized interviews involving participants from Cobb and Douglas counties Boards of Health; Promina Northwest (now known as Wellstar), a not-for-profit health system; and community stakeholders. Content analysis of each interview question was performed and comparisons were made both within each group and across groups. Trends were identified in the following key areas: vision of health care for Cobb and Douglas counties, forces driving collaboration, strengths of each organization, critical negotiating issues, and potential community gain resulting from the partnership. A shared vision between potential collaborators facilitates communication regarding strategies to achieve common goals. A previous history of working together in limited capacities allowed the partners to develop trust and respect for one another prior to entering negotiations. These factors, when taken in conjunction with each organization's strong leadership and knowledge of the community, build a strong foundation for a successful partnership.

  16. A novel authentication scheme using self-certified public keys for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-06-01

    Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.

  17. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  18. Funding ATLAS 2012 key indicators for publicly funded research in Germany

    CERN Document Server

    Deutsche Forschungsgemeinschaft (DFG)

    2013-01-01

    The Funding ATLAS is a reporting system (previously referred to as the Funding Ranking) employed by the German Research Foundation (DFG) to provide information in the form of indicators of key developments in publicly funded research in Germany every three years. This English version of the Funding ATLAS 2012 presents selected findings from the more comprehensive German edition. At the core of the report are indicators that provide information on which subject areas have received funding at higher education and other research institutions in the period 2008-2010. This report also includes, as a supplement not found in the German edition, the decisions on the Excellence Initiative, which were taken shortly after the German edition of the Funding ATLAS 2012 was published. The report also addresses the subject of internationality by presenting selected indicators that show how attractive Germany's research institutions are for visiting scientists. In summary, the DFG Funding ATLAS furnishes reliable indicators o...

  19. Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption

    Directory of Open Access Journals (Sweden)

    Dianyan Xiao

    2018-01-01

    Full Text Available In the emerging Internet of Things (IoT, lightweight public key cryptography plays an essential role in security and privacy protection. With the approach of quantum computing era, it is important to design and evaluate lightweight quantum-resistant cryptographic algorithms applicable to IoT. LWE-based cryptography is a widely used and well-studied family of postquantum cryptographic constructions whose hardness is based on worst-case lattice problems. To make LWE friendly to resource-constrained IoT devices, a variant of LWE, named Compact-LWE, was proposed and used to design lightweight cryptographic schemes. In this paper, we study the so-called Compact-LWE problem and clarify that under certain parameter settings it can be solved in polynomial time. As a consequence, our result leads to a practical attack against an instantiated scheme based on Compact-LWE proposed by Liu et al. in 2017.

  20. Healthcare public key infrastructure (HPKI) and non-profit organization (NPO): essentials for healthcare data exchange.

    Science.gov (United States)

    Takeda, Hiroshi; Matsumura, Yasushi; Nakagawa, Katsuhiko; Teratani, Tadamasa; Qiyan, Zhang; Kusuoka, Hideo; Matsuoka, Masami

    2004-01-01

    To share healthcare information and to promote cooperation among healthcare providers and customers (patients) under computerized network environment, a non-profit organization (NPO), named as OCHIS, was established at Osaka, Japan in 2003. Since security and confidentiality issues on the Internet have been major concerns in the OCHIS, the system has been based on healthcare public key infrastructure (HPKI), and found that there remained problems to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority by contracting with the Ministry of Economics and Trading Industries in 2003. This paper describes the experimental design with NPO and the results of the study concerning message security and HPKI. The developed system has been operated practically in Osaka urban area.

  1. 77 FR 21145 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-04-09

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B (formerly Subpart Q) of... convenience and necessity authorizing People Express to engage in interstate scheduled air transportation of...

  2. 76 FR 54524 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-09-01

    ... Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B (Formerly Subpart... Convenience and Necessity and Foreign Air Carrier Permits were filed under subpart B (formerly subpart Q) of... convenience and necessity authorizing Universal to engage in foreign charter air transportation of persons...

  3. Compact FPGA hardware architecture for public key encryption in embedded devices.

    Science.gov (United States)

    Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).

  4. Public Key-Based Need-to-Know Authorization Engine Final Report CRADA No. TSB-1553-98

    Energy Technology Data Exchange (ETDEWEB)

    Mark, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Williams, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-01

    The goals of this project were to develop a public key-based authentication service plug-in based on LLNL's requirements, integrate the public key-based authentication with the Intra Verse authorization service adn the LLNL NTK server by developing a full-featured version of the prototyped Intra Verse need-to-know plug in; and to test the authorization and need-to-know plug-in in a secured extranet prototype among selected national Labs.

  5. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character......Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case...... also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...

  6. Professional Certification

    Science.gov (United States)

    WaterSense recognizes certification programs for irrigation professionals that meet the specification criteria. Certification programs cover three areas: irrigation system design, installation and maintenance, and system auditing.

  7. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  8. Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Kambourakis Georgios

    2004-01-01

    Full Text Available While mobile hosts are evolving into full-IP enabled devices, there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism in mobile communication systems beyond 3G (B3G. Work has already begun on such an “all-IP” end-to-end solution, commonly referred to as 4G systems. Fully fledged integration between heterogeneous networks, such as 2.5G, UMTS, WLAN, Bluetooth, and the Internet, demands fully compatible, time-tested, and reliable mechanisms to depend on. SSL protocol has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future wireless environments. In this paper, we discuss existing problems related to authentication and key agreement (AKA procedures, such as compromised authentication vectors attacks, as they appear in current 2/2.5G/3G mobile communication systems, and propose how SSL, combined with public key infrastructure (PKI elements, can be used to overcome these vulnerabilities. In this B3G environment, we perceive authentication as a service, which has to be performed at the higher protocol layers irrespective of the underlying network technology. Furthermore, we analyze the effectiveness of such a solution, based on measurements of a “prototype” implementation. Performance measurements indicate that SSL-based authentication can be possible in terms of service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.

  9. Stakeholders' perception of key performance indicators (KPIs of public-private partnership (PPP projects

    Directory of Open Access Journals (Sweden)

    Olabode Emmanuel Ogunsanmi

    2013-12-01

    Full Text Available The study investigates key performance indicators (KPIs that could improve performance of public-private partnership (PPP projects in Nigeria. The study objectives include a comparison of stakeholders’ perception on KPIs and to investigate if significant difference exists between stakeholders’ perceptions on most KPIs. A structured questionnaire was used to collect information from various respondents who were recently involved in PPP projects. Random sampling technique was used to select forty-five (45 respondents out of which thirty-one (31 responses were used for the data analysis. The results indicate that top KPIs for performance improvement are levels of design complexity and technological advancement, and return on investment. Stakeholders agree on most of the rankings of the KPIs. The general perception of stakeholders was similar on most KPIs except for a few divergent opinions. The study findings have an implication for policy and decision making such that stakeholders could pay special attention to the KPIs identified, that could improve construction project performance. Finally the study recommends further research to explore KPIs for other procurement options.

  10. The Value of the Academic Award in Initial Teacher Education: Key Stakeholder Perceptions of the Masters Level Postgraduate Certificate in Education in Two English Universities

    Science.gov (United States)

    Thomas, Lorraine

    2018-01-01

    The Postgraduate Certificate in Education (PGCE) has been a successful and popular initial teacher education (ITE) programme since the 1950s, with the masters level PGCE being successfully embedded within universities in England since 2007 and having high levels of student satisfaction. Recent White Papers, policy and reviews have undermined the…

  11. MD5 Considered Harmful Today - Creating A Rogue CA Certificate

    NARCIS (Netherlands)

    P. Stevens; A.K. Lenstra (Arjen); not CWI et al

    2008-01-01

    htmlabstractPresented at the 25th Chaos Communication Congress in Berlin on December 30, 2008. We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario

  12. Wind turbine certification - the committee draft by IEC-TC88-WG9

    Energy Technology Data Exchange (ETDEWEB)

    Hauge Madsen, P [Risoe National Lab., Wind Energy and Atmospheric Physics Dept., Roskilde (Denmark)

    1999-03-01

    In 1995 the Technical Committee TC88 of the International Electrotechnical Commission decided to start a new work item, namely to prepare a standard for the certification procedures for wind turbines with respect to safety, performance, interaction with the public grid, environmental requirements and the documentation requested by the certification bodies. The purpose was to provide a common basis for certification of wind turbines, including a basis for accreditation of certification bodies and mutual recognition of certificates. A working group (WG9) was created to prepare a committee draft. WG9 submitted the result late in 1998 to TC88. This paper presents the committee draft Standard, which defines a certification system for Wind Turbine Generator Systems. Key issues in the evaluation of conformity with these standards and identified needs for other technical criteria and procedures are presented. (au) 10 refs.

  13. Key challenges of offshore wind power: Three essays addressing public acceptance, stakeholder conflict, and wildlife impacts

    Science.gov (United States)

    Bates, Alison Waterbury

    been proposed. The essay examines how the public considers the societal tradeoffs that are made to develop small-scale, in-view demonstration wind projects instead of larger facilities farther offshore. Results indicate that a strong majority of the public supports near-shore demonstration wind projects in both states. Primary reasons for support include benefits to wildlife, cost of electricity, and job creation, while the primary reasons for opposition include wildlife impacts, aesthetics, tourism, and user conflicts. These factors differ between coastal Delaware and greater Atlantic City and highlight the importance of local, community engagement in the early stages of development. The second essay examines the interaction of a new proposed use of the ocean---offshore wind---and a key existing ocean user group---commercial fishers. A key component of offshore wind planning includes consideration of existing uses of the marine environment in order to optimally site wind projects while minimizing conflicts. Commercial fisheries comprise an important stakeholder group, and may be one of the most impacted stakeholders from offshore renewable energy development. Concern of the fishing industry stems from possible interference with productive fishing grounds and access within wind developments resulting in costs from increased effort or reduction in catch. Success of offshore wind development may in part depend on the acceptance of commercial fishers, who are concerned about loss of access to fishing grounds. Using a quantitative, marine spatial planning approach in the siting of offshore wind projects with respect to commercial fishing in the mid-Atlantic, U.S., this essay develops a spatially explicit representation of potential conflicts and compatibilities between these two industries in the mid-Atlantic region of the United States. Areas that are highly valuable to the wind industry are determined through a spatial suitability model using variable cost per unit

  14. Proceedings from the 9th Annual Meeting of International Society for Medical Publication Professionals Roundtable Session: key insights.

    Science.gov (United States)

    Simcoe, Donna; Juneja, Renu; Scott, Gayle Nicholas; Sridharan, Kanaka; Williams-Hughes, Celeste

    2014-03-01

    During the 9th Annual Meeting of the International Society for Medical Publication Professionals (ISMPP, April 29-May 1, 2013 in Baltimore, MD), ∼650 participants attended two of 13 available roundtable sessions. Participants included medical publication professionals from industry, communication agencies, and journals. DISCUSSION TOPICS: Roundtable participants discussed how to best interpret and implement various guidances, such as Good Publication Practices 2 (GPP2), the International Committee of Medical Journal Editors (ICMJE) guidelines, and the Physician Payment Sunshine Act. The impact of and compliance with Corporate Integrity agreements (CIAs) on medical publication planning practices was debated. Roundtable participants also discussed ways of advancing both advocacy for the medical publication professional field and internal and external collaborations. The development of review manuscripts, publications from regions newly emerging in publication planning, medical devices publications, and real-world experience publications were discussed. Participants also considered the benefits and uncertainties of new technologies in medical publications such as multimedia and social media. This is the first ever article to be published following the well-attended ISMPP roundtable sessions. The objective of this manuscript is to summarize key learnings that will aid continued discussions about challenges and opportunities facing medical publication professionals.

  15. A Public-key based Information Management Model for Mobile Agents

    OpenAIRE

    Rodriguez, Diego; Sobrado, Igor

    2000-01-01

    Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only authorized hosts, that is the host that provides information and the server that has sent the mobile a...

  16. Public health ethics: key concepts and issues in policy and practice

    National Research Council Canada - National Science Library

    Dawson, Angus

    2011-01-01

    .... Topics covered include the nature of public health ethics, the concepts of disease and prevention, risk and precaution, health inequalities and justice, screening, vaccination and disease control...

  17. 45 CFR 170.445 - Complete EHR testing and certification.

    Science.gov (United States)

    2010-10-01

    ... Section 170.445 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH INFORMATION TECHNOLOGY HEALTH INFORMATION TECHNOLOGY STANDARDS, IMPLEMENTATION SPECIFICATIONS, AND CERTIFICATION CRITERIA AND CERTIFICATION PROGRAMS FOR HEALTH INFORMATION TECHNOLOGY Temporary Certification Program for HIT § 170.445...

  18. Understanding and involvement: The key to public acceptance of the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Kuntz, B.S.

    1991-01-01

    The Waste Isolation Pilot Plant (WIPP) is a research and development project of the United States Department of Energy (DOE) that is authorized under Public Law 96-164 ''to demonstrate the safe disposal of radioactive wastes resulting from defense programs of the United States.'' The transportation and disposal of transuranic radioactive wastes require an extensive public and media information program. This program must be able to respond to numerous information requests and concerns from state governments, citizens on the transportation routes, political leaders, public interest groups, emergency responders, and national and local media. The WIPP has developed a proactive program which aggressively provides information to these audiences through written and visual products, exhibits, presentations, and tours. As a result, thousands of interested parties have had their questions and concerns addressed, resulting in public understanding and support of the project's mission and its commitment to the safety of the public and the environment

  19. Implementation of DoD Public Key Infrastructure Policy and Procedures

    National Research Council Canada - National Science Library

    2001-01-01

    Introduction. Federal agencies, including DoD, are increasingly using the World Wide Web and other Internet-based applications to provide on-line public access to information and services as well as to improve...

  20. Federal Agency Use of Public Key Technology for Digital Signatures and Authentication

    National Research Council Canada - National Science Library

    Lyons-Burke, Kathy

    2000-01-01

    ... or authentication over open networks such as the Internet. This includes communications with other Federal or non-Federal entities, such as members of the public, private firms, citizen groups, and State and local Governments...

  1. National platform electromobility. Working group 4 - Key issue paper standardization and certification; Nationale Plattform Elektromobilitaet. AG 4 - Eckpunktepapier Normung, Standardisierung und Zertifizierung

    Energy Technology Data Exchange (ETDEWEB)

    Hoelk, Stephanie [Audi AG, Ingolstadt (Germany). I/EM-1

    2010-07-01

    On behalf of the working group 4 ''Standardization and certification ''of the national platform electromobility arranged by the Federal Government, the ''German standardization roadmap electromobility'' was compiled. This gives a survey of the existing structures and definitions of the standardization and designates substantial demands and recommendations for action in order to contribute to the break-through of the electromobility in Europe and in the world. The position paper summarizes the central asking of the standardization roadmap. It identifies necessary basic conditions, appoints concrete recommendations for action and shows the further demand for action for the standardization.

  2. National platform electromobility. Working group 4 - Key issue paper standardization and certification; Nationale Plattform Elektromobilitaet. AG 4 - Eckpunktepapier Normung, Standardisierung und Zertifizierung

    Energy Technology Data Exchange (ETDEWEB)

    Hoelk, Stephanie (comp.) [Audi AG, Ingolstadt (Germany). I/EM-1

    2010-07-01

    On behalf of the working group 4 ''Standardization and certification ''of the national platform electromobility arranged by the Federal Government, the ''German standardization roadmap electromobility'' was compiled. This gives a survey of the existing structures and definitions of the standardization and designates substantial demands and recommendations for action in order to contribute to the break-through of the electromobility in Europe and in the world. The position paper summarizes the central asking of the standardization roadmap. It identifies necessary basic conditions, appoints concrete recommendations for action and shows the further demand for action for the standardization.

  3. Lobbying and Social Participation – Key Features for an Effective Public Administration in Romania

    Directory of Open Access Journals (Sweden)

    Laura Maria IRIMIEȘ

    2017-12-01

    Full Text Available Lobbying is one of the main structural elements of democratic governance and sustainable development and is essential to achieving competitive and effi cient administrative and decisional processes in local governance. Successfully implementing lobbying regulations and techniques is of extreme importance for any public system, where social participation in the decision-making process can strongly contribute to social, political and economic / fi nancial effi - ciency. Over the last 15 years, several legislative initiatives have tried to design a coherent framework for lobby, but they are still unapplied either due to insuffi cient public understanding of the concept, or due to more or less justifi ed uncertainties and fears. The necessity of regulating lobbying in Romania is placed in a context where an important number of anticorruption international and domestic recommendations and state reliability statistics, added to a certain lack of effectiveness in time and public money management, show that the public administration system needs to be reformed. And lobbying is, as the following article shows, a must for any public reform of public administration in Romania. The case of multilingual entrance signs / labels in Cluj-Napoca is an unquestionable and unbeatable example that the simple existence of legal frameworks of lobbying could turn into real time, energy and money savers.

  4. On the Detection of Fake Certificates via Attribute Correlation

    Directory of Open Access Journals (Sweden)

    Xiaojing Gu

    2015-06-01

    Full Text Available Transport Layer Security (TLS and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs for peer authentication. Unfortunately, the most recent research reveals that, if any one of the pre-trusted CAs is compromised, fake certificates can be issued to intercept the corresponding SSL/TLS connections. This security vulnerability leads to catastrophic impacts on SSL/TLS-based HTTPS, which is the underlying protocol to provide secure web services for e-commerce, e-mails, etc. To address this problem, we design an attribute dependency-based detection mechanism, called SSLight. SSLight can expose fake certificates by checking whether the certificates contain some attribute dependencies rarely occurring in legitimate samples. We conduct extensive experiments to evaluate SSLight and successfully confirm that SSLight can detect the vast majority of fake certificates issued from any trusted CAs if they are compromised. As a real-world example, we also implement SSLight as a Firefox add-on and examine its capability of exposing existent fake certificates from DigiNotar and Comodo, both of which have made a giant impact around the world.

  5. A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture

    Directory of Open Access Journals (Sweden)

    Oliver Hanka

    2011-02-01

    Full Text Available In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables a sharing of keys among the mapping servers. Hence, a more trustworthy and fair approach for a Next Generation Internet Architecture as compared to the state of the art approach is fostered. Additionally, we give an evaluation based on IETF AAA recommendations for security-related systems.

  6. Key Motivational Factors in the Retention of Three Generations of Public High School Mathematics Teachers

    Science.gov (United States)

    Pospichal, Wendy

    2011-01-01

    Purpose: The purpose of this study was to describe and compare the similarities and differences between five key motivational factors: (a) new teacher induction, (b) noninduction mentor support in the early years of teaching, (c) salary and benefits, (d) working conditions, and (e) administrative support influential in retention of employment in…

  7. Consumer Preferences for Public and Private Sector Certifications for Beef Products in the United States and the United Kingdom

    OpenAIRE

    Christensen, Bryan J.; Bailey, DeeVon; Hunnicutt, Lynn; Ward, Ruby A.

    2003-01-01

    Focus groups and street surveys are used in the US and the UK to determine consumer perceptions of the ability of different agencies, associations, and groups to certify beef products for quality, food safety, animal welfare, social responsibility, and environmental responsibility. US consumers see the role of the federal government primarily as assuring food safety but desire the private sector to make other types of certifications. UK consumers prefer the private sector to assure food safet...

  8. Collaboration with HEIs: A Key Capacity Building Block for the Uganda Water and Sanitation Public Sector

    Science.gov (United States)

    Kayaga, Sam

    2007-01-01

    The capacity of public service staff in developing countries is crucial for achieving the Millennium Development Goals. Literature from developed countries shows that, working with higher education institutions (HEIs), industries have improved their human resource capacity through continuing professional development. This paper reports on research…

  9. Key issues of public relations of Europe: findings from the European Communication Monitor 2007-2014

    NARCIS (Netherlands)

    Verčič, D.; Verhoeven, P.; Zerfass, A.

    2014-01-01

    European Communication Monitor is the largest longitudinal research project in public relations practice in the world. Data collected annually from 2007 to 2014 show that practitioners perceive five issues as the most important for their work: linking business strategy and communication, coping with

  10. A proactive public information policy: a key element for regulator independence and credibility

    International Nuclear Information System (INIS)

    Kindelan, J.M.

    2001-01-01

    The future of the nuclear industry will depend to a large extent on the perception that the members of the public have of it. However, our mission as regulatory bodies is not to change the pro-or anti- nuclear feelings of the public, but to set in them the confidence that the use currently made of nuclear energy is carried out with the greatest guarantees of safety. We should continue to avoid their feeling of fear without reasons or their perception of uncertainty regarding processes that are duly controlled and supervised. I am convinced that whatever progress we make in increasing transparency will lead to an increase in the public credibility of the organisations that we represent. The reason underlying our need for this credibility, this reputation for autonomy and efficiency, for good performance, is that without it we will not have sufficient authority in the eyes of the regulated sector or other private political and economic interests, and will not, therefore, be in a position to provide a sensation of confidence to the members of the public, whose tranquillity and interests are our obligation. (author)

  11. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    Science.gov (United States)

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT A Market Analysis of Publications, Trade Conferences...AGENCY USE ONLY (Leave blank) 2. REPORT DATE December 2007 3. REPORT TYPE AND DATES COVERED MBA Professional Report 4. TITLE AND SUBTITLE: A Market

  12. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    Science.gov (United States)

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  13. Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm

    Science.gov (United States)

    Meng, X. F.; Peng, X.; Cai, L. Z.; Li, A. M.; Gao, Z.; Wang, Y. R.

    2009-08-01

    A hybrid cryptosystem is proposed, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI), then three pairs of public-private keys are utilized to encode and decode the session keys (geometrical parameters, the second random-phase mask) and interferograms. In the stage of decryption, the ciphered image can be decrypted by wavefront reconstruction, inverse Fresnel diffraction, and real amplitude normalization. This approach can successfully solve the problem of key management and dispatch, resulting in increased security strength. The feasibility of the proposed cryptosystem and its robustness against some types of attack are verified and analyzed by computer simulations.

  14. Free-ranging domestic cats (Felis catus) on public lands: estimating density, activity, and diet in the Florida Keys

    Science.gov (United States)

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; Kays, Roland; O'Connell, Allan F.

    2017-01-01

    Feral and free-ranging domestic cats (Felis catus) can have strong negative effects on small mammals and birds, particularly in island ecosystems. We deployed camera traps to study free-ranging cats in national wildlife refuges and state parks on Big Pine Key and Key Largo in the Florida Keys, USA, and used spatial capture–recapture models to estimate cat abundance, movement, and activities. We also used stable isotope analyses to examine the diet of cats captured on public lands. Top population models separated cats based on differences in movement and detection with three and two latent groups on Big Pine Key and Key Largo, respectively. We hypothesize that these latent groups represent feral, semi-feral, and indoor/outdoor house cats based on the estimated movement parameters of each group. Estimated cat densities and activity varied between the two islands, with relatively high densities (~4 cats/km2) exhibiting crepuscular diel patterns on Big Pine Key and lower densities (~1 cat/km2) exhibiting nocturnal diel patterns on Key Largo. These differences are most likely related to the higher proportion of house cats on Big Pine relative to Key Largo. Carbon and nitrogen isotope ratios from hair samples of free-ranging cats (n = 43) provided estimates of the proportion of wild and anthropogenic foods in cat diets. At the population level, cats on both islands consumed mostly anthropogenic foods (>80% of the diet), but eight individuals were effective predators of wildlife (>50% of the diet). We provide evidence that cat groups within a population move different distances, exhibit different activity patterns, and that individuals consume wildlife at different rates, which all have implications for managing this invasive predator.

  15. Information on the certification of DGZfP-qualified personnel in compliance with the U.S. American publication SNT-TC-1A: 'Level certificates'

    International Nuclear Information System (INIS)

    1986-01-01

    The NDT personnel qualification in compliance with the code of practice of the DGZfP has long been accepted and appreciated in West Germany and in some neighbour countries, and increasingly is recommended in national regulatory publications. In international business, however, it is the U.S. American code of practice SNT-TC-1A that frequently is applied. Although the DGZfP qualification code in formal terms and in principle fulfills the requirements of the SNT-TC-1A, there have been problems on the part of foreign customers who hesitated to accept the DGZfP qualification. The reason most frequently was that the very extensive in-house documentation material required according to the U.S. American code could not or only insufficiently be shown. The code of practice presented here is intended to serve as an aid in laying down the Written Practice, taking into account the DGZfP qualification. The model version presented certainly will not meet all the various requirements of customers, and has to be modified so as to fit individual conditions. (orig./HP) [de

  16. Istanbul Chamber of Certified Public Accountants (ISMMMO The Key Element of Accounting Profession

    Directory of Open Access Journals (Sweden)

    İlkim Mengülerek

    2013-11-01

    Full Text Available The purpose of this article is to indicate the identity struggle of a profession, the endeavors in the journey from Association to Chamber, the steps taken within this context, the achievements in a short period of time, the organizational development of Istanbul Chamber of Certified Public Accountants (ISMMMO between 1990 and 2009, the social function of the Chamber and its contributions to the profession in terms of information and science. The Information Access Center (IAC, established in 2006, serves not only in Istanbul but all over Turkey. IAC collects all books and periodicals in the field of accountancy published in Turkey and tracks certain foreign publications. It also continues to improve its services with the accountancy bibliography (books, articles, daily newsletter, index of "Mali Çözüm (Finance Solutions" magazine, and through activies and studies in the Library Week.

  17. Istanbul Chamber of Certified Public Accountants (ISMMMO) The Key Element of Accounting Profession

    OpenAIRE

    İlkim Mengülerek

    2013-01-01

    The purpose of this article is to indicate the identity struggle of a profession, the endeavors in the journey from Association to Chamber, the steps taken within this context, the achievements in a short period of time, the organizational development of Istanbul Chamber of Certified Public Accountants (ISMMMO) between 1990 and 2009, the social function of the Chamber and its contributions to the profession in terms of information and science. The Information Access Center (IAC), established ...

  18. Trust and its ramification for the DoD public key infrastructure (PKI)

    OpenAIRE

    Pedersen, Carl M.

    2001-01-01

    Approved for public release; distribution is unlimited Researchers have used a wide variety of trust definitions, leading to a plethora of meanings of the concept. But what does the word trust' mean? While most scholars provide their own definition of trust, they are dissatisfied regarding their own lack of consensus about what trust is. Trust is a cognitive function and modeling trust is an attempt to emulate the way a human assesses trust. Models of trust have been developed in an attemp...

  19. Public-private relationships in biobanking: a still underestimated key component of open innovation.

    Science.gov (United States)

    Hofman, Paul; Bréchot, Christian; Zatloukal, Kurt; Dagher, Georges; Clément, Bruno

    2014-01-01

    Access to human bioresources is essential to the understanding of human diseases and to the discovery of new biomarkers aimed at improving the diagnosis, prognosis, and the predictive response of patients to treatments. The use of biospecimens is strictly controlled by ethical assessment, which complies with the laws of the country. These laws regulate the partnerships between the biobanks and industrial actors. However, private-public partnerships (PPP) can be limiting for several reasons, which can hamper the discovery of new biological tests and new active molecules targeted to human diseases. The bottlenecks and roadblocks in establishing these partnerships include: poor organization of the biobank in setting up PPP, evaluation of the cost of human samples, the absence of experience on the public side in setting up contracts with industry, and the fact that public and private partners may not share the same objectives. However, it is critical, in particular for academic biobanks, to establish strong PPP to accelerate translational research for the benefits of patients, and to allow the sustainability of the biobank. The purpose of this review is to discuss the main bottlenecks and roadblocks that can hamper the establishment of PPP based on solid and trusting relationships.

  20. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  1. Key Characteristics of Rehabilitation Quality Improvement Publications: Scoping Review From 2010 to 2016.

    Science.gov (United States)

    Jesus, Tiago S; Papadimitriou, Christina; Pinho, Cátia S; Hoenig, Helen

    2017-09-28

    To characterize the peer-reviewed quality improvement (QI) literature in rehabilitation. Five electronic databases were searched for English-language articles from 2010 to 2016. Keywords for QI and safety management were searched for in combination with keywords for rehabilitation content and journals. Secondary searches (eg, references-list scanning) were also performed. Two reviewers independently selected articles using working definitions of rehabilitation and QI study types; of 1016 references, 112 full texts were assessed for eligibility. Reported study characteristics including study focus, study setting, use of inferential statistics, stated limitations, and use of improvement cycles and theoretical models were extracted by 1 reviewer, with a second reviewer consulted whenever inferences or interpretation were involved. Fifty-nine empirical rehabilitation QI studies were found: 43 reporting on local QI activities, 7 reporting on QI effectiveness research, 8 reporting on QI facilitators or barriers, and 1 systematic review of a specific topic. The number of publications had significant yearly growth between 2010 and 2016 (P=.03). Among the 43 reports on local QI activities, 23.3% did not explicitly report any study limitations; 39.5% did not used inferential statistics to measure the QI impact; 95.3% did not cite/mention the appropriate reporting guidelines; only 18.6% reported multiple QI cycles; just over 50% reported using a model to guide the QI activity; and only 7% reported the use of a particular theoretical model. Study sites and focuses were diverse; however, nearly a third (30.2%) examined early mobilization in intensive care units. The number of empirical, peer-reviewed rehabilitation QI publications is growing but remains a tiny fraction of rehabilitation research publications. Rehabilitation QI studies could be strengthened by greater use of extant models and theory to guide the QI work, consistent reporting of study limitations, and use of

  2. Understanding public sexual harassment : lesson plans and session guidance, key Stages 3 & 4.

    OpenAIRE

    Vera-Gray, F.; Bullough, J.

    2017-01-01

    These lesson plans have been written by Dr. Fiona Vera-Gray at Durham University and Jayne Bullough from Rape Crisis South London (RASASC). They were created through a partnership project with Doll’s Eye Theatre, Purple Drum, RASASC, Dr. Maria Garner, and Dr. Fiona Vera-Gray. Lessons on public sexual harassment were drawn from the work of Dr. Vera-Gray at Durham University. The project was made possible by Durham Law School’s Impact Acceleration Grant from the Economics and ...

  3. Efficient Certification Path Discovery for MANET

    Directory of Open Access Journals (Sweden)

    Kambourakis Georgios

    2010-01-01

    Full Text Available A Mobile Ad Hoc Network (MANET is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitioning, and wireless connections. These properties make traditional wireline security solutions not straightforwardly applicable in MANETs, and of course, constitute the establishment of a Public Key Infrastructure (PKI in such networks a cumbersome task. After surveying related work, we propose a novel public key management scheme using the well-known web-of-trust or trust graph model. Our scheme is based on a binary tree formation of the network's nodes. The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided. We compare our scheme with related work and show that it presents several advantages, especially when a fair balancing between security and performance is desirable. Simulations of the proposed scheme under different scenarios demonstrate that it is effective in terms of tree formation, join and leave occurrences, and certificate chain establishment.

  4. Addressing College Drinking as a Statewide Public Health Problem: Key Findings From the Maryland Collaborative.

    Science.gov (United States)

    Arria, Amelia M; Jernigan, David H

    2018-03-01

    Excessive drinking among college students is a serious and pervasive public health problem. Although much research attention has focused on developing and evaluating evidence-based practices to address college drinking, adoption has been slow. The Maryland Collaborative to Reduce College Drinking and Related Problems was established in 2012 to bring together a network of institutions of higher education in Maryland to collectively address college drinking by using both individual-level and environmental-level evidence-based approaches. In this article, the authors describe the findings of this multilevel, multicomponent statewide initiative. To date, the Maryland Collaborative has succeeded in providing a forum for colleges to share knowledge and experiences, strengthen existing strategies, and engage in a variety of new activities. Administration of an annual student survey has been useful for guiding interventions as well as evaluating progress toward the Maryland Collaborative's goal to measurably reduce high-risk drinking and its radiating consequences on student health, safety, and academic performance and on the communities surrounding college campuses. The experiences of the Maryland Collaborative exemplify real-world implementation of evidence-based approaches to reduce this serious public health problem.

  5. Benchmarking Non Public Hospitals in Puerto Rico: A Key Component in the Financial Performance

    Directory of Open Access Journals (Sweden)

    Arisbel Ramos Martin

    2016-03-01

    Full Text Available Benchmarking is considered a key component of the organizational performance measurement system. This study examines a sample of 53 profit and nonprofit hospitals registered in the American Hospital Directory, through four financial dimensions: liquidity, efficiency, profitability and capital structure. The purpose of the study is to validate whether the financial industry benchmark differs or not from a group of 17 selected financial ratios of profit and nonprofit hospitals, to determine if their financial performance is efficient or inefficient in the Puerto Rico health care system. The findings from the research show that 53% or more of the 17 selected financial ratios, compared globally, suggest being efficient in both types of hospitals. This means that these financial ratios were greater than or equal to the industry benchmark.

  6. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues.

    Science.gov (United States)

    Edwards, Rhiannon Tudor; Charles, Joanna Mary; Lloyd-Williams, Huw

    2013-10-24

    If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Electronic databases and organisation websites were searched using a 22 year time horizon (1990-2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may find it useful to think in this broader

  7. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues

    Science.gov (United States)

    2013-01-01

    Background If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Methods Electronic databases and organisation websites were searched using a 22 year time horizon (1990–2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. Results We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. Conclusions In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may

  8. Publication patterns on occupied Palestine in four key medical journals 1990-2016: a descriptive study.

    Science.gov (United States)

    Gilbert, Mads

    2018-02-21

    The atrocities in Syria have been covered in the four general medical weekly journals in the USA and the UK. Medical journal articles addressing political determinants of public health have rightly described and criticised the international community's failure to enforce humanitarian law while urging global bodies of power to ensure protection of civilians and civilian infrastructure and medical services. Discussions of the political influences on health of people in the occupied Palestinian territory (West Bank and Gaza Strip) seem to be considered politically out-of-bounds by some medical journals. This study used a keyword-based search to explore patterns of publication about the occupied Palestinian territory and Israel by four large US and European medical journals. The four highest ranked, peer-reviewed, international medical journals were searched: The Journal of the American Medical Association (JAMA), The New England Journal of Medicine (NEJM), The Lancet, and The British Medical Journal (BMJ). Searches were conducted between Sept 1 and Sept 6, using each journal's search engine with the keywords "Gaza", "West Bank" and the stems "Palestin*" and "Israel*" in all fields for the period Jan 1, 1990, to Sept 6, 2016. News and commentary articles were included in the findings. The searches found the term "Palestin*" in 49 articles from the two US journals (32 in JAMA; 17 in NEJM) and 694 articles in the two UK journals (236 in The Lancet; 458 in BMJ). "Israel*" was found in 840 articles in US journals (386 in JAMA; 454 in NEJM) and in 2972 articles in UK journals (1388 in The Lancet; 1584 in BMJ). "West Bank" was found in nine articles in US journals (nine in JAMA; none in NEJM) and in 297 articles from the UK (211 in The Lancet; 86 in BMJ). "Gaza" was found in 18 articles in US journals (15 from JAMA; three from NEJM) and in 487 articles in UK journals (324 in The Lancet; 166 in BMJ). Compared with the two US-based medical journals, the UK journals published

  9. Public Policies for ICT Update In Business: Some Key Indicators for Spain in the European Area

    Directory of Open Access Journals (Sweden)

    José Luis Vázquez

    2013-08-01

    Full Text Available Purpose—Based on the new face of business in the twenty first century, this general review is aimed at analyzing the use of information and communication technologies (ICT as social technologies by Spanish enterprises in the European context, as a result of recent policy frameworks set at communitarian and national levels.Design/methodology/approach—The paper reviews the guidelines marked by European common policies with regards to ICT update in business, just as the translation of such standards in the Spanish area. From this framework, implications of ICT adoption in the social relationships with consumers, employees, business partners and public authorities are analyzed by providing some figures in the Spanish context in comparison with the European average.Findings—The analysis supports a positive effect of national policies on Spanish enterprises’ use of social technologies in the interactions with their internal and external stakeholders, while some differences can be reported attending size and sector criteria. In this respect, ICT penetration seems to be widespread in Spanish enterprises longer than ten employees, specially within informatics, telecommunications and audiovisuals, whereas automation of interactions is moderated in micro-enterprises in the manufacture, building, retailing, and transportation sectors.Research limitations/implications—The paper offers a general overview of the use of ICT as social technologies in Spanish enterprises based on public reports. However, further research should be oriented to analyze more in deep the impact of public policies on ICT adoption and usage in business, by explaining their determining factors and comparing different clusters of counties and major regions of the world.Practical implications—The analysis reported point to the need of reinforcing the Spanish positioning in the ICT European sector in the long term. In this sense, future policy measures should be devoted to

  10. Public Policies for ICT Update In Business: Some Key Indicators for Spain in the European Area

    Directory of Open Access Journals (Sweden)

    Ana Lanero

    2011-08-01

    Full Text Available Purpose—Based on the new face of business in the twenty first century, this general review is aimed at analyzing the use of information and communication technologies (ICT as social technologies by Spanish enterprises in the European context, as a result of recent policy frameworks set at communitarian and national levels. Design/methodology/approach—The paper reviews the guidelines marked by European common policies with regards to ICT update in business, just as the translation of such standards in the Spanish area. From this framework, implications of ICT adoption in the social relationships with consumers, employees, business partners and public authorities are analyzed by providing some figures in the Spanish context in comparison with the European average.Findings—The analysis supports a positive effect of national policies on Spanish enterprises’ use of social technologies in the interactions with their internal and external stakeholders, while some differences can be reported attending size and sector criteria. In this respect, ICT penetration seems to be widespread in Spanish enterprises longer than ten employees, specially within informatics, telecommunications and audiovisuals, whereas automation of interactions is moderated in micro-enterprises in the manufacture, building, retailing, and transportation sectors.Research limitations/implications—The paper offers a general overview of the use of ICT as social technologies in Spanish enterprises based on public reports. However, further research should be oriented to analyze more in deep the impact of public policies on ICT adoption and usage in business, by explaining their determining factors and comparing different clusters of counties and major regions of the world.Practical implications—The analysis reported point to the need of reinforcing the Spanish positioning in the ICT European sector in the long term. In this sense, future policy measures should be devoted to

  11. 24 CFR 241.615 - Certification of cost requirements.

    Science.gov (United States)

    2010-04-01

    ..., including any collateral agreements. (g) Certificate of public accountant. Where required by the... independent Certified Public Accountant or independent public accountant licensed by a regulatory authority of...

  12. What are the key organisational capabilities that facilitate research use in public health policy?

    Science.gov (United States)

    Huckel Schneider, Carmen; Campbell, Danielle; Milat, Andrew; Haynes, Abby; Quinn, Emma

    2014-11-28

    Literature about research use suggests that certain characteristics or capabilities may make policy agencies more evidence attuned. This study sought to determine policy makers' perceptions of a suite of organisational capabilities identified from the literature as potentially facilitating research uptake in policy decision making. A literature scan identified eight key organisational capabilities that support research use in policy making. To determine whether these capabilities were relevant, practical and applicable in real world policy settings, nine Australian health policy makers were consulted in September 2011. We used an open-ended questionnaire asking what facilitates the use of research in policy and program decision making, followed by specific questions rating the proposed capabilities. Interviews were transcribed and the content analysed. There was general agreement that the capabilities identified from the literature were relevant to real world contexts. However, interviewees varied in whether they could provide examples of experiences with the capabilities, how essential they considered the different capabilities to be and how difficult they considered the capabilities were to achieve. Efforts to improve the use of research in policy decision making are likely to benefit from targeting multiple organisational capabilities, including staff skills and competence, tools such as templates and checklists to aid evidence use and leadership support for the use of research in policy development. However, such efforts should be guided by an understanding of how policy agencies use evidence and how they view their roles, and external factors such as resource constraints and availability of appropriate research.

  13. Art as a key tool for engaging the public with the ICESat-2 mission

    Science.gov (United States)

    Casasanto, V.; Markus, T.

    2017-12-01

    NASA's Ice, Cloud, and land Elevation Satellite (ICESat-2), to be launched in the Fall of 2018, will measure the height of Earth from space using lasers, collecting the most precise and detailed account yet of our planet's elevation. The mission will allow scientists to investigate how global warming is changing the planet's icy polar regions and to take stock of Earth's vegetation. ICESat-2's emphasis on polar ice, as well as its unique measurement approach, has provided an intriguing and accessible focus for the mission's education and outreach programs. Sea ice and land ice are areas have experienced significant change in recent years. It is key to communicate what is happening, why we are measuring these areas and their importance to our global climate. Art is a powerful tool to inspire, engage, and provide an emotional connection to these remote areas. This paper will detail ICESat-2's art/science collaborations, including results from a unique collaboration with art and design school the Savannah College of Art Design (SCAD). Additional programs will be discussed including a multimedia live music program to engage on an emotional level, to communicate the importance of the polar regions to our global climate, and to inspire to take action.

  14. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    Science.gov (United States)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  15. On the Ergodic Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels with Public Discussion

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. We prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Moreover, we analyze the impact of correlation matrices on the system performance. Finally, we study the system’s performance in the two extreme power regimes. In the high-power regime, we provide closed-form expressions of the gain/loss due to correlation. In the low signal-to-noise ratio (SNR) regime, we investigate the energy efficiency of the system by determining the minimum energy required for sharing a secret-key bit and the wideband slope while highlighting the impact of correlation matrices.

  16. Public health and social injustice are the key issues for the decriminalization of abortion in Mexico.

    Science.gov (United States)

    1994-01-01

    Although the Second National Abortion Survey Gallup found that 88% of Mexicans believe abortion should be a woman's choice and 77% think the decriminalization of abortion would substantially reduce maternal mortality, abortion in Mexico remains governed by a 1931 criminal code. The survey was initiated by the Information and Reproductive Choice Group to provide information for the 1994 national debate on abortion. Supporters of legal abortion note that poor women resort to unsafe pregnancy terminations without regard to the criminal status of abortion. According to Patricia Mercado, co-founder of the Reproductive Choice Group, "You can be against abortion, but still allow it to be decriminalized. In other words, criminalization does not prevent women from having abortions, it only makes then have then in bad conditions. The idea is that women should be able to decide freely without risking problems of health and social justice." Despite public support for abortion legalization, survey results indicate widespread fear about acknowledging the existence of clandestine abortion. An estimated 1-2 million illegal abortions occur each year in Mexico, yet only 26% of survey respondents would admit to knowing a woman who had undergone illegal abortion.

  17. Policy Pathways: Energy Performance Certification of Buildings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Improving energy efficiency is one of the most effective measures to address energy security, climate change and economic objectives. The Policy Pathways series can help countries capture this potential by assisting with the implementation of the 25 energy efficiency policy recommendations that were published by the International Energy Agency (IEA) in 2008. This policy pathway on energy performance certification of buildings is the second in the series. It aims to provide a 'how-to' guide to policy makers and relevant stakeholders on the essential elements in implementing energy performance certification of buildings programmes. Energy performance certification of buildings is a way to rate the energy efficiency of individual buildings -- whether they be residential, commercial or public. It is a key policy instrument that can assist governments in reducing energy consumption in buildings. This policy pathway showcases experiences from countries around the world to show examples of good practice and delivers a pathway of ten critical steps to implement energy performance certification of buildings programmes.

  18. Absence from work and the medical sickness certificate.

    Science.gov (United States)

    Massoni, F; Salesi, M; Sarra, M V; Ricci, S

    2013-03-01

    Internet and dematerialization have greatly facilitated the medical profession. Contractual physicians and national health service doctors now have efficient tools for the electronic management of their routine administrative workload. A recent innovation is the medical sickness certificate issued by primary care providers and national health service physicians. Following postponements and uncertainties, procedures for the electronic completion and online transmission of the sickness certificate are now complete. The changes introduced by the so-called "Brunetta decree", however, have made its application difficult and continuous improvement to the system is needed, considering also the severe penalties imposed for violations. In the light of serious legal repercussions for health care professionals, this article examines various critical issues, highlighting the pitfalls and the network's enormous potential for ascertaining evidence of irregularities. The overheated debate on absenteeism due to illness, the diverse roles of national health physicians and self-employed doctors responsible for issuing a sickness certificate, and problems related to circumstances in which a doctor operates, are the key topics in this discussion. Computerization is an effective tool for optimizing public resources; however, it also seeks to ferret out, through the traceability of certification, abuse of medical certification, with severe penalties applied if certificates are discovered to contain misleading or untrue information.

  19. Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion

    KAUST Repository

    Zorgui, Marwen

    2015-06-14

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. Then, we prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem that we derive. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Finally, we analyze the impact of correlation matrices on the system performance and provide closed-form expressions of the gain/loss due to correlation in the high power regime.

  20. Trainer certification

    International Nuclear Information System (INIS)

    Couser, S.; Moore, J.

    1988-01-01

    A DOE Technical Safety Appraisal in October 1986 found that training at the Portsmouth Gaseous Diffusion Plant was fragmented and lacked uniformity. Training was localized in departments and was more often handled by line supervisors, etc. - with no certification. The Trainer Certification Program has provided the means for applying standard guidelines to ensure that training is designed, applied, and evaluated in a consistent, effective, and efficient manner. The program is in a state of substantial change and a target date for compliance is set for 1989. Trainer certification will provide both current and future resources to ensure consistent and effective training. 22 figures

  1. Climate certificates

    International Nuclear Information System (INIS)

    1998-10-01

    Reduced emissions of climate gases at the lowest cost require international cooperation in order to ensure that the most cost-efficient measures are taken. A market for emission rights is one way of achieving this. However, creating the right conditions for such a market to operate requires an unambiguous definition of the product to be traded. In this PM, the Swedish Power Association sketches out how such a product could be defined, and how a market for the resulting unambiguously defined product could be operated internationally, in parallel with other markets for energy products. Trade in climate certificates could become a joint EU approach to achieving common results within the field of climate policy. The main features of the proposal are as follows: Electricity producers would be allowed to issue climate certificates for electricity produced without climate-affecting emissions, e.g. in wind power plants. 1 kWh of electricity produced without emissions would entitle the utility to issue a climate certificate for 1 kWh. Electricity from power stations having low emissions, e.g. modern natural gas-fired plants, would entitle the utility to issue certificates in proportion to how much lower their emissions were in comparison with those from conventional coal-fired power stations. The number of certificates would be reduced by an individual coefficient, related directly to the quantity of climate-affecting emissions from the plant concerned. They would be traded and noted on markets in the various member countries. The certificates would not be nationally restricted, but could be traded across borders. Exchanges would be authorised by national authorities, in accordance with overall EU directives. These authorised exchanges would act as certification bodies, checking that certificates had been properly issued in accordance with a corresponding volume of electricity production. Electricity and certificates could be purchased from different suppliers. The

  2. PUBLIC KEY INFRASTRUCTURE (PKI)

    Data.gov (United States)

    Federal Laboratory Consortium — Common Access Card (CAC)Enterprise Testing Overview:Established in 2003Performs test and evaluations of the DOD PKI CAC issuance systems from an enterprise level all...

  3. An evaluation framework for pre-distribution strategies of certificates in VANETs

    NARCIS (Netherlands)

    Feiri, Michael; Petit, Jonathan; Kargl, Frank

    Security and privacy in vehicular communication are expected to be ensured by the pervasive use of pseudonymous certificates and signed messages. The design and establishment of necessary public key infrastructure and hierarchies of cer- tificate authorities is ongoing in industry consortia, such as

  4. La politique qualité de la certification des comptes publics. Le cas de la Cour des comptes

    OpenAIRE

    Portal , Marine

    2009-01-01

    This research concerns the quality of the public accounts financial audit and more specifically the quality policy of this financial audit carries out by the Cour des comptes. The context is characterized by an increase of demands concerning the quality of financial and accounting information. The accounting and budgetary reform in France, generated by the LOLF 2001, is changing deeply performance of public management and accountancy by emphasizing transparence and quality for information, tw...

  5. Public assessment of key performance indicators of healthcare in a Canadian province: the effect of age and chronic health problems.

    Science.gov (United States)

    Nurullah, Abu Sadat; Northcott, Herbert C; Harvey, Michael D

    2014-01-15

    This study explores the effect of age and chronic conditions on public perceptions of the health system, as measured by the Key Performance Indicators (KPIs) of healthcare, in the province of Alberta in Canada. Drawing from data collected by Government of Alberta's Department of Health and Wellness, this research examines two key questions: (1) Do people in the 65+ age group rate the KPIs of healthcare (i.e., availability, accessibility, quality, outcome, and satisfaction) more favorably compared to people in younger age groups in Alberta? (2) Does the rating of KPIs of healthcare in Alberta vary with different chronic conditions (i.e., no chronic problem, chronic illnesses without pain, and chronic pain)? The findings indicate that people in the older age group tend to rate the KPIs of healthcare more favorably compared to younger age groups in Alberta, net of socio-demographic factors, self-reported health status, and knowledge and utilization of health services. However, people experiencing chronic pain are less likely to rate the KPIs of healthcare favorably compared to people with no chronic health problem in Alberta. Discussion includes implications of the findings for the healthcare system in the province.

  6. 42 CFR 493.53 - Notification requirements for laboratories issued a certificate for provider-performed microscopy...

    Science.gov (United States)

    2010-10-01

    ... certificate for provider-performed microscopy (PPM) procedures. 493.53 Section 493.53 Public Health CENTERS... CERTIFICATION LABORATORY REQUIREMENTS Registration Certificate, Certificate for Provider-performed Microscopy... certificate for provider-performed microscopy (PPM) procedures. Laboratories issued a certificate for PPM...

  7. Public Key Infrastructure (PKI) Increment 2 Root Cause Analysis (RCA) for Performance Assessments and Root Cause Analyses (PARCA)

    Science.gov (United States)

    2015-05-01

    DoD PKI enables secure encryption , authentication of network transactions, data integrity, and non-repudiation to a broad range of government- and...Identity Verification (PIV) Authentication Certificates.  Implement Rivest, Shamir, and Adelman ( RSA ) 2048 when viable and transition to Secure Hash...facilitate missions through digital signing, encryption , and web-server authentication. However, reliability of the tokens was unacceptable, with

  8. Investigating weaknesses in Android certificate security

    Science.gov (United States)

    Krych, Daniel E.; Lange-Maney, Stephen; McDaniel, Patrick; Glodek, William

    2015-05-01

    Android's application market relies on secure certificate generation to establish trust between applications and their users; yet, cryptography is often not a priority for application developers and many fail to take the necessary security precautions. Indeed, there is cause for concern: several recent high-profile studies have observed a pervasive lack of entropy on Web-systems leading to the factorization of private keys.1 Sufficient entropy, or randomness, is essential to generate secure key pairs and combat predictable key generation. In this paper, we analyze the security of Android certificates. We investigate the entropy present in 550,000 Android application certificates using the Quasilinear GCD finding algorithm.1 Our results show that while the lack of entropy does not appear to be as ubiquitous in the mobile markets as on Web-systems, there is substantial reuse of certificates only one third of the certificates in our dataset were unique. In other words, we find that organizations frequently reuse certificates for different applications. While such a practice is acceptable under Google's specifications for a single developer, we find that in some cases the same certificates are used for a myriad of developers, potentially compromising Android's intended trust relationships. Further, we observed duplicate certificates being used by both malicious and non-malicious applications. The top 3 repeated certificates present in our dataset accounted for a total of 11,438 separate APKs. Of these applications, 451, or roughly 4%, were identified as malicious by antivirus services.

  9. Accounting Changes on Green Certificates in Romania

    Directory of Open Access Journals (Sweden)

    Sava Raluca

    2017-01-01

    Full Text Available The purpose of green certificates is to get more renewable electric energy into the energy market at the expense of traditional energy, which in most countries is based on fossil fuel. These renewable technologies are too expensive to enter the market on commercial terms. A key feature of the scheme is that producers of energy based on new renewable energy sources receive certificates from the authorities, proportional to their output. The users of electric energy are required to buy a certain amount of these certificates when they buy electricity. Green certificates may in principle contribute to a reduction of the production of traditional energy.

  10. Educação, formação profissional e certificação de conhecimentos: considerações sobre uma política pública de certificação profissional Education, vocational training and certification of knowledge: considerations on public policies for professional certification

    Directory of Open Access Journals (Sweden)

    Carmen Sylvia Vidigal Moraes

    2005-12-01

    Full Text Available Existem, no Brasil, duas formas de certificação, organizadas de acordo com os distintos propósitos, público-alvo e interesses que as orientam. De um lado, a certificação regulamentada do ensino nos seus diferentes níveis, mas mantendo a dissociação entre certificação e formação profissional na "educação profissional básica"; e, de outro, as medidas alinhadas às demandas do mercado, interessadas no reconhecimento formal de competências adquiridas no exercício de trabalho, com o objetivo de aumentar a competitividade. As reflexões aqui realizadas visam contribuir para a elaboração de uma política pública que integre a formação profissional no sistema nacional de educação e normalize a validação das qualificações profissionais no sistema escolar, promovendo a superação da dicotomia entre educação/certificação escolar e formação/certificação profissional, e possibilitando, aos candidatos à certificação profissional, o reconhecimento social e o aproveitamento de seus conhecimentos para fins de continuidade de estudos e de inserção e progressão profissional.The two Brazilian forms of certification are organized according to their goals, target public and the interests that guide them: 1 The regulated certification of teaching on its different levels, which keeps the difference between professional certification and vocational training in the "basic professional education". 2 The measures in line with the demands of the labour market, which are interested in the formal recognition of abilities acquired at work, in order to increase competitiveness. These reflections intend to help elaborate public policies that integrate vocational training into the national education system and regulate the validation of professional qualifications in the school system. This would overcome the dichotomy between school education/certification and vocational training/professional certification, and give social recognition

  11. Perspectives on key principles of generalist medical practice in public service in sub-saharan africa: a qualitative study

    Directory of Open Access Journals (Sweden)

    Downing Raymond V

    2011-07-01

    Full Text Available Abstract Background The principles and practice of Family Medicine that arose in developed Western countries have been imported and adopted in African countries without adequate consideration of their relevance and appropriateness to the African context. In this study we attempted to elicit a priori principles of generalist medical practice from the experience of long-serving medical officers in a variety of African counties, through which we explored emergent principles of Family Medicine in our own context. Methods A descriptive study design was utilized, using qualitative methods. 16 respondents who were clinically active medical practitioners, working as generalists in the public services or non-profit sector for at least 5 years, and who had had no previous formal training or involvement in academic Family Medicine, were purposively selected in 8 different countries in southern, western and east Africa, and interviewed. Results The respondents highlighted a number of key issues with respect to the external environment within which they work, their collective roles, activities and behaviours, as well as the personal values and beliefs that motivate their behaviour. The context is characterized by resource constraints, high workload, traditional health beliefs, and the difficulty of referring patients to the next level of care. Generalist clinicians in sub-Saharan Africa need to be competent across a wide range of clinical disciplines and procedural skills at the level of the district hospital and clinic, in both chronic and emergency care. They need to understand the patient's perspective and context, empowering the patient and building an effective doctor-patient relationship. They are also managers, focused on coordinating and improving the quality of clinical care through teamwork, training and mentoring other health workers in the generalist setting, while being life-long learners themselves. However, their role in the community, was

  12. Introduction of Renal Key Performance Indicators Associated with Increased Uptake of Peritoneal Dialysis in a Publicly Funded Health Service.

    Science.gov (United States)

    Toussaint, Nigel D; McMahon, Lawrence P; Dowling, Gregory; Holt, Stephen G; Smith, Gillian; Safe, Maria; Knight, Richard; Fair, Kathleen; Linehan, Leanne; Walker, Rowan G; Power, David A

    2017-01-01

    ♦ BACKGROUND: Increased demand for treatment of end-stage kidney disease has largely been accommodated by a costly increase in satellite hemodialysis (SHD) in most jurisdictions. In the Australian State of Victoria, a marked regional variation in the uptake of home-based dialysis suggests that use of home therapies could be increased as an alternative to SHD. An earlier strategy based solely on increased remuneration had failed to increase uptake of home therapies. Therefore, the public dialysis funder adopted the incidence and prevalence of home-based dialysis therapies as a key performance indicator (KPI) for its health services to encourage greater uptake of home therapies. ♦ METHODS: A KPI data collection and bench-marking program was established in 2012 by the Victorian Department of Health and Human Services, with data provided monthly by all renal units in Victoria using a purpose-designed website portal. A KPI Working Group was responsible for analyzing data each quarter and ensuring indicators remained accurate and relevant and each KPI had clear definitions and targets. We present a prospective, observational study of all dialysis patients in Victoria over a 4-year period following the introduction of the renal KPI program, with descriptive analyses to evaluate the proportion of patients using home therapies as well as home dialysis modality survival. ♦ RESULTS: Following the introduction of the KPI program, the net growth of dialysis patient numbers in Victoria remained stable over 4 years, at 75 - 80 per year (approximately 4%). However, unlike the previous decade, about 40% of this growth was through an increase in home dialysis, which was almost exclusively peritoneal dialysis (PD). The increase was identified particularly in the young (20 - 49) and the elderly (> 80). Disappointingly, however, 67% of these incident patients ceased PD within 2 years of commencement, 46% of whom transferred to SHD. ♦ CONCLUSIONS: Introduction of a KPI program

  13. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    show that the distribution of Fourier coefficients for the cipher over all keys is close to ideal. Lastly, we define a practical instance of the construction with t = 2 using AES referred to as AES2. Any attack on AES2 with complexity below 285 will have to make use of AES with a fixed known key...

  14. Radiation protection supervisors certification in Brazil

    International Nuclear Information System (INIS)

    Mendonca Costa, Eduardo; Arraes Monteiro, Iara

    2008-01-01

    In order to accomplish its legal assignments CNEN certifies the qualification of radiation protection supervisors. The current certification process is presented and discussed in this paper. This paper discusses the main points of the certification process including: knowledge tests, stake holder's communication, standards, supervisor responsibilities and profiles. The importance of safety certification of nuclear facilities and radiation protection of public individuals and workers are also discussed. Taking into account the characteristics of the Brazilian Nuclear program, the future improvements and goals in the certification process is also presented. (author)

  15. Research on Certification System for Wisconsin Public Librarians in America%美国威斯康星州公共图书馆员认证制度研究

    Institute of Scientific and Technical Information of China (English)

    冯佳

    2011-01-01

    The certification system for Wisconsin public librarians as the representative of the certifitypes and the certification process of the certification system for Wisconsin public librarians, some features of the certification system can be obtained: strengthening the important role of the library system, providing government and lawdriven and security, emphasis on library directors' profesional eertifieation, foeusing on eombining with continuing education and practical work, strict distinction of certifieation types, concern on the operability of the implementation process and so on.%威斯康星州的公共图书馆员认证制度作为美国公共图书馆员认证制度的代表,反映了当前美国公共图书馆员认证制度的状况。通过对威斯康星州公共图书馆员认证制度的发展历程、认证类型、认证过程进行介绍和详细梳理,得出该认证制度的一些特点:强化图书馆系统的重要作用、提供政府及法律的驱动与保障、强调图书馆馆长的资格认证、注重继续教育与实际工作的相结合、严格进行认证类别的区分、关注实施过程的可操作性等。

  16. System certification: An alternative to package certification?

    International Nuclear Information System (INIS)

    Luna, R.E.; Jefferson, R.J.

    1992-01-01

    One precept of the current radioactive material transportation regulations is that the package is the primary protection for the public. A packaging is chosen to provide containment, shielding, and criticality control suitable to the quantity and characteristics of the radionuclide being transported. Occasionally, radioactive materials requiring transport are not of a mass or size that would allow the materials to be shipped in an appropriate packaging. This is a particular problem for materials that should be shipped in a Type B package, but because such packages are designed and certified for specific contents, the package is usually fairly expensive, available in relatively small numbers, and often requires a fairly long period to achieve certification or amended certification for new contents. Where the shipment to be made is relatively infrequent, there may be economic and time penalties that may hamper shipment or force the shipper into uneconomic or high risk options. However, there is recognition of such situations in the International Atomic Energy Agency (IAEA) regulations under the provisions for Special Arrangement

  17. 45 CFR 170.410 - Types of testing and certification.

    Science.gov (United States)

    2010-10-01

    ... Section 170.410 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH INFORMATION TECHNOLOGY HEALTH INFORMATION TECHNOLOGY STANDARDS, IMPLEMENTATION SPECIFICATIONS, AND CERTIFICATION CRITERIA AND CERTIFICATION PROGRAMS FOR HEALTH INFORMATION TECHNOLOGY Temporary Certification Program for HIT § 170.410 Types...

  18. 45 CFR 170.450 - EHR module testing and certification.

    Science.gov (United States)

    2010-10-01

    ... Section 170.450 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH INFORMATION TECHNOLOGY HEALTH INFORMATION TECHNOLOGY STANDARDS, IMPLEMENTATION SPECIFICATIONS, AND CERTIFICATION CRITERIA AND CERTIFICATION PROGRAMS FOR HEALTH INFORMATION TECHNOLOGY Temporary Certification Program for HIT § 170.450 EHR...

  19. MPH education for the 21st century: motivation, rationale, and key principles for the new Columbia public health curriculum.

    Science.gov (United States)

    Fried, Linda P; Begg, Melissa D; Bayer, Ronald; Galea, Sandro

    2014-01-01

    Public health is at a watershed moment. The world's health needs are changing, and complex problems require interdisciplinary approaches and systems-based solutions. Our longer lives and changing environments necessitate life-course and structural approaches to prevention. This argues strongly for public health graduate education that adequately prepares trainees to tackle emerging challenges and to lead now and in the future. Nearly a century of scholarship and scientific advances may offer a blueprint for training the next generation of public health leaders. We articulate a case for change; discuss some of the foundational principles that should guide public health education; and discuss what such a change might look like building on prior scholarship, on the examples set by other disciplines, and on our own experience.

  20. MPH Education for the 21st Century: Motivation, Rationale, and Key Principles for the New Columbia Public Health Curriculum

    Science.gov (United States)

    Fried, Linda P.; Begg, Melissa D.; Bayer, Ronald

    2014-01-01

    Public health is at a watershed moment. The world’s health needs are changing, and complex problems require interdisciplinary approaches and systems-based solutions. Our longer lives and changing environments necessitate life-course and structural approaches to prevention. This argues strongly for public health graduate education that adequately prepares trainees to tackle emerging challenges and to lead now and in the future. Nearly a century of scholarship and scientific advances may offer a blueprint for training the next generation of public health leaders. We articulate a case for change; discuss some of the foundational principles that should guide public health education; and discuss what such a change might look like building on prior scholarship, on the examples set by other disciplines, and on our own experience. PMID:24228646

  1. Public debates - key issue in the environmental licensing process for the completion of the Cernavoda NPP Unit 2

    International Nuclear Information System (INIS)

    Rotaru, Ioan; Jelev, Adrian

    2003-01-01

    SN 'NUCLEARELECTRICA' S.A., the owner of Cernavoda NPP, organized, in 2001, several public consultations related to environmental impact of the completion of the Cernavoda NPP Unit 2, as required by the Romanian environmental law, part of project approval. Public consultations on the environmental assessment for the completion of the Cernavoda NPP - Unit 2 took place in 2001 between August 15 and September 21 in accordance with the provisions of Law No. 137/95 and Order No. 125/96. Romanian environmental legislation, harmonization of national environmental legislation with European Union, Romanian legislative requirements, information distributed to the public, issues raised and follow-up, they all are topics highlighted by this paper and they are addressing the environmental licensing process of the Cernavoda 2 NPP. The public consultation process described fulfils all the Romanian requirements for carrying out meaningful consultation with its relevant shareholders. The process also satisfies EDC (Export Development Corporation - Canada) requirements for public consultation and disclosure with relevant shareholders in the host country. SNN is fully committed to consulting as necessary with relevant shareholders throughout the construction and operation of the Project. Concerns of the public have been taken into account with the operations of Unit 1 and will continue to be addressed during the Unit 2 Project

  2. Waste Oriented Innovation Culture-Transparency-Public Trust Cycle : Success Key for Nuclear Facility Management in Indonesia

    International Nuclear Information System (INIS)

    Susetyo Hario Putero; Haryono B Santosa

    2007-01-01

    Radioactive matter that is a primary material in a nuclear facility, including nuclear power generation, is a part of hazardous materials. Its existence will lead a controversy, although the precise management system for handling it is available. Public sometimes reject the nuclear technology due to the lack of understanding and wrong perception on that technology, especially the radioactive waste treatment. So, strategies should be designed for correcting public perception, until public acceptance on utilization of nuclear technology in Indonesia increase. The innovation development on radioactive waste management was studied by observing and interviewing managements and operators of Japan Atomic Energy Agency (JAEA), Japan. The constructing of concept was based on study result. Based on assumption that the current state of the radioactive waste treatment is suitable and there is serious improvement of technology, therefore systematic and precise oriented corrective efforts of public perception could be done. Transparency, intensive communication, and public participation that show responsible action for emerging mutual trust are basic of strategy that should be developed. High level public acceptance on utilization of nuclear technology is expected to be able for stimulating and supporting sustainable technology innovation culture. (author)

  3. 46 CFR 167.60-10 - Exhibition of certificate of inspection.

    Science.gov (United States)

    2010-10-01

    ... PUBLIC NAUTICAL SCHOOL SHIPS Certificates of Inspection § 167.60-10 Exhibition of certificate of inspection. On every nautical school ship, the original certificate of inspection shall be framed under glass... 46 Shipping 7 2010-10-01 2010-10-01 false Exhibition of certificate of inspection. 167.60-10...

  4. The electricity certificate system, 2008

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    The electricity certificate system is now in its sixth year. Since the start, both the system and the market have developed, and have undergone a number of changes. In January 2007, the Swedish Energy Agency published a report on the system, 'The electricity certificate system, 2006', to provide easily accessible information on the development of the system and to improve general understanding of it. With the passing of another year, it is now time for the third edition, 'The electricity certificate system, 2008', describing the market status of the electricity certificate system, with statistics from 2003 to 2007. This year's special theme chapter describes current support systems for renewable electricity production throughout the EU. The report also contains expanded information and statistics on biofuels, together with a new chapter that describes planned expansion of renewable electricity production up to 2012. The chapter on consumers' contribution to renewable electricity production has also been updated. A new feature this year is provided in the form of a number of tables at the end of the report, complementing the text. Through annual publication of the report, we hope to create a means of continuously developing the statistical material and analyses, in order to assist those involved in the market, and all other interested persons, to follow achievement of the objectives set out in the Government's Bill No. 205/06:154, 'Renewable electricity with green certificates'. We welcome views on the content and presentation of the report in order further to improve it. The target for the certificate system is to increase, by 2016, the annual production of electricity from renewable sources by 17 TWh relative to its production in 2002. So far, the actual production of renewable electricity is less than the indicative stage target for 2007. Nevertheless, progress is regarded as good, as there are many planned projects

  5. Dissemination of public health information: key tools utilised by the NECOBELAC network in Europe and Latin America.

    Science.gov (United States)

    De Castro, Paola; Marsili, Daniela; Poltronieri, Elisabetta; Calderón, Carlos Agudelo

    2012-06-01

     Open Access (OA) to scientific information is an important step forward in communication patterns, yet we still need to reinforce OA principles to promote a cultural change of traditional publishing practices. The advantages of free access to scientific information are even more evident in public health where knowledge is directly associated with human wellbeing.  An OA 'consolidation' initiative in public health is presented to show how the involvement of people and institutions is fundamental to create awareness on OA and promote a cultural change. This initiative is developed within the project NEtwork of COllaboration Between Europe and Latin American Caribbean countries (NECOBELAC), financed by the European Commission.  Three actions are envisaged: Capacity building through a flexible and sustainable training programme on scientific writing and OA publishing; creation of training tools based on semantic web technologies; development of a network of supporting institutions.  In 2010-2011, 23 training initiatives were performed involving 856 participants from 15 countries; topic maps on scientific publication and OA were produced; 195 institutions are included in the network.  Cultural change in scientific dissemination practices is a long process requiring a flexible approach and strong commitment by all stakeholders. © 2012 The authors. Health Information and Libraries Journal © 2012 Health Libraries Group Health Information and Libraries Journal.

  6. EFFECT OF LIBRARIAN CERTIFICATION ON KNOWLEDGE AND MOTIVATION OF JAPANESE LIBRARIANS

    OpenAIRE

    KEITA, TSUJI; YOSHIKANE, FUYUKI; KAGEURA, KYO

    2009-01-01

    Introduction. There are not many kinds of librarian certification in Japan. Among them, Shisho (SC) is almost the only certification for public librarians, but few libraries and parent organizations (e.g., local public entities) take this certification seriously. About half of full-time-employee (FTE) public librarians do not have an SC. However, from this background, can we conclude that SC is useless? To see what the effect of SC certification really is, we conducted a survey. Method. We as...

  7. Transportation Management Area Planning Certification Review Primer: Revised January 18, 2018

    Science.gov (United States)

    2018-01-18

    This primer outlines key concepts and expectations of a Transportation Management Area (TMA) Planning Certification Review. Reflecting on the collective experiences of past Certification Reviews, this includes references to relevant laws and regulati...

  8. 45 CFR 2.6 - Certification and authentication of records.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Certification and authentication of records. 2.6 Section 2.6 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION TESTIMONY BY... Certification and authentication of records. Upon request, DHHS agencies will certify, pursuant to 42 U.S.C...

  9. Efficient Certificate Verification for Vehicle-to-Grid Communications

    Energy Technology Data Exchange (ETDEWEB)

    Akkaya, Kemal [Florida Intl Univ., Miami, FL (United States); Saputro, Nico [Florida Intl Univ., Miami, FL (United States); Tonyali, Samet [Florida Intl Univ., Miami, FL (United States); Cebe, Mumin [Florida Intl Univ., Miami, FL (United States); Mahmoud, Mohamed [Tennessee Technological Univ., Cookeville, TN (United States)

    2017-07-19

    While public charging stations are typically used for Electric Vehicle (EV) such as charging, home microgrids that may act as private charging stations are also expected to be used for meeting the increased EV charging demands in the future. Such home microgrids can be accessible through their smart meters, which makes advanced metering infrastructure (AMI) a viable alternative for vehicle-to-grid (V2G) communications. However, to ensure secure V2G communications using public-keys, smart meters will need to maintain certificate revocation lists (CRLs) not just for the AMI network but also for large number of EVs that may interact with them. For resource-constrained smart meters, this will increase the storage requirements and introduce additional overhead in terms of delay and CRL maintenance. To eliminate this burden, we propose keeping merely non-revoked certificates that belong to EVs, which are usually driven within the vicinity of that particular microgrid. The motivation comes from the fact that it is inefficient to distribute and store a large CRL that has revocation information about all EVs in the whole system as most of these EVs will never come to the geographic vicinity of that home microgrid. The approach ensures that any status changes of these certificates are communicated to the smart meters. We implemented the proposed approach in a realistic V2G communication scenario by using IEEE 802.11s mesh as the underlying AMI infrastructure using ns-3 simulator. The results confirmed that the proposed approach significantly reduces the certificate verification time and the storage requirements on smart meters.

  10. Information and Communication Technologies (ICT) as keys to the enhancement of public awareness about potential earth impacts

    Science.gov (United States)

    Usikov, Denis A.

    2013-09-01

    The 2007 Planetary Defense Conference recommends "to provide or enhance Internet sites to show how threats evolve and to illustrate possible action scenarios". Thereby, establishment of informational and communicational AsteroidAware web-site with the exact, authentic data about the past and the present of Earth's impact events will assist in achievement of positive results and progress in different directions on political, international, social and scientific levels. Expanded ICT's capabilities for popularization of planetary defense can help in resolving the problem of low public interest. The project's primary intent lies in popularizing the concept of planetary defenses and attracting attention to the potential dangers that threaten the Earth from outer space. The result of the efforts falling into the boundaries of this project would be an increased amount of social participation in the process of developing solutions for and increasing awareness of potential collisions between various astral bodies and the Earth. The project is also aimed at creating a foundation for the interaction between scientists and executives from around the world to facilitate international efforts of searching for fitting measures towards lowering threat levels and developing strategies revolving around united actions against potential threats.

  11. Transit management certificate program.

    Science.gov (United States)

    2012-07-01

    TTI worked closely with the Landscape Architecture and Urban Planning Department : (LAUP) of Texas A&M University (TAMU) to develop a transit management certificate : focus for the current Graduate Certificate in Transportation Planning (CTP) housed ...

  12. [Certification assessment and quality and risk management].

    Science.gov (United States)

    Papin-Morardet, Maud

    2018-03-01

    Organised by the French National Health Authority (HAS), certification is an external assessment process which is obligatory for all public and private health facilities, whatever their size or activity. The aim is to independently evaluate the quality of the health care provision of hospitals and clinics in France. This article looks at the investigation methods and the procedure used during the certification assessment of Henri Mondor University Hospitals in 2016. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  13. Deconstructing Teacher Certification

    Science.gov (United States)

    Baines, Lawrence A.

    2006-01-01

    In this article, the author takes a close look at alternative certification programs and is convinced that, because they vary so extremely in their requirements, all of them cannot possibly be producing highly qualified teachers. Here, he talks about Non-University Certification Programs (NUCPs). These are alternative certification programs that…

  14. Disinvestment policy and the public funding of assisted reproductive technologies: outcomes of deliberative engagements with three key stakeholder groups.

    Science.gov (United States)

    Hodgetts, Katherine; Hiller, Janet E; Street, Jackie M; Carter, Drew; Braunack-Mayer, Annette J; Watt, Amber M; Moss, John R; Elshaug, Adam G

    2014-05-05

    Measures to improve the quality and sustainability of healthcare practice and provision have become a policy concern. In addition, the involvement of stakeholders in health policy decision-making has been advocated, as complex questions arise around the structure of funding arrangements in a context of limited resources. Using a case study of assisted reproductive technologies (ART), deliberative engagements with a range of stakeholder groups were held on the topic of how best to structure the distribution of Australian public funding in this domain. Deliberative engagements were carried out with groups of ART consumers, clinicians and community members. The forums were informed by a systematic review of ART treatment safety and effectiveness (focusing, in particular, on maternal age and number of treatment cycles), as well as by international policy comparisons, and ethical and cost analyses. Forum discussions were transcribed and subject to thematic analysis. Each forum demonstrated stakeholders' capacity to understand concepts of choice under resource scarcity and disinvestment, and to countenance options for ART funding not always aligned with their interests. Deliberations in each engagement identified concerns around 'equity' and 'patient responsibility', culminating in a broad preference for (potential) ART subsidy restrictions to be based upon individual factors rather than maternal age or number of treatment cycles. Community participants were open to restrictions based upon measures of body mass index (BMI) and smoking status, while consumers and clinicians saw support to improve these factors as part of an ART treatment program, as distinct from a funding criterion. All groups advocated continued patient co-payments, with measures in place to provide treatment access to those unable to pay (namely, equity of access). Deliberations yielded qualitative, socially-negotiated evidence required to inform ethical, accountable policy decisions in the specific

  15. 77 FR 43077 - Federal Acquisition Regulation; Information Collection; North Carolina Sales Tax Certification

    Science.gov (United States)

    2012-07-23

    ...; Information Collection; North Carolina Sales Tax Certification AGENCY: Department of Defense (DOD), General... information collection requirement concerning North Carolina sales tax certification. Public comments are... respond, through the use of appropriate technological collection techniques or other forms of information...

  16. 76 FR 24026 - Federal Acquisition Regulation; Information Collection; Trade Agreements Certificate

    Science.gov (United States)

    2011-04-29

    ...; Information Collection; Trade Agreements Certificate AGENCY: Department of Defense (DOD), General Services... approved information collection requirement concerning trade agreements certificate. Public comments are...-mail [email protected] . SUPPLEMENTARY INFORMATION: A. Purpose Under the Trade Agreements Act of...

  17. 7 CFR 1901.505 - Certificates of beneficial ownership in FmHA or its successor agency under Public Law 103-354 loans.

    Science.gov (United States)

    2010-01-01

    ... ownership in FmHA or its successor agency under Public Law 103-354 loans. (a) Special trust of loans—(1) Establishment of special trusts. From time to time FmHA or its successor agency under Public Law 103-354 will... successor agency under Public Law 103-354 will own an interest in special trusts equal to the amount by...

  18. The GENIUS Grid Portal and robot certificates: a new tool for e-Science.

    Science.gov (United States)

    Barbera, Roberto; Donvito, Giacinto; Falzone, Alberto; La Rocca, Giuseppe; Milanesi, Luciano; Maggi, Giorgio Pietro; Vicario, Saverio

    2009-06-16

    Grid technology is the computing model which allows users to share a wide pletora of distributed computational resources regardless of their geographical location. Up to now, the high security policy requested in order to access distributed computing resources has been a rather big limiting factor when trying to broaden the usage of Grids into a wide community of users. Grid security is indeed based on the Public Key Infrastructure (PKI) of X.509 certificates and the procedure to get and manage those certificates is unfortunately not straightforward. A first step to make Grids more appealing for new users has recently been achieved with the adoption of robot certificates. Robot certificates have recently been introduced to perform automated tasks on Grids on behalf of users. They are extremely useful for instance to automate grid service monitoring, data processing production, distributed data collection systems. Basically these certificates can be used to identify a person responsible for an unattended service or process acting as client and/or server. Robot certificates can be installed on a smart card and used behind a portal by everyone interested in running the related applications in a Grid environment using a user-friendly graphic interface. In this work, the GENIUS Grid Portal, powered by EnginFrame, has been extended in order to support the new authentication based on the adoption of these robot certificates. The work carried out and reported in this manuscript is particularly relevant for all users who are not familiar with personal digital certificates and the technical aspects of the Grid Security Infrastructure (GSI). The valuable benefits introduced by robot certificates in e-Science can so be extended to users belonging to several scientific domains, providing an asset in raising Grid awareness to a wide number of potential users. The adoption of Grid portals extended with robot certificates, can really contribute to creating transparent access to

  19. Environmental certification for more sustainable imports

    International Nuclear Information System (INIS)

    Henry, Lucile; Monnoyer-Smith, Laurence; Demeulenaere, Laurence

    2017-12-01

    As France imports high quantities of products which have environmental impacts abroad due to extraction, transformations, and transports of used materials, and which are not visible for consumers, environmental certification could be a mean to reduce these impacts as it would allow consumers to identify the less polluting products, and incite producers to put such products on the market. After having discussed these issues, the author outlines key factors of success for such a certification, briefly identifies required adjustments at the technical level (requirement level, cost anticipation), and at the social and political level. She also evokes accompanying measures, and outlines that environmental certification is only a tool among others such as partnership agreements currently being negotiated between the European Union and other countries, or a combination of certification and cooperation with extracting countries (as practiced by Germany)

  20. National Certification Methodology for the Nuclear Weapons Stockpile

    International Nuclear Information System (INIS)

    Goodwin, B T; Juzaitis, R J

    2006-01-01

    and December of 2001 and continued in 2002 have proven useful in developing the methodology, and future workshops should prove useful in further refining this framework. Each laboratory developed an approach to certification with some differences in detailed implementation. The general methodology introduces specific quantitative indicators for assessing confidence in our nuclear weapon stockpile. The quantitative indicators are based upon performance margins for key operating characteristics and components of the system, and these are compared to uncertainties in these factors. These criteria can be summarized in a quantitative metric (for each such characteristic) expressed as: (i.e., confidence in warhead performance depends upon CR significantly exceeding unity for all these characteristics). These Confidence Ratios are proposed as a basis for guiding technical and programmatic decisions on stockpile actions. This methodology already has been deployed in certifying weapons undergoing current life extension programs or component remanufacture. The overall approach is an adaptation of standard engineering practice and lends itself to rigorous, quantitative, and explicit criteria for judging the robustness of weapon system and component performance at a detailed level. There are, of course, a number of approaches for assessing these Confidence Ratios. The general certification methodology was publicly presented for the first time to a meeting of Strategic Command SAG in January 2002 and met with general approval. At that meeting, the Laboratories committed to further refine and develop the methodology through the implementation process. This paper reflects the refinement and additional development to date. There will be even further refinement at a joint laboratory workshop later in FY03. A common certification methodology enables us to engage in peer reviews and evaluate nuclear weapon systems on the basis of explicit and objective metrics. The clarity provided by

  1. Perceived value of national certification for pediatric nurses.

    Science.gov (United States)

    Messmer, Patricia R; Hill-Rodriguez, Deborah; Williams, Arthur R; Ernst, Mary E; Tahmooressi, Jill

    2011-09-01

    This study evaluated whether pediatric nurses who were certified valued national certifications to a greater degree than those who were not certified. The Gaberson, Schroeter, Killen, and Valentine (2003) Perceived Value of Certification Tool (PVCT) was used to measure nurses' perceptions of certification. The PVCT includes 18 certification-related value statements, using a five-point Likert scale response ranging from strongly agree to strongly disagree. A principal factor analysis was performed to identify clusters of related variables. Certified pediatric nurses valued national certifications to a greater degree than those who were not certified. More favorable views of certification were moderately associated with favorable views of the effects of certification on salary. The PVCT was found to have one factor, not two, as previously reported in the literature. Lower perceived relationships were reported between certification and salary, clinical competence, and consumer confidence compared with feelings of professionalism and personal satisfaction. Efforts to improve the relationship between certification and its perceived value at one institution were addressed. More attention may be needed to strengthen relationships, perceived or otherwise, between certification and competency skills, public awareness, and compensation of nurses for holding national certification. Copyright 2011, SLACK Incorporated.

  2. Architect’s Certification: A Problem?

    Directory of Open Access Journals (Sweden)

    Yong Kum Weng

    2015-01-01

    Full Text Available Currently the problems of some architects issuing fraudulent progress certificates for Malaysia’s housing projects result in many house buyers losing their life savings. Unfortunately, these house buyers still remain contractually responsible for all the associated, present and future financial obligations such as their bank loans. Fraudulent certification is the most frequent incident of complaints amongst the range of problems complained about to the Board of Architects, Malaysia or Lembaga Arkitek Malaysia (LAM. This paper highlights the underlying pertinent issues such as when an architect does not fully understand the ramifications, or exercise due care when performing the certifier’s role with its inherent responsibilities under the Housing Development Act (HDA and Housing Development Regulations (HDR. Also at what stage the architect is legally required to issue progressive work completion certificates, particularly the scope ranging from the inception stage through to the completion stage. This includes the relevant housing laws and regulations that enshrine the architects’ professional status and confers legal certification duties. This is designed to protect the public interest, yet many architects fail to perform this duty inde-pendently, or impartially and fairly to the new house buyers and the public at-large. Recognizing the systemic weakness, the elements that contribute to the fraudulent certification and illustrates how the fraudulent certification exploits the trust of house buyers. In the analysis, a quantitative framework was used to measure, quantify and discuss the best all round outcomes.

  3. Implications for alcohol minimum unit pricing advocacy: what can we learn for public health from UK newsprint coverage of key claim-makers in the policy debate?

    Science.gov (United States)

    Hilton, Shona; Wood, Karen; Patterson, Chris; Katikireddi, Srinivasa Vittal

    2014-02-01

    On May 24th 2012, Scotland passed the Alcohol (Minimum Pricing) Bill. Minimum unit pricing (MUP) is an intervention that raises the price of the cheapest alcohol to reduce alcohol consumption and related harms. There is a growing literature on industry's influence in policymaking and media representations of policies, but relatively little about frames used by key claim-makers in the public MUP policy debate. This study elucidates the dynamic interplay between key claim-makers to identify lessons for policy advocacy in the media in the UK and internationally. Content analysis was conducted on 262 articles from seven UK and three Scottish national newspapers between 1st May 2011 and 31st May 2012, retrieved from electronic databases. Advocates' and critics' constructions of the alcohol problem and MUP were examined. Advocates depicted the problem as primarily driven by cheap alcohol and marketing, while critics' constructions focused on youth binge drinkers and dependent drinkers. Advocates justified support by citing the intervention's targeted design, but critics denounced the policy as illegal, likely to encourage illicit trade, unsupported by evidence and likely to be ineffective, while harming the responsible majority, low-income consumers and businesses. Critics' arguments were consistent over time, and single statements often encompassed multiple rationales. This study presents advocates with several important lessons for promoting policies in the media. Firstly, it may be useful to shift focus away from young binge drinkers and heavy drinkers, towards population-level over-consumption. Secondly, advocates might focus on presenting the policy as part of a wider package of alcohol policies. Thirdly, emphasis on the success of recent public health policies could help portray the UK and Scotland as world leaders in tackling culturally embedded health and social problems through policy; highlighting past successes when presenting future policies may be a valuable

  4. Publicity.

    Science.gov (United States)

    Chisholm, Joan

    Publicity for preschool cooperatives is described. Publicity helps produce financial support for preschool cooperatives. It may take the form of posters, brochures, newsletters, open house, newspaper coverage, and radio and television. Word of mouth and general good will in the community are the best avenues of publicity that a cooperative nursery…

  5. ECOTOURISM CERTIFICATION PROGRAMS: STANDARDS AND BENEFITS

    Directory of Open Access Journals (Sweden)

    Mariia Holub

    2015-11-01

    Full Text Available The problem of researching the ecotourism certification processes in the world is very up-to-date nowadays. The relevance of the research is stipulated by current state of environ-mental pollutants, the development of sustainable politics implementation and the fact that now people aware of real danger of environmental catastrophe that threatens the survival of civilization. That’s why the purpose of the article is conducting a complex analysis of foreign ecotourism certi-fication programs. Moreover, it is necessary to study the evolution of ecotourism development to understand the key issues of this problem. The object of this article is the analysis of ecotourism certification worldwide. The subject of the article is the detection of theoretical, methodological and practical aspects of implementation of effective ecotourism certification programs in Ukraine. To clarify all aspects of studying this issue it is necessary to use such theoretical and methodological basis as: modern theories of the genesis and evolution of ecological tourism, logical and analogy analysis, historical method, hypothetical method, classification and graphical method. Using such methods it was found that the development of ecotourism formation has taking three evolutionary steps, which affected the creation of its definition. This fact reveals the classification of different types of sustainable tourism and provides an impetus of ecotourism certification studies. Moreover, it was identified that there is a logical regularity in ecotourism certification programs all over the world. As the result, it was found that practically all the ecotourism certification processes are functioning successfully nowadays. By the way, it can be observed the rapid increase in the amount of ecocertified companies. Moreover, the programs which were analyzed in this article were divided into several steps (depends on the ecotourism certification program following which a company can

  6. Section 608 Technician Certification

    Science.gov (United States)

    Certifications for technicians who maintain, service, repair, or dispose of equipment that could release ozone depleting refrigerants or, after January 1, 2018, substitute refrigerants into the atmosphere.

  7. Energy saving certificates

    International Nuclear Information System (INIS)

    2005-11-01

    The French ministry of economy, finances and industry and the French agency of environment and energy mastery (Ademe) have organized on November 8, 2005, a colloquium for the presentation of the energy saving certificates, a new tool to oblige the energy suppliers to encourage their clients to make energy savings. This document gathers the transparencies presented at this colloquium about the following topics: state-of-the-art and presentation of the energy saving certificates system: presentation of the EEC system, presentation of the EEC standard operations; the energy saving certificates in Europe today: energy efficiency commitment in UK, Italian white certificate scheme, perspectives of the different European systems. (J.S.)

  8. Medical Certification System -

    Data.gov (United States)

    Department of Transportation — Provides automated risk-based decision making capability in support of medical certification and clearances processing associated fees and supporting surveillance of...

  9. Teacher Certification: The Problem in the Pacific Northwest.

    Science.gov (United States)

    Leonard, Leo D.

    1985-01-01

    Teacher certification procedures in the Pacific Northwest are used to illustrate the kinds of problems facing the nation in terms of teacher certification and program accreditation. Proposals for change include: cooperation between public schools and universities; five year programs; and use of research to study the teacher education process. (DF)

  10. 40 CFR 104.12 - Certification of record.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Certification of record. 104.12 Section 104.12 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS PUBLIC... transcript his certificate stating that, to the best of his knowledge and belief, the transcript is a true...

  11. 22 CFR 61.3 - Certification and authentication criteria.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Certification and authentication criteria. 61.3 Section 61.3 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall...

  12. 7 CFR 714.46 - Certification for payment.

    Science.gov (United States)

    2010-01-01

    ... ERRONEOUSLY, ILLEGALLY, OR WRONGFULLY COLLECTED § 714.46 Certification for payment. An officer or employee of the Department of Agriculture authorized to certify public vouchers for payment shall, for and on... 7 Agriculture 7 2010-01-01 2010-01-01 false Certification for payment. 714.46 Section 714.46...

  13. 12 CFR 407.5 - Certification by General Counsel.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Certification by General Counsel. 407.5 Section 407.5 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES REGULATIONS GOVERNING PUBLIC OBSERVATION OF EX-IM BANK MEETINGS § 407.5 Certification by General Counsel. For every meeting closed pursuant...

  14. Assessment of Chain-of-Custody Certification in the Czech and Slovak Republic

    Directory of Open Access Journals (Sweden)

    Hubert Paluš

    2017-10-01

    Full Text Available Forest certification is a voluntary verification tool that has been gaining importance within the global sustainability issues as an independent verification tool for sustainable forest management and wood processing industry and as an influencer in private and public purchasing policies and a component of emerging wood harvesting and trade legality schemes. This study focuses on the chain-of-custody (CoC component of forest certification. A survey of CoC certified companies in the Czech Republic and Slovakia was carried out to explore the understanding of the concept and role of forest and CoC certification as an environmental, economic, and social tool. It aimed to determine expectations following from the implementation of CoC certification by companies and to identify difficulties in existing certified wood product supply chains and costs related to purchase and sales of certified forest products, respectively. Results indicate that respondents demonstrated a high level of understanding of the CoC concept and that they link forest certification mainly to the issues of legality, tracing the origin source of supply and promotion of sustainable utilisation of wood. The main expected benefits are linked to the improvement of an external company image followed by penetration of new markets and increase of sales volume. CoC is not considered a tool to improve internal company performance and efficiency. The key problems connected to certified supply chains relate to the sufficient quantity of certified forest products, low margins and overpriced certified material inputs. Respondents reported none or minimum price premiums for their certified products over non-certified alternatives. Several differences related to the understanding of the sustainable forest management concept and the level of price premium paid for certified inputs were identified between the PEFC (Programme for the Endorsement of Forest Certification and FSC (Forest Stewardship

  15. Death Certification Errors and the Effect on Mortality Statistics.

    Science.gov (United States)

    McGivern, Lauri; Shulman, Leanne; Carney, Jan K; Shapiro, Steven; Bundock, Elizabeth

    Errors in cause and manner of death on death certificates are common and affect families, mortality statistics, and public health research. The primary objective of this study was to characterize errors in the cause and manner of death on death certificates completed by non-Medical Examiners. A secondary objective was to determine the effects of errors on national mortality statistics. We retrospectively compared 601 death certificates completed between July 1, 2015, and January 31, 2016, from the Vermont Electronic Death Registration System with clinical summaries from medical records. Medical Examiners, blinded to original certificates, reviewed summaries, generated mock certificates, and compared mock certificates with original certificates. They then graded errors using a scale from 1 to 4 (higher numbers indicated increased impact on interpretation of the cause) to determine the prevalence of minor and major errors. They also compared International Classification of Diseases, 10th Revision (ICD-10) codes on original certificates with those on mock certificates. Of 601 original death certificates, 319 (53%) had errors; 305 (51%) had major errors; and 59 (10%) had minor errors. We found no significant differences by certifier type (physician vs nonphysician). We did find significant differences in major errors in place of death ( P statistics. Surveillance and certifier education must expand beyond local and state efforts. Simplifying and standardizing underlying literal text for cause of death may improve accuracy, decrease coding errors, and improve national mortality statistics.

  16. EAS Telecommunications Certification Bodies (TCB)

    Data.gov (United States)

    Federal Communications Commission — EAS (Equipment Authorization System). A Telecommunication Certification Body (TCB) is an accredited product certification body with the authority to issue Grants of...

  17. 1 CFR 3.3 - Reproduction and certification of copies of acts and documents.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Reproduction and certification of copies of... GENERAL SERVICES TO THE PUBLIC § 3.3 Reproduction and certification of copies of acts and documents. The... furnishing of reproductions of acts and documents and certificates of authentication for them. Section 1258...

  18. Converse Barrier Certificate Theorems

    DEFF Research Database (Denmark)

    Wisniewski, Rafael; Sloth, Christoffer

    2016-01-01

    This paper shows that a barrier certificate exists for any safe dynamical system. Specifically, we prove converse barrier certificate theorems for a class of structurally stable dynamical systems. Other authors have developed a related result by assuming that the dynamical system has neither...

  19. Integrating a Trust Framework with a Distributed Certificate Validation Scheme for MANETs

    Directory of Open Access Journals (Sweden)

    Marias Giannis F

    2006-01-01

    Full Text Available Many trust establishment solutions in mobile ad hoc networks (MANETs rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation. Ad hoc distributed OCSP for trust (ADOPT is a lightweight, distributed, on-demand scheme based on cached OCSP responses, which provides certificate status information to the nodes of a MANET. In this paper we discuss the ADOPT scheme and issues on its deployment over MANETs. We present some possible threats to ADOPT and suggest the use of a trust assessment and establishment framework, named ad hoc trust framework (ATF, to support ADOPT's robustness and efficiency. ADOPT is deployed as a trust-aware application that provides feedback to ATF, which calculates the trustworthiness of the peer nodes' functions and helps ADOPT to improve its performance by rapidly locating valid certificate status information. Moreover, we introduce the TrustSpan algorithm to reduce the overhead that ATF produces, and the TrustPath algorithm to identify and use trusted routes for propagating sensitive information, such as third parties' accusations. Simulation results show that ATF adds limited overhead compared to its efficiency in detecting and isolating malicious and selfish nodes. ADOPT's reliability is increased, since it can rapidly locate a legitimate response by using information provided by ATF.

  20. Research capacity and culture of the Victorian public health allied health workforce is influenced by key research support staff and location.

    Science.gov (United States)

    Williams, Cylie; Miyazaki, Koki; Borkowski, Donna; McKinstry, Carol; Cotchet, Matthew; Haines, Terry

    2015-06-01

    The aim of the present study was to identify and understand the self-rated research capacity and culture of the allied health workforce. METHODS. The present study was a cross-sectional survey. The Research Capacity and Culture tool was disseminated to all Victorian public health allied health departments. General demographic data were also collected, including the presence of an organisational allied health research lead. Five hundred and twenty fully completed surveys were returned by participants; all allied health disciplines and all grades were represented. One hundred and eighty-six participants had an organisational allied health research lead and 432 were located in a metropolitan-based health service. There were significant differences (P workforce identifies as a group that is ready to build the evidence to support clinical practice yet requires a whole-systems approach to do so. The results of the present study suggest that the development of key people to build capacity at a higher organisational level has a flow-down effect on research capacity and culture.

  1. Analysis of theoretical security level of PDF Encryption mechanism based on X.509 certificates

    Directory of Open Access Journals (Sweden)

    Joanna Dmitruk

    2017-12-01

    Full Text Available PDF Encryption is a content security mechanism developed and used by Adobe in their products. In this paper, we have checked a theoretical security level of a variant that uses public key infrastructure and X.509 certificates. We have described a basis of this mechanism and we have performed a simple security analysis. Then, we have showed possible tweaks and security improvements. At the end, we have given some recommendations that can improve security of a content secured with PDF Encryption based on X.509 certificates. Keywords: DRM, cryptography, security level, PDF Encryption, Adobe, X.509

  2. A robust certification service for highly dynamic MANET in emergency tasks

    DEFF Research Database (Denmark)

    Ge, M; Lam, K Y; Gollmann, Dieter

    2009-01-01

    In emergency tasks, cross-agency operations being carried out in disaster-hit areas require some supporting communication system for command and control. Mobile Ad hoc Network (MANET) is a very suitable way to meet such communication requirements since it can function without any pre......-installed communication infrastructure. Owing to potential threats in the field environment and the unique features of MANET (e.g. the open nature of wireless links and the absence of security infrastructure), security of communications over MANET is a serious issue that is typically addressed by asymmetric cryptographic...... public keys in our scenario. For issuance and/or revocation of mission-specific certificate, a Mission-specific Certificate Authority (MCA), which consists of a collection of server nodes to operate the threshold cryptographic scheme, is proposed. Furthermore, to cater for the occurrence of network...

  3. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  4. Employment certificates on HRT

    CERN Multimedia

    HR Department

    2008-01-01

    As part of the ongoing drive to simplify and streamline administrative procedures and processes, the IT and HR Departments have made employment certificates available on a self-service basis on the HRT application, in the main menu under "My self services". All members of the personnel can thus obtain a certificate of employment or association, in French or in English, for the present or past contractual period. The HR Department’s Records Office remains responsible for issuing any special certificates that might be required. IT-AIS (Administrative Information Services) HR-SPS (Services, Procedures & Social) Records Office – Tel. 73700

  5. Converse Barrier Certificate Theorem

    DEFF Research Database (Denmark)

    Wisniewski, Rafael; Sloth, Christoffer

    2013-01-01

    This paper presents a converse barrier certificate theorem for a generic dynamical system.We show that a barrier certificate exists for any safe dynamical system defined on a compact manifold. Other authors have developed a related result, by assuming that the dynamical system has no singular...... points in the considered subset of the state space. In this paper, we redefine the standard notion of safety to comply with generic dynamical systems with multiple singularities. Afterwards, we prove the converse barrier certificate theorem and illustrate the differences between ours and previous work...

  6. Intelligent policy making? Key actors' perspectives on the development and implementation of an early years' initiative in Scotland's public health arena.

    Science.gov (United States)

    Deas, L; Mattu, L; Gnich, W

    2013-11-01

    Increased political enthusiasm for evidence-based policy and action has re-ignited interest in the use of evidence within political and practitioner networks. Theories of evidence-based policy making and practice are being re-considered in an attempt to better understand the processes through which knowledge translation occurs. Understanding how policy develops, and practice results, has the potential to facilitate effective evidence use. Further knowledge of the factors which shape healthcare delivery and their influence in different contexts is needed. This paper explores the processes involved in the development of a complex intervention in Scotland's National Health Service (NHS). It uses a national oral health programme for children (Childsmile) as a case study, drawing upon key actors' perceptions of the influence of different drivers (research evidence, practitioner knowledge and values, policy, and political and local context) to programme development. Framework analysis is used to analyse stakeholder accounts from in-depth interviews. Documentary review is also undertaken. Findings suggest that Childsmile can be described as an 'evidence-informed' intervention, blending available research evidence with knowledge from practitioner experience and continual learning through evaluation, to plan delivery. The importance of context was underscored, in terms of the need to align with prevailing political ideology and in the facilitative strength of networks within the relatively small public health community in Scotland. Respondents' perceptions support several existing theoretical models of translation, however no single theory offered a comprehensive framework covering all aspects of the complex processes reported. Childsmile's use of best available evidence and on-going contribution to knowledge suggest that the programme is an example of intelligent policy making with international relevance. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. The content of the environmental certificate under the EC Directive on ecological audits

    International Nuclear Information System (INIS)

    Falk, H.; Nissen, U.

    1995-01-01

    The environmental certificate is a key item in the regulatory regime of the EC Directive on ecological audits: it represents the essential medium for the public relations activities of an enterprise, and is a major item of review by the environmental expert authorized to assess the environmental performance. The contribution discusses in great detail the definitions and requirements given as well as the room for maneuvre left to the enterprise in laying open and declaring its environmental performance. The article is intended on the one hand to clear up difficulties, and on the other to point to means of further concretization by either national or international standardization. (orig./DG) [de

  8. Green certificates causing inconvenience?

    International Nuclear Information System (INIS)

    Torgersen, Lasse

    2002-01-01

    From early 2002, producers of green energy in selected countries have been able to benefit from generous financial support in the Netherlands. Thus, there has been increased sale of green certificates from Norway and Sweden. But the condition that physical energy delivery should accompany the certificates has caused a marked rise in the price of energy in transit through Germany to the Netherlands. This article discusses the green certificate concept and the experience gained from the Netherlands. One conclusion is that if large-scale trade with green certificates is introduced in Europe without the condition of accompanying energy delivery, then producers of hydro-electric power in Norway and Sweden may be the losers

  9. Energetic certification in Europe

    International Nuclear Information System (INIS)

    1998-01-01

    At community level the problem of energy quality control in a building was introduced by EEC recommendation n. 93/76 in 1993. In this item are reported some notes on energetic certification in European countries [it

  10. Certification of support services

    International Nuclear Information System (INIS)

    Hroch, A.; Osusky, V.

    2006-01-01

    In this paper the process of certification of support services in the Slovenske elektrarne, a. s. is described. The nuclear power plants are also included into support services. Provisions and economic aspects of support services are discussed

  11. Renewable Energy Certificates (RECs)

    Science.gov (United States)

    Renewable Energy Certificates (RECs), are tradable, non-tangible energy commodities in the United States that represent proof that 1 megawatt-hour (MWh) of electricity was generated from an eligible renewable energy resource.

  12. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  13. Facility certification program for coal miners pneumoconiosis

    International Nuclear Information System (INIS)

    Trout, E.D.; Kelley, J.P.; Larson, V.L.; Herbert, G.L.

    1976-01-01

    Public Law 91-173, often referred to as the Black Lung Law, called for a chest radiograph of all active coal miners at stated intervals. The National Institute for Occupational Safety and Health was responsible for carrying out the provisions of the law. Among other requirements was a provision for certification of radiological facilities where radiological examinations would be provide. A test object to be radiographed by each such facility was designed and sent to those facilities applying for certification. To date, 284 facilities have applied for certification of which 215 have been approved. A record has been kept of the number of times any approved facility submitted radiographs before approval. A complete listing of the types of equipment used, personnel qualifications and other pertinent data will be reported

  14. Key Ingredients-Target Groups, Methods and Messages, and Evaluation-of Local-Level, Public Interventions to Counter Stigma and Discrimination: A Lived Experience Informed Selective Narrative Literature Review.

    Science.gov (United States)

    Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A

    2018-04-01

    A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.

  15. THE LAWFUL CONSEQUENCES OF BIRTH CERTIFICATE ON CHILDREN ABROGATION

    Directory of Open Access Journals (Sweden)

    Natasya Immanuela Sandjojo

    2017-12-01

    Full Text Available Research due to the law on the abrogation of birth certificates against children aims to know the effect of law affecting the child, as well as review of the determination and judgment in court that play a role in the birth certificate abrogation. This research describes the importance of birth certificate because of the low public awareness to perform birth registration. The study uses normative juridical research, which faces legal issues with the process of discovering legal rules, principles, and legal doctrines, with deductive methods, starting from the general thing and then generating specific and legitimate answers. Based on the results of the study, that the abrogation of birth certificate brings great lawful consequences for the child, especially the status and position of the child, as well as the right of alimentation,  which in this study included some examples of determination and court decision about the birth certificate abrogation.

  16. Certification renewal process of the American Board of Orthodontics.

    Science.gov (United States)

    Castelein, Paul T; DeLeon, Eladio; Dugoni, Steven A; Chung, Chun-Hsi; Tadlock, Larry P; Barone, Nicholas D; Kulbersh, Valmy P; Sabott, David G; Kastrop, Marvin C

    2015-05-01

    The American Board of Orthodontics was established in 1929 and is the oldest specialty board in dentistry. Its goal is to protect the public by ensuring competency through the certification of eligible orthodontists. Originally, applicants for certification submitted a thesis, 5 case reports, and a set of casts with appliances. Once granted, the certification never expired. Requirements have changed over the years. In 1950, 15 cases were required, and then 10 in 1987. The Board has continued to refine and improve the certification process. In 1998, certification became time limited, and a renewal process was initiated. The Board continues to improve the recertification process. Copyright © 2015 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.

  17. ENVIRONMENTAL MANAGEMENT SYSTEMS CERTIFICATION

    Directory of Open Access Journals (Sweden)

    Aniko Miler-Virc

    2012-12-01

    Full Text Available ISO 14001 prescribes the requirements for a system, not environmental performance itself. Similarly, certification is of the management system itself, not environmental performance. An audit is not conducted to ascertain whether your flue gas emissions are less than X part per million nitrous oxide or that your wastewater effluent contains less that Y milligrams of bacteria per litre. Consequently, the procces of auditing the system for compliance to the standard entails checking to see that all of the necessary components of a functioning system are present and working properly.           A company can have a complete and fully functional EMS as prescribed by ISO 14001 without being certified. As certification can add to the time and expense of EMS development, it is important for you to establish, in advance, whether certification is of net benefit to you. Although most companies that develop an EMS do in fact certify, there are cases where certification does not add immediate value. Certification is not always beneficial to small and medium sized companies. Certification is not always necessary for companies with one or two large clients with environmental demands who are satisfied that you have a functional EMS (second-party declaration. Whatever decision you make, it is important to remember that just as a driver′s licence does not automatically make you a good driver, ISO 14001 certification does not automatically make your company environmentally benign or ensure that you will continually improve environmental performance. The system is only as good as the people who operate it.

  18. DGNB Building Certification Companion

    DEFF Research Database (Denmark)

    Møller, Renate Skovgaard; Rhodes, Michael K.; Larsen, Tine Steen

    2017-01-01

    for sustainable buildings. The literature describes several barriers of entry preventing actors in the industry from seeking sustainability certifications and prioritizing design methods, supporting sustainability in greater numbers. In the newly developed tool, “DGNB building certification companion: Sustainable......-language, easily digestible summaries of various topics regarding sustainability and the DGNB certification scheme. The identified barriers are described in the tool followed by a solution to overcome them. The tool, tested at multiple stages of development and moulded by many individuals both within and outside...... was that this is a desired product on the market. This new approach is expected to dramatically reduce misunderstandings, conflicts, and mistakes during a sustainable design process, helping the design team plan a project to possibly obtain the highest DGNB score if desired and properly documented....

  19. DGNB BUILDING CERTIFICATION COMPANION

    DEFF Research Database (Denmark)

    Møller, Renate Skovgaard; Rhodes, Michael K.; Larsen, Tine Steen

    2018-01-01

    for sustainable buildings. The literature describes several barriers of entry preventing actors in the industry from seeking sustainability certifications and prioritizing design methods, supporting sustainability in greater numbers. In the newly developed tool, “DGNB building certification companion: Sustainable......-language, easily digestible summaries of various topics regarding sustainability and the DGNB certification scheme. The identified barriers are described in the tool followed by a solution to overcome them. The tool, tested at multiple stages of development and moulded by many individuals both within and outside...... was that this is a desired product on the market. This new approach is expected to dramatically reduce misunderstandings, conflicts, and mistakes during a sustainable design process, helping the design team plan a project to possibly obtain the highest DGNB score if desired and properly documented....

  20. Soy production and certification

    DEFF Research Database (Denmark)

    Tomei, Julia; Semino, Stella Maris; Paul, Helena

    2010-01-01

    With the rising emphasis on biofuels as a potential solution to climate change, this paper asks whether certification schemes, developed to promote sustainable feedstock production, are able to deliver genuine sustainability benefits. The Round Table on Responsible Soy (RTRS) is a certification...... the social and environmental impacts of soybean production can be mitigated by the RTRS. It concludes that at present certification schemes are unlikely to be able to address either the institutional challenges associated with their implementation or the detrimental impacts of the additional demand generated...... scheme that aims to promote responsible soy production through the development of principles and criteria. However, can and does this initiative address the negative impacts associated with the intensive production of soy? Taking the example of soy biodiesel produced in Argentina, this paper asks whether...

  1. A software product certification model

    NARCIS (Netherlands)

    Heck, P.M.; Klabbers, M.D.; van Eekelen, Marko

    2010-01-01

    Certification of software artifacts offers organizations more certainty and confidence about software. Certification of software helps software sales, acquisition, and can be used to certify legislative compliance or to achieve acceptable deliverables in outsourcing. In this article, we present a

  2. Biofuels and certification. A workshop at the Harvard Kennedy School of Government. Summary report

    Energy Technology Data Exchange (ETDEWEB)

    Devereaux, Charan; Lee, Henry

    2009-06-01

    both forests and food supplies from increased biofuel production is real, it is not clear that setting broad sustainability standards and then requiring sellers to certify that all of those standards have been met is the best way to address these interconnected problems. In particular, if too many standards and related certification requirements are put in place too soon, this could constrain the development of a global biofuels market. In contrast, certification targeted at a specific and limited set of problems and designed with the flexibility to adjust to changes in policies and programs can enhance the public's acceptance of the biofuel option while protecting key social and environmental goals. A second set of questions revolves around the locus of responsibility for certifying whether biofuel production meets sustainability targets. Should the biofuel processing firms, third parties, or governments be responsible for certifying the production of biofuels? This question also elicited significant discussion. While it could be easier to have individual country governments assume the certification of production responsibility, some governments may not have the capacity to implement an effective certification process. Production facilities that comply with international standards should not be kept out of the market because of their government's inability to manage the process. The possible contribution to effective certification of third party organizations or public-private partnerships should not be underestimated.

  3. About instrumental innovation. Energy saving certificates

    International Nuclear Information System (INIS)

    Baiz, Adam; Monnoyer-Smith, Laurence

    2016-09-01

    Energy saving certificates (in French CEE for certificats d'economie d'energie) have been implemented in 2006, and have proven to be a rather efficient tool of public policy, with a low cost, and a good social acceptability, notably due to its hybrid nature (incentive and coercive) in function of the targeted actors. Thus, this document addresses and discusses the interest of such instruments for the public environmental policy. It outlines that instruments tend to be always less coercive, and then comments the example of these energy saving certificates: brief presentation, discussion and explanation of their efficiency, multi-dimensional nature of this instrument, benefits of more or less coercive instruments depending on the actors (State, households, energy providers)

  4. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  5. Legal Consequences Of The Notarial Certification Of Transactions With The Land Plots

    Directory of Open Access Journals (Sweden)

    Veronika V. Lukina

    2014-06-01

    Full Text Available In the present article the legal consequences of the notarial certification with the land plots at the present stage are researched. Author considers purposes of the notarial certification as a key to increasing evidentiary force of the notarial act. Within a researched topic a draft of the Federal Law "On the notaries and notarial activity in Russian Federation" is analyzed. Author marks out that the certifying procedure has to giving to the notarial acts the legality presumptions and the reliability presumption. Special attention is paid to the analyses of the question of changes in the procedure of the state registration of rights for real estate and actions with it from February 1, 2014. For example the idea of refusal from legal examination of documents received for state registration under the notary certified contracts, which is directed on the avoidance of the public subject’s functions duplication during their activity conduct, rendering assistance in concern to the definition of their area of responsibility is discussed. Author emphasizes that state registration of rights for real estate and actions with it isn't capable to replace the notarial certificate of actions with land real estate as notary carries out those functions which the state registration can't execute, covering that stage of legal relationship emergence, that isn’t affected by the state registration.

  6. Tradable Earthquake Certificates

    NARCIS (Netherlands)

    Woerdman, Edwin; Dulleman, Minne

    2018-01-01

    This article presents a market-based idea to compensate for earthquake damage caused by the extraction of natural gas and applies it to the case of Groningen in the Netherlands. Earthquake certificates give homeowners a right to yearly compensation for both property damage and degradation of living

  7. Status of Forest Certification

    Science.gov (United States)

    Omar Espinoza; Urs Buehlmann; Michael Dockry

    2013-01-01

    Forest certification systems are voluntary, market-based initiatives to promote the sustainable use of forests. These standards assume that consumers prefer products made from materials grown in an environmentally sustainable fashion, and this in turn creates incentives for companies to adopt responsible environmental practices. One of the major reasons for the...

  8. Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Cebe, Mumin [Florida Intl Univ., Miami, FL (United States); Akkaya, Kemal [Florida Intl Univ., Miami, FL (United States)

    2017-07-19

    Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, key management becomes an issue due to overhead and limited resources. While using public-keys eliminate some of the overhead of key management, there is still challenges regarding certificates that store and certify the publickeys. In particular, distribution and storage of certificate revocation list (CRL) is major a challenge due to cost of distribution and storage in AMI networks which typically consist of wireless multi-hop networks. Motivated by the need of keeping the CRL distribution and storage cost effective and scalable, in this paper, we present a distributed CRL management model utilizing the idea of distributed hash trees (DHTs) from peer-to-peer (P2P) networks. The basic idea is to share the burden of storage of CRLs among all the smart meters by exploiting the meshing capability of the smart meters among each other. Thus, using DHTs not only reduces the space requirements for CRLs but also makes the CRL updates more convenient. We implemented this structure on ns-3 using IEEE 802.11s mesh standard as a model for AMI and demonstrated its superior performance with respect to traditional methods of CRL management through extensive simulations.

  9. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  10. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  11. BECSI: Bandwidth Efficient Certificate Status Information Distribution Mechanism for VANETs

    Directory of Open Access Journals (Sweden)

    Carlos Gañán

    2013-01-01

    Full Text Available Certificate revocation is a challenging task, especiallyin mobile network environments such as vehicular ad Hoc networks (VANETs.According to the IEEE 1609.2 security standard for VANETs, public keyinfrastructure (PKI will provide this functionality by means of certificate revocation lists (CRLs.When a certificate authority (CAneeds to revoke a certificate, itglobally distributes CRLs.Transmitting these lists pose a problem as they require high update frequencies and a lot of bandwidth. In this article, we propose BECSI, aBandwidth Efficient Certificate Status Informationmechanism to efficiently distributecertificate status information (CSI in VANETs.By means of Merkle hash trees (MHT, BECSI allowsto retrieve authenticated CSI not onlyfrom the infrastructure but also from vehicles actingas mobile repositories.Since these MHTs are significantly smaller than the CRLs, BECSIreduces the load on the CSI repositories and improves the response time for the vehicles.Additionally, BECSI improves the freshness of the CSIby combining the use of delta-CRLs with MHTs.Thus, vehicles that have cached the most current CRLcan download delta-CRLs to have a complete list of revoked certificates.Once a vehicle has the whole list of revoked certificates, it can act as mobile repository.

  12. Factoring RSA keys from certified smart cards : Coppersmith in the wild

    NARCIS (Netherlands)

    Bernstein, D.J.; Chang, Y.A.; Cheng, C.M.; Chou, L.P.; Heninger, N.; Lange, T.; Someren, van N.

    2013-01-01

    An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by government-issued smart cards that were certified secure. The certificates had all the usual buzzwords:

  13. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  14. Standards for Endovascular Neurosurgical Training and Certification of the Society of Korean Endovascular Neurosurgeons 2013

    Science.gov (United States)

    Shin, Dong-Seong; Park, Sukh-Que; Kang, Hyun-Seung; Yoon, Seok-Mann; Cho, Jae-Hoon; Lim, Dong-Jun; Baik, Min-Woo; Kwon, O Ki

    2014-01-01

    The need for standard endovascular neurosurgical (ENS) training programs and certification in Korea cannot be overlooked due to the increasing number of ENS specialists and the expanding ENS field. The Society of Korean Endovascular Neurosurgeons (SKEN) Certification Committee has prepared training programs and certification since 2010, and the first certificates were issued in 2013. A task force team (TFT) was organized in August 2010 to develop training programs and certification. TFT members researched programs and systems in other countries to develop a program that best suited Korea. After 2 years, a rough draft of the ENS training and certification regulations were prepared, and the standard training program title was decided. The SKEN Certification Committee made an official announcement about the certification program in March 2013. The final certification regulations comprised three major parts: certified endovascular neurosurgeons (EN), certified ENS institutions, and certified ENS training institutions. Applications have been evaluated and the results were announced in June 2013 as follows: 126 members received EN certification and 55 hospitals became ENS-certified institutions. The SKEN has established standard ENS training programs together with a certification system, and it is expected that they will advance the field of ENS to enhance public health and safety in Korea. PMID:24851145

  15. Key Theories from Critical Medical Anthropology for Public Health Research. Part II: Medicine in the Social System, Medicine as a Social System

    Directory of Open Access Journals (Sweden)

    Jennifer J. Carroll

    2014-06-01

    Full Text Available This article summarizes four significant theoretical concepts from the field of Critical Medical Anthropology in two parts: in the first part, biopower/discipline and explanatory models; in the second, structural violence, and identity politics and biological citizenship. The four subjects reviewed here have been chosen for their importance to our understanding of human behaviors related to health and illness, as well as for the impact that they can have on theory, research, and practice in the field of public health. These critical theories can provide new ways of thinking about professional roles, medical decisions, disease diagnosis and etiology, treatment adherence, prevention messaging, and all sorts of health-related behaviors and systems of understanding. They can also help public health researchers shed light on the human beliefs and activities that shape patterns of disease within and across populations. Whether a research question is being formulated or research findings are being analyzed, the critical social theories outlined here can foster a more holistic understanding of the human element in any public health project.

  16. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  17. Certification and beyond DINI open access activities in Germany

    CERN Multimedia

    CERN. Geneva; Scholze, Frank

    2005-01-01

    Local publication servers are common and at the same time highly fragmented in Germany. To bring them to greater success it is necessary to standardize further developments. DINI with its publication "Electronic Publishing in Higher Education" laid a foundation for a widespread introduction of general regulations and standards concerning electronic publishing and archiving of scientific documents in institutional repositories. The DINI-Certificate "Document and Publication Repositories" takes this a step further by clearly describing criteria, that will guarantee repositories to be set up and operated according to national standards and international developments. Repositories fulfilling these criteria may be awarded a certificate, testifying to their quality. The DINI certificate may also help their operators to market the institutional repository as a reliable service to support electronic publishing as well as self- archiving at their institution. In parallel to this quality of service activities DINI star...

  18. 40 CFR 745.90 - Renovator certification and dust sampling technician certification.

    Science.gov (United States)

    2010-07-01

    ... sampling technician certification. 745.90 Section 745.90 Protection of Environment ENVIRONMENTAL PROTECTION... technician certification. (a) Renovator certification and dust sampling technician certification. (1) To become a certified renovator or certified dust sampling technician, an individual must successfully...

  19. 78 FR 64153 - Direct Certification and Certification of Homeless, Migrant and Runaway Children for Free School...

    Science.gov (United States)

    2013-10-28

    ...-0001] RIN 0584-AD60 Direct Certification and Certification of Homeless, Migrant and Runaway Children... interim rule entitled Direct Certification and Certification of Homeless, Migrant and Runaway Children for...

  20. Green certificates and greenhouse gas emissions certificates - Instruments of the liberalized electricity market in Romania

    International Nuclear Information System (INIS)

    Matei, Magdalena; Salisteanu, Cornel; Enescu, Diana; Ene, Simona; Matei, Lucian; Marinescu, Mihai

    2006-01-01

    -based) world scheme with uniform participation are disappearing. We are now likely to see a wide range of schemes operating simultaneously. The impacts of these schemes principally are measured by compliance costs and emissions reductions. This will depend on participation levels in schemes; size of targets agreed to, opportunities for and levels of trading; linkages (trades) between the groups of traders. Actually, Romania has to transpose and to implement EU environmental legislation. A Governmental Decision project aiming to transpose the Directive 2003/87/CE into Romanian legislation was issued. The paper presents the main ideas of this GD. A big challenge for thermal power plants sector will be the future National Allocation Plan. The public central authority for environment protection will establish the total number of certificates for GHG emission and their allocation for each plants for one year period beginning with 1 January 2007, and for five years period beginning with 1 January 2008. The European Commission will review the IPPC Directive till the end of 2007, aiming to improve both the functioning of the Directive and its coherence and complementarity with other industrial emissions and market-based-instruments in this context. One project arousing concern and lively discussion within industry is the assessment of options to streamline legislation on industrial emissions and analysis of interaction between the Directive and a possible emissions trading scheme for SO 2 and NO x . A stakeholder hearing and public debate on the IPPC Directive review process are expected to take place in 2006. The Romanian actors on power market will face this new challenge and after green certificates market opening in 2005 and GHG emissions certificates market opening in 2007, the fourth parallel market could come into force

  1. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  2. Certification trails for data structures

    Science.gov (United States)

    Sullivan, Gregory F.; Masson, Gerald M.

    1993-01-01

    Certification trails are a recently introduced and promising approach to fault detection and fault tolerance. The applicability of the certification trail technique is significantly generalized. Previously, certification trails had to be customized to each algorithm application; trails appropriate to wide classes of algorithms were developed. These certification trails are based on common data-structure operations such as those carried out using these sets of operations such as those carried out using balanced binary trees and heaps. Any algorithms using these sets of operations can therefore employ the certification trail method to achieve software fault tolerance. To exemplify the scope of the generalization of the certification trail technique provided, constructions of trails for abstract data types such as priority queues and union-find structures are given. These trails are applicable to any data-structure implementation of the abstract data type. It is also shown that these ideals lead naturally to monitors for data-structure operations.

  3. Certificateless Public Auditing Protocol with Constant Verification Time

    Directory of Open Access Journals (Sweden)

    Dongmin Kim

    2017-01-01

    Full Text Available To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI, they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal security models and prove the security of our scheme under the three security models.

  4. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  5. 45 CFR 307.25 - Review and certification of computerized support enforcement systems.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HEALTH AND HUMAN SERVICES COMPUTERIZED SUPPORT ENFORCEMENT SYSTEMS § 307.25 Review and certification of computerized support enforcement systems. The Office will review, assess and inspect the... 45 Public Welfare 2 2010-10-01 2010-10-01 false Review and certification of computerized support...

  6. 75 FR 28276 - Agency Information Collection Activities: NAFTA Regulations and Certificate of Origin

    Science.gov (United States)

    2010-05-20

    ... Review: Revision. Affected Public: Businesses. Form 434, NAFTA Certificate of Origin: Estimated Number of... Activities: NAFTA Regulations and Certificate of Origin AGENCY: U.S. Customs and Border Protection... Homeland Security has submitted the following information collection request to the Office of Management...

  7. 47 CFR 73.4140 - Minority ownership; tax certificates and distress sales.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Minority ownership; tax certificates and distress sales. 73.4140 Section 73.4140 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Minority ownership; tax certificates and distress sales. (a) See Public Notice, FCC 78-322, dated May 25...

  8. COSPAS-SARSAT Beacon Certification Facility

    Data.gov (United States)

    Federal Laboratory Consortium — EPG's COSPAS-SARSAT Beacon Certification Facility is one of five certification facilities in the world. Formal certifications are available for all beacon types and...

  9. PULSE Pilot Certification Results

    Directory of Open Access Journals (Sweden)

    Pamela Pape-Lindstrom

    2015-08-01

    Full Text Available The pilot certification process is an ambitious, nationwide endeavor designed to motivate important changes in life sciences education that are in line with the recommendations of the 2011 Vision and Change Report: A Call to Action (American Association for the Advancement of Science [AAAS], 2011.  It is the goal of the certification process to acknowledge departments that have progressed towards full implementation of the tenets of Vision and Change and to motivate departments that have not begun to adopt the recommendations to consider doing so.  More than 70 life science departments applied to be part of the pilot certification process, funded by a National Science Foundation grant, and eight were selected based on initial evidence of transformed and innovative educational practices.  The programs chosen represent a wide variety of schools, including two-year colleges, liberal-arts institutions, regional comprehensive colleges, research universities and minority serving institutions.  Outcomes from this pilot were released June 1, 2015 (www.pulsecommunity.org, with all eight programs being recognized as having progressed along a continuum of change.  Five levels of achievement were defined as PULSE Pilot Progression Levels.  Of the eight departments in the pilot, one achieved “PULSE Progression Level III: Accomplished”.  Six departments achieved “PULSE Progression Level II: Developing” and one pilot department achieved “PULSE Progression Level I: Beginning”.  All of the schools have made significant movement towards the recommendations of Vision and Change relative to a traditional life sciences curriculum.  Overall, the response from the eight pilot schools has been positive. 

  10. Fair Trade Flowers: Global Certification, Environmental Sustainability, and Labor Standards

    Science.gov (United States)

    Raynolds, Laura T.

    2012-01-01

    This article analyzes the organization of the fair trade flower industry, integration of Ecuadorian enterprises into these networks, and power of certification to address key environmental and social concerns on participating estates. Pursuing a social regulatory approach, I locate fair trade within the field of new institutions that establish and…

  11. 78 FR 19413 - Listing of Color Additives Exempt From Certification; Reactive Blue 246 and Reactive Blue 247...

    Science.gov (United States)

    2013-04-01

    ... certification of these color additives is not necessary for the protection of the public health. IV. Public... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration 21 CFR Part 73 [Docket Nos. FDA-2011-C-0344 and FDA-2011-C-0463] Listing of Color Additives Exempt From Certification; Reactive...

  12. CERTIFICATION - The final and critical stage of every civil or military aviation program

    Directory of Open Access Journals (Sweden)

    Vasile STEFAN

    2012-06-01

    Full Text Available As a general rule the final step in every aviation program is the certification of the airplane, an important step in which the airplane, the engins and the equipments are checked by an authority or commission according to the airworthiness rules. The main scope of the certification is to promote a safe aviation product and to protect the general public from unnecessary risk. In all the contries the national authorieties require a civil certificability for all the parts or equipments and a full aircraft certification for a new or wholly modified airplane. The military aircrafts must pased and respond to a specific way of certification and many actual efforts are done in order to unify the diffrent national rules in this field. This paper presents the existing situation in the certification of civil and military airplans and the actual measures done for the unification of certification procedures in the world.

  13. Restaurant manager and worker food safety certification and knowledge.

    Science.gov (United States)

    Brown, Laura G; Le, Brenda; Wong, Melissa R; Reimann, David; Nicholas, David; Faw, Brenda; Davis, Ernestine; Selman, Carol A

    2014-11-01

    Over half of foodborne illness outbreaks occur in restaurants. To combat these outbreaks, many public health agencies require food safety certification for restaurant managers, and sometimes workers. Certification entails passing a food safety knowledge examination, which is typically preceded by food safety training. Current certification efforts are based on the assumption that certification leads to greater food safety knowledge. The Centers for Disease Control and Prevention conducted this study to examine the relationship between food safety knowledge and certification. We also examined the relationships between food safety knowledge and restaurant, manager, and worker characteristics. We interviewed managers (N=387) and workers (N=365) about their characteristics and assessed their food safety knowledge. Analyses showed that certified managers and workers had greater food safety knowledge than noncertified managers and workers. Additionally, managers and workers whose primary language was English had greater food safety knowledge than those whose primary language was not English. Other factors associated with greater food safety knowledge included working in a chain restaurant, working in a larger restaurant, having more experience, and having more duties. These findings indicate that certification improves food safety knowledge, and that complex relationships exist among restaurant, manager, and worker characteristics and food safety knowledge.

  14. Restaurant Manager and Worker Food Safety Certification and Knowledge

    Science.gov (United States)

    Brown, Laura G.; Le, Brenda; Wong, Melissa R.; Reimann, David; Nicholas, David; Faw, Brenda; Davis, Ernestine; Selman, Carol A.

    2017-01-01

    Over half of foodborne illness outbreaks occur in restaurants. To combat these outbreaks, many public health agencies require food safety certification for restaurant managers, and sometimes workers. Certification entails passing a food safety knowledge examination, which is typically preceded by food safety training. Current certification efforts are based on the assumption that certification leads to greater food safety knowledge. The Centers for Disease Control and Prevention conducted this study to examine the relationship between food safety knowledge and certification. We also examined the relationships between food safety knowledge and restaurant, manager, and worker characteristics. We interviewed managers (N = 387) and workers (N = 365) about their characteristics and assessed their food safety knowledge. Analyses showed that certified managers and workers had greater food safety knowledge than noncertified managers and workers. Additionally, managers and workers whose primary language was English had greater food safety knowledge than those whose primary language was not English. Other factors associated with greater food safety knowledge included working in a chain restaurant, working in a larger restaurant, having more experience, and having more duties. These findings indicate that certification improves food safety knowledge, and that complex relationships exist among restaurant, manager, and worker characteristics and food safety knowledge. PMID:25361386

  15. Research Participants' Understanding of and Reactions to Certificates of Confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Ammarell, Natalie

    2014-01-01

    Certificates of Confidentiality are intended to facilitate participation in critical public health research by protecting against forced disclosure of identifying data in legal proceedings, but little is known about the effect of Certificate descriptions in consent forms. To gain preliminary insights, we conducted qualitative interviews with 50 HIV-positive individuals in Durham, North Carolina to explore their subjective understanding of Certificate descriptions and whether their reactions differed based on receiving a standard versus simplified description. Most interviewees were neither reassured nor alarmed by Certificate information, and most said it would not influence their willingness to participate or provide truthful information. However, compared with those receiving the simplified description, more who read the standard description said it raised new concerns, that their likelihood of participating would be lower, and that they might be less forthcoming. Most interviewees said they found the Certificate description clear, but standard-group participants often found particular words and phrases confusing, while simplified-group participants more often questioned the information's substance. Valid informed consent requires comprehension and voluntariness. Our findings highlight the importance of developing consent descriptions of Certificates and other confidentiality protections that are simple and accurate. These qualitative results provide rich detail to inform a larger, quantitative study that would permit further rigorous comparisons.

  16. Emergency Teacher Certification. ERIC Digest.

    Science.gov (United States)

    Ashburn, Elizabeth A.

    Emergency certification involves the issuance of teaching licenses to individuals who have not completed a traditional college or university teacher education program. This two-page information review examines the problems arising from emergency certification and its relationship to student achievement. Some alternatives to emergency certification…

  17. Personnel training and certification

    International Nuclear Information System (INIS)

    Whittemore, W.L.

    1976-01-01

    In order to make the full benefits of neutron radiography available in the nondestructive test (NDT) field, it has been necessary to formalize its application. A group under the Penetrating Radiation Committee of the American Society for Nondestructive Testing (ASNT) was organized to prepare a recommended practice for neutron radiography. The recommended practices require the establishment of an appropriate certification program. The requirements on the employer to establish and maintain a qualification and certification program are outlined. To conduct a program of nondestructive testing using neutron radiography requires the usual three levels of qualified and certified personnel. The program is administered by a Level III person. Routine exposure, reviews, and reporting of test results are the responsibilities of Level I and Level II personnal. The amount of training and nature of the required practical examination are also specified. The recommended practices document assures users that NDT work in the field of neutron radiography is performed by qualified personnel. Although no training courses are available to provide experience in the depth required by the recommended practices document, SNT-TC-1A, short courses are provided at a number of locations to familarize user's representatives with the interpretation of neutron radiographs and capabilities and limitations of the technique

  18. 24 CFR 891.545 - Completion of project, cost certification, and HUD approvals.

    Science.gov (United States)

    2010-04-01

    ... Public Accountant or independent public accountant acceptable to the field office. (3) In the case of.... The simplified cost certification shall be verified by an independent Certified Public Accountant or an independent public accountant in a manner acceptable to the Secretary. (d) If the Borrower's...

  19. NASA's EOSDIS, Trust and Certification

    Science.gov (United States)

    Ramapriyan, H. K.

    2017-01-01

    NASA's Earth Observing System Data and Information System (EOSDIS) has been in operation since August 1994, managing most of NASA's Earth science data from satellites, airborne sensors, filed campaigns and other activities. Having been designated by the Federal Government as a project responsible for production, archiving and distribution of these data through its Distributed Active Archive Centers (DAACs), the Earth Science Data and Information System Project (ESDIS) is responsible for EOSDIS, and is legally bound by the Office of Management and Budgets circular A-130, the Federal Records Act. It must follow the regulations of the National Institute of Standards and Technologies (NIST) and National Archive and Records Administration (NARA). It must also follow the NASA Procedural Requirement 7120.5 (NASA Space Flight Program and Project Management). All these ensure that the data centers managed by ESDIS are trustworthy from the point of view of efficient and effective operations as well as preservation of valuable data from NASA's missions. Additional factors contributing to this trust are an extensive set of internal and external reviews throughout the history of EOSDIS starting in the early 1990s. Many of these reviews have involved external groups of scientific and technological experts. Also, independent annual surveys of user satisfaction that measure and publish the American Customer Satisfaction Index (ACSI), where EOSDIS has scored consistently high marks since 2004, provide an additional measure of trustworthiness. In addition, through an effort initiated in 2012 at the request of NASA HQ, the ESDIS Project and 10 of 12 DAACs have been certified by the International Council for Science (ICSU) World Data System (WDS) and are members of the ICSUWDS. This presentation addresses questions such as pros and cons of the certification process, key outcomes and next steps regarding certification. Recently, the ICSUWDS and Data Seal of Approval (DSA) organizations

  20. Continuous training and certification in neonatal resuscitation in remote areas using a multi-platform information and communication technology intervention, compared to standard training: A randomized cluster trial study protocol [version 3; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Carlos Alberto Delgado

    2018-03-01

    Full Text Available Background: About 10% of all newborns may have difficulty breathing and require support by trained personnel. In Peru, 90% of deliveries occur in health facilities. However, there is not a national neonatal resuscitation and certification program for the public health sector. In addition, the Andes and the Amazon regions concentrate large rural remote areas, which further limit the implementation of training programs and the accomplishment of continuous certification. Neonatal resuscitation training through the use of information, communication and technology (ICT tools running on computers, tablets or mobile phones, may overcome such limitations. This strategy allows online and offline access to educational resources, paving the way to more frequent and efficient training and certification processes. Objective: To evaluate the effects of a neonatal resuscitation training and certification program that uses a multi-platform ICT (MP-ICT strategy on neonatal health care in remote areas. Methods: We propose to conduct the study through a cluster-randomized trial, where the study and analysis unit is the health care facility. Eligible facilities will include primary and secondary health care level facilities that are located in provinces with neonatal mortality rates higher than 15 per 1,000 live births. We will compare the proportion of newborns with a heart rate ≥100 beats per minute at two minutes after birth in health care facilities that receive MP-ICT training and certification implementation, with those that receive standard training and certification. Discussion: We expect that the intervention will be shown as more effective than the current standard of care. We are prepared to include it within a national neonatal resuscitation training and certification program to be implemented at national scale together with policymakers and other key stakeholders.  Trial registration: ClinicalTrials.gov Nº NCT03210194  Status of the study: This

  1. Victorian Certificate of Education: Mathematics, Science and Gender

    Science.gov (United States)

    Cox, Peter J.; Leder, Gilah C.; Forgasz, Helen J.

    2004-01-01

    Gender differences in participation and performance at "high stakes" examinations have received much public attention, which has often focused on mathematics and science subjects. This paper describes the innovative forms of assessment introduced into mathematics and science subjects within the Victorian Certificate of Education (VCE)…

  2. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  3. Recent developments of biofuels/bioenergy sustainability certification: A global overview

    International Nuclear Information System (INIS)

    Scarlat, Nicolae; Dallemand, Jean-Francois

    2011-01-01

    The objective of this paper is to provide a review on the latest developments on the main initiatives and approaches for the sustainability certification for biofuels and/or bioenergy. A large number of national and international initiatives lately experienced rapid development in the view of the biofuels and bioenergy targets announced in the European Union, United States and other countries worldwide. The main certification initiatives are analysed in detail, including certification schemes for crops used as feedstock for biofuels, the various initiatives in the European Union, United States and globally, to cover biofuels and/or biofuels production and use. Finally, the possible way forward for biofuel certification is discussed. Certification has the potential to influence positively direct environmental and social impact of bioenergy production. Key recommendations to ensure sustainability of biofuels/bioenergy through certification include the need of an international approach and further harmonisation, combined with additional measures for global monitoring and control. The effects of biofuels/bioenergy production on indirect land use change (ILUC) is still very uncertain; addressing the unwanted ILUC requires sustainable land use planning and adequate monitoring tools such as remote sensing, regardless of the end-use of the product. - Research highlights: → There is little harmonisation between certification initiatives. → Certification alone is probably not able to avoid certain indirect effects. → Sustainability standards should be applied globally to all agricultural commodities. → A critical issue to certification is implementation and verification. → Monitoring and control of land use changes through remote sensing are needed.

  4. Directory of certificates of compliance for radioactive materials packages. Certificates of compliance. Volume 2. Revision 9

    International Nuclear Information System (INIS)

    1986-10-01

    This directory contains a Summary Report of NRC Approved Packages (Volume 1). Certificates of Compliance (Volume 2), and a Summary Report of NRC Approved Quality Assurance Programs for Radioactive Material Packages (Volumes 3). The purpose of this directory is make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance number is included at the back of each volume of the directory. The Summary Report includes a listing of all users of each package design prior to the publication date of the directory. Shipments of radioactive material utilizing these packagings must be in accordance with the provisions of 49 CFR 173.471 and 10 CFR Part 71, as applicable. In satisfying the requirements of Section 71.12, it is the responsibility of the licensees to insure them that they have a copy of the current approval and conduct their transportation activities in accordance with an NRC approved quality assurance program. Copies of the current approval may be obtained from the US Nuclear Regulatory Commission Public Document Room files (see Docket No. listed on each certificate) at 1717 H Street, Washington, DC 20555. Note that the general license of 10 CFR 71.12 does not authorize the receipt, possession, use or transfer of byproduct source, or special nuclear material; such authorization must be obtained pursuant to 10 CFR 30 to 36, 40, 50, or 70

  5. Directory of Certificates of Compliance for Radioactive Materials Packages. Certificates of Compliance. Volume 2, Revision 8

    International Nuclear Information System (INIS)

    1985-10-01

    This directory contains a Summary Report of NRC Approved Packages (Volume 1), Certificates of Compliance (Volume 2), and a Summary Report of NRC Approved Quality Assurance Programs for Radioactive Material Packages (Volume 3). The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance number is included at the back of each volume of the directory. The Summary Report includes a listing of all users of each package design prior to the publication date of the directory. Shipments of radioactive material utilizing these packagings must be in accordance with the provisions of 49 CFR 173.471 and 10 CFR Part 71, as applicable. In satisfying the requirements of Section 71.12, it is the responsibility of the licensees to insure them that they have a copy of the current approval and conduct their transportation activities in accordance with an NRC approved quality assurance program. Copies of the current approval may be obtained from the US Nuclear Regulatory Commission Public Document Room files (see Docket No. listed on each certificate) at 1717 H Street, Washington, DC 20555. Note that the general license of 10 CFR 71.12 does not authorize the receipt, possession, use or transfer of byproduct source, or special nuclear material; such authorization must be obtained pursuant to 10 CFR Parts 30 to 36, 40, 50, or 70

  6. Directory of certificates of compliance for radioactive materials packages: certificates of compliance. Volume 2, Revision 7

    International Nuclear Information System (INIS)

    1984-11-01

    This directory contains a Summary Report of NRC Approved Packages (Volume 1), Certificates of Compliance (Volume 2), and a Summary Report of NRC Approved Quality Assurance Programs for Radioactive Material Packages (Volume 3). The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance number is included at the back of each volume of the directory. The Summary Report includes a listing of all users of each package design prior to the publication date of the directory. Shipments of radioactive material utilizing these packagings must be in accordance with the provisions of 49 CFR 173.471 and 10 CFR Part 71, as applicable. In satisfying the requirements of Section 71.12, it is the responsibility of the licensees to insure that they have a copy of the current approval and conduct their transportation activities in accordance with an NRC approved quality assurance program. Copies of the current approval may be obtained from the US Nuclear Regulatory Commission Public Document Room files (see Docket No. listed on each certificate) at 1717 H Street, Washington, DC 20555. Note the general license of 10 CFR 71.12 does not authorize the receipt, possession, use or transfer of byproduct source, or special nuclear material; such authorization must be obtained pursuant to 10 CFR Parts 30 to 36, 40, 50, or 70

  7. Renewable Energy Certificate Program

    Energy Technology Data Exchange (ETDEWEB)

    Gwendolyn S. Andersen

    2012-07-17

    This project was primarily to develop and implement a curriculum which will train undergraduate and graduate students at the University seeking a degree as well as training for enrollees in a special certification program to prepare individuals to be employed in a broad range of occupations in the field of renewable energy and energy conservation. Curriculum development was by teams of Saint Francis University Faculty in the Business Administration and Science Departments and industry experts. Students seeking undergraduate and graduate degrees are able to enroll in courses offered within these departments which will combine theory and hands-on training in the various elements of wind power development. For example, the business department curriculum areas include economic modeling, finance, contracting, etc. The science areas include meteorology, energy conversion and projection, species identification, habitat protection, field data collection and analysis, etc.

  8. Certification of UAW/Ford thermographers

    Science.gov (United States)

    Barth, Ken; Spring, Robert W.

    2000-03-01

    Ford Motor Company has been using infrared thermography in the maintenance of its production facilities for more than fifteen years. It has proven to be a key tool, which has helped the company continuously achieved high standards of production quality by using a work force trained with the essential technical skills. Many early successes in thermography provided an environment in which expansion of the program could occur. A group of key Ford and United Auto Workers personnel was formed to promote the use of infrared technology to help meet worldwide quality standards. The committee also addressed the need for standardized training, qualification, and certification. The program that has evolved, which is based on the qualification and certification standards of the American Society for Nondestructive Testing, is a strong partnership created between the UAW-Ford National Programs Center, UAW and Ford Motor Company with assistance from an outside training contractor. The paper will detail the experiences of establishing the program, the lessons that have been learned in the problem solving process, and the costs and benefits of the solutions that were developed.

  9. 40 CFR 745.89 - Firm certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Firm certification. 745.89 Section 745... § 745.89 Firm certification. (a) Initial certification. (1) Firms that perform renovations for compensation must apply to EPA for certification to perform renovations or dust sampling. To apply, a firm must...

  10. 7 CFR 205.404 - Granting certification.

    Science.gov (United States)

    2010-01-01

    ... PROVISIONS NATIONAL ORGANIC PROGRAM Certification § 205.404 Granting certification. (a) Within a reasonable... certified operation; (2) Effective date of certification; (3) Categories of organic operation, including... operation's organic certification continues in effect until surrendered by the organic operation or...

  11. Energy saving certificates. Gear up for three years... and more

    International Nuclear Information System (INIS)

    Signoret, Stephane; Petitot, Pauline; Zebboudj, Idir; Kim, Caroline; Mary, Olivier; De Santis, Audrey

    2015-01-01

    As the third period of Energy Saving Certificates (EEC) enter their third period, a first article comments the evolutions of the principles and modalities of this arrangement under the influence of the directive on energy efficiency, and how the involved actors cope with these evolutions. The main differences with the previous period are presented. They concern energy providers and eligible bodies, the level of 'cumac' KWh (cumac stands for cumulated and actualised), controls and sanctions, eligible operations, and modalities. A second article describes how the arrangement has been simplified by means of a declarative system, and outlines that the control has been strengthened and may lead to heavy sanctions. The next articles comment the consequences for the building sector, notably for thermal insulation, the implications for communities (notably for the development of the use of LEDs for public lighting and for heat networks), for the transport sector (fuel dealers, good transport optimisation programs, fossil energy saving in logistic and mobility programs), and for the agriculture sector. Some key figures related to the second period (January 2011 - December 2014) are given: number of supplied cumac KWh, distribution of EECs among sectors, evolution of the weighted monthly average price of EECs

  12. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  13. Directory of certificates of compliance for radioactive materials packages, Certificates of compliance

    International Nuclear Information System (INIS)

    1990-10-01

    This directory contains a Report of the US Nuclear Regulatory Commissions's Approved Packages (Volume 1), Certificates of Compliance (Volume 2), and a Report of NRC Approved Quality Assurance Programs (Volume 3) for Radioactive Materials Packages effective October 1, 1990. The purpose of this directory is to make available a convenient source of information on packaging which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volume 2 of the directory. A listing by packaging types is included in the back of Volume 2. An alphabetical listing by Company name is included in the back of Volume 3 for approved QA programs. The Reports include a listing of all users of easy package design and approved QA programs prior to the publication date of the directory

  14. Directory of Certificates of Compliance for Radioactive Materials Packages: Certificates of Compliance

    International Nuclear Information System (INIS)

    1988-12-01

    This directory contains a Report of the US Nuclear Regulatory Commission's Approved Packages (Volume 1), all Certificates of Compliance (Volume 2), and a Report of NRC Approved Quality Assurance Programs (Volume 3) for Radioactive Material Packages effective October 1, 1988. The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volume 2 of the directory. A listing by packaging types is included in the back of Volume 2. An alphabetical listing by Company name is included in the back of Volume 3 for approved QA programs. The Reports include a listing of all users of each package design and approved QA programs prior to the publication date of the directory

  15. Directory of Certificates of Compliance for Radioactive-Materials Packages. Certificates of Compliance

    International Nuclear Information System (INIS)

    1983-01-01

    This directory contains a Summary Report of the US Nuclear Regulatory Commission's Approved Packages (Volume I), all Certificates of Compliance (Volume 2), and Summary Report of NRC Approved Quality Assurance Programs (Volume 3) for Radioactive Material Packages effective December 31, 1982. The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the back of Volumes 1 and 2 of the directory. A listing by packaging types is included in the back of Volume 2. An alphabetical listing by Company name is included in the back of Volume 3 for approved QA programs. The Summary Reports include a listing of all users of each package design and approved QA programs prior to the publication date of the directory

  16. Emerging Markets for Renewable Energy Certificates: Opportunities and Challenges

    Energy Technology Data Exchange (ETDEWEB)

    Holt, E.; Bird, L.

    2005-01-01

    Renewable energy certificates (RECs) represent the attributes of electricity generated from renewable energy sources. These attributes are unbundled from the physical electricity, and the two products-the attributes embodied in the certificates and the commodity electricity-may be sold or traded separately. RECs are quickly becoming the currency of renewable energy markets because of their flexibility and the fact that they are not subject to the geographic and physical limitations of commodity electricity. RECs are currently used by utilities and marketers to supply renewable energy products to end-use customers as well as to demonstrate compliance with regulatory requirements, such as renewable energy mandates. The purpose of this report is to describe and analyze the emerging market for renewable energy certificates. It describes how RECs are marketed, examines RECs markets including scope and prices, and identifies and describes the key challenges facing the growth and success of RECs markets.

  17. Preserving the Legitimacy of Board Certification.

    Science.gov (United States)

    Hanemann, Michael S; Wall, Holly C; Dean, John A

    2017-06-01

    The aims of this discussion were to inform the medical community about the American Board of Cosmetic Surgery's ongoing attempts in Louisiana to achieve equivalency to American Board of Medical Specialties (ABMS) member boards so that its diplomates may use the term "board certified" in advertising and to ensure public safety by upholding the standards for medical board certification. In 2011, Louisiana passed a truth in medical advertising law, which was intended to protect the public by prohibiting the use of the term "board certified" by improperly credentialed physicians. An American Board of Cosmetic Surgery diplomate petitioned the Louisiana State Board of Medical Examiners to approve a rule that would establish a pathway to equivalency for non-ABMS member boards, whose diplomates have not completed training approved by the Accreditation Council for Graduate Medical Education (ACGME) in the specialty they are certifying. Physicians and physician organizations representing multiple specialties (facial plastic and reconstructive surgery, otolaryngology [head and neck surgery], orthopedic spine surgery, pediatric neurosurgery, dermatology, and plastic surgery) urged the Louisiana State Board of Medical Examiners to clarify its advertising policy, limiting the use of the term "board certified" to physicians who have completed ACGME-approved training in the specialty or subspecialty named in the certificate. The public equates the term "board certified" with the highest level of expertise in a medical specialty. When a certifying board does not require completion of ACGME or American Osteopathic Association (AOA)-accredited training in the specialty it certifies, the result is an unacceptable degree of variability in the education and training standards applied to its diplomates. Independent, third-party oversight of certifying boards and training programs is necessary to ensure quality standards are upheld. Any system that assesses a non-ABMS member or non

  18. An exploratory assessment of the attitudes of Chinese wood products manufacturers towards forest certification.

    Science.gov (United States)

    Chen, Juan; Innes, John L; Kozak, Robert A

    2011-11-01

    Interviews with Chinese forest products manufacturers were conducted to explore their attitudes towards forest certification and related issues. Participants comprised owners, CEOs, and managers in 20 Chinese wood products companies, including producers of furniture, doors, flooring, and various engineered wood products. The interviews were used to analyze the extent to which participants were considering adopting forest certification and what might motivate such a decision. This was done by assessing their awareness and knowledge of certification. The results indicated that participants' understanding of forest certification was extremely low, despite major efforts in China to raise awareness of the issue. Potential economic benefits were the most frequently cited reason to adopt certification, including gaining or maintaining competitive advantage over their industry counterparts, improved access to both domestic and export markets, better customer recognition, and enhanced corporate responsibility practices. Some interviewees (3 out of 20) considered that certification would become a mandatory requirement or industry standard, and that this would be the only viable motivation for certification given that the financial benefits were potentially limited. According to the participants, the main differences between certified and uncertified wood products operations related to improved market access and public image. Interviewees felt that cooperation between and support from governments and the forest industry would enable the enhanced awareness of certification amongst manufacturers and the general public. This, in turn, could serve to stimulate demand for certified products. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. New public key cryptosystem based on quaternions

    Science.gov (United States)

    Durcheva, Mariana; Karailiev, Kristian

    2017-12-01

    Quaternions are not commonly used in cryptography. Nevertheless, the noncommutativity of their multiplication makes them suitable for cryptographic purposes. In this paper we suggest a Diffie-Hellman like cryptosystem based on the the quaternions. Additionally, a computer realization of the protocol is given.

  20. The NTE and Teacher Certification

    Science.gov (United States)

    McDaniel, Thomas R.

    1977-01-01

    Although in U.S. v. State of South Carolina the Court has established important guidelines legitimating the use of validated National Teacher Examination scores in the certification of teachers, some problems and questions remain. (Author/IRT)

  1. Comparing Sustainable Forest Management Certifications Standards: A Meta-analysis

    Directory of Open Access Journals (Sweden)

    Michael Rawson. Clark

    2011-03-01

    Full Text Available To solve problems caused by conventional forest management, forest certification has emerged as a driver of sustainable forest management. Several sustainable forest management certification systems exist, including the Forest Stewardship Council and those endorsed by the Programme for the Endorsement of Forest Certification, such as the Canadian Standards Association - Sustainable Forestry Management Standard CAN/CSA - Z809 and Sustainable Forestry Initiative. For consumers to use certified products to meet their own sustainability goals, they must have an understanding of the effectiveness of different certification systems. To understand the relative performance of three systems, we determined: (1 the criteria used to compare the Forest Stewardship Council, Canadian Standards Association - Sustainable Forestry Management, and Sustainable Forestry Initiative, (2 if consensus exists regarding their ability to achieve sustainability goals, and (3 what research gaps must be filled to improve our understanding of how forest certification systems affect sustainable forest management. We conducted a qualitative meta-analysis of 26 grey literature references (books, industry and nongovernmental organization publications and 9 primary literature references (articles in peer-reviewed academic journals that compared at least two of the aforementioned certification systems. The Forest Stewardship Council was the highest performer for ecological health and social sustainable forest management criteria. The Canadian Standards Association - Sustainable Forestry Management and Sustainable Forestry Initiative performed best under sustainable forest management criteria of forest productivity and economic longevity of a firm. Sixty-two percent of analyses were comparisons of the wording of certification system principles or criteria; 34% were surveys of foresters or consumers. An important caveat to these results is that only one comparison was based on

  2. Scenarios of application of energy certification procedure for residential buildings in Lebanon

    International Nuclear Information System (INIS)

    Cantin, R.; Mourtada, A.; Guarracino, G.; Adra, N.; Nasser, M.; Maamari, F.

    2007-01-01

    This paper describes the results of a French-Lebanese scientific cooperation, between 2001 and 2005, about 'Rational use of energy in the residential buildings in Lebanon and adaptation of an energy certification procedure'. The aim of this project is to promote the energy efficiency in the existing residential buildings in Lebanon, using an energy certification procedure, and to evaluate the energy certification foresight with prospective methods. The paper first describes an energy investigation in Lebanese residential buildings, and the energy certification procedure. It presents the foresight methodology implemented to identify the key variables and the actors. Finally, the paper exposes the morphological method which allows to elaborate three scenarios of energy performance certification. These scenarios are presented in order to provide a decision making for the actors of the Lebanese energy policy

  3. Developing an interdisciplinary certificate program in transportation planning, phase 2 : the eCertificate.

    Science.gov (United States)

    2011-11-01

    This proposal extends the delivery of the recently developed graduate Certificate in Transportation : Planning to a wider audience through the establishment of an Executive Certificate Program by distance : (eCertificate). While the need for an inter...

  4. An Authenticated Key Agreement Scheme Based on Cyclic Automorphism Subgroups of Random Orders

    Directory of Open Access Journals (Sweden)

    Yang Jun

    2017-01-01

    Full Text Available Group-based cryptography is viewed as a modern cryptographic candidate solution to blocking quantum computer attacks, and key exchange protocols on the Internet are one of the primitives to ensure the security of communication. In 2016 Habeeb et al proposed a “textbook” key exchange protocol based on the semidirect product of two groups, which is insecure for use in real-world applications. In this paper, after discarding the unnecessary disguising notion of semidirect product in the protocol, we establish a simplified yet enhanced authenticated key agreement scheme based on cyclic automorphism subgroups of random orders by making hybrid use of certificates and symmetric-key encryption as challenge-and-responses in the public-key setting. Its passive security is formally analyzed, which is relative to the cryptographic hardness assumption of a computational number-theoretic problem. Cryptanalysis of this scheme shows that it is secure against the intruder-in-the-middle attack even in the worst case of compromising the signatures, and provides explicit key confirmation to both parties.

  5. 45 CFR 1160.11 - Certification of claim and amount of loss to the Congress.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Certification of claim and amount of loss to the Congress. 1160.11 Section 1160.11 Public Welfare Regulations Relating to Public Welfare (Continued... the Congress. Upon receipt of a claim of total loss or a claim in which the Council is in agreement...

  6. System certification: An alternative to package certification?

    International Nuclear Information System (INIS)

    Luna, R.E.; Jefferson, R.J.

    1991-01-01

    One precept of the current radioactive material transportation regulations is that the package is the primary protection for the public. A packaging is chosen to provide containment, shielding, and criticality control suitable to the quantity and characteristics of the radionuclide being transported. Occasionally, radioactive materials requiring transport are not of a mass or size that would allow the materials to be shipped in an appropriate packaging. Where the shipment to be made is relatively infrequent, there may be economic and time penalties that may hamper shipment or force the shipper into uneconomic or high risk options. However, there is recognition of such situations in the International Atomic Energy Agency (IAEA) regulations under the provisions for Special Arrangement. The principal paragraphs defining Special Arrangement in Regulations for the Safe of Radioactive Material; Safety Series 6 (SS6) [IAEA, 1990a] are 141, 211, 720, and 727. In the US regulations the applicable term is ''Exemption.'' An exemption is obtained from either the United States Department of Transportation (USDOT) or the United States Nuclear Regulatory Commission (USNRC) depending on the character of the needed exemption. The essential concept is that some requirements of the regulations that apply in a given situation are not required if the shipment is subjected to other operational controls that provide an equivalent level of risk to that attained if the regulations were observed fully. This paper deals primarily with changing of packaging requirements in Special Arrangements, but it is also true that operational requirements also may be changed as a result of an Exemption or Special Arrangement approval by a regulatory authority

  7. 45 CFR 170.457 - Authorized testing and certification methods.

    Science.gov (United States)

    2010-10-01

    ... TECHNOLOGY HEALTH INFORMATION TECHNOLOGY STANDARDS, IMPLEMENTATION SPECIFICATIONS, AND CERTIFICATION CRITERIA AND CERTIFICATION PROGRAMS FOR HEALTH INFORMATION TECHNOLOGY Temporary Certification Program for HIT...

  8. Agricultural Producer Certificates

    Data.gov (United States)

    Montgomery County of Maryland — A Certified Agricultural Producer, or representative thereof, is an individual who wishes to sell regionally-grown products in the public right-of-way. A Certified...

  9. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  10. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  11. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  12. Research and Rhetoric on Teacher Certification

    Directory of Open Access Journals (Sweden)

    Linda Darling-Hammond

    2002-09-01

    Full Text Available In October, 2001, the Baltimore-based Abell Foundation issued a report purporting to prove that there is "no credible research that supports the use of teacher certification as a regulatory barrier to teaching" and urging the discontinuation of certification in Maryland. The report argued that large inequities in access to certified teachers for poor and minority students are not a problem because research linking teacher education to student achievement is flawed. In July, 2002, the U.S. Secretary of Education cited the Abell Foundation paper in his Annual Report on Teacher Quality as the sole source for concluding that teacher education does not contribute to teacher effectiveness. The Secretary's report then recommended that requirements for education coursework be eliminated from certification standards, and attendance at schools of education and student teaching be made optional. This article documents the many inaccuracies in the Abell Foundation paper and describes the actual findings of many of the studies it purports to review, as well as the findings of other studies it ignores. It details misrepresentations of a number of studies, including inaccurate statements about their methods and findings, false claims about their authors' views, and distortions of their data and conclusions. The article addresses methodological issues regarding the validity and interpretation of research. Finally, the article presents data challenging the Abell Foundation's unfounded claims that uncertified teachers are as effective as certified teachers, that teacher education makes no difference to teacher effectiveness, that verbal ability is the most important determinant of teaching effectiveness, that private schools staffed by uncertified teachers are more effective than public schools, and that untrained teachers are more qualified than prepared teachers. It concludes with a discussion of the policy issues that need to be addressed if all students are

  13. An Analysis of the Efficacy Beliefs of Special Education Teachers Completing the Alternative versus the Traditional Certification Programs

    Science.gov (United States)

    Beasley, Thomas Hunter

    2012-01-01

    This study investigated the efficacy beliefs of two groups of special education teachers who had completed certification requirements in mild/moderate disabilities. The first group included 26 special education teachers who had completed an alternative certification program at a midsize public university in Louisiana between 2003 and 2008. The…

  14. Directory of Certificates of Compliance for radioactive materials packages: Certificates of Compliance. Volume 2, Revision 18

    International Nuclear Information System (INIS)

    1995-10-01

    The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. An alphabetical listing by user name is included in the back of Volume 3 of approved QA programs. The reports include a listing of all users of each package design and approved QA programs prior to the publication date

  15. Directory of Certificates of Compliance for radioactive materials packages: Certificates of Compliance. Volume 2, Revision 18

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    The purpose of this directory is to make available a convenient source of information on packagings which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. An alphabetical listing by user name is included in the back of Volume 3 of approved QA programs. The reports include a listing of all users of each package design and approved QA programs prior to the publication date.

  16. Directory of national competent authorities' approval certificates for package design and shipment of radioactive material

    International Nuclear Information System (INIS)

    1990-04-01

    The authorization of packages and shipments of radioactive materials are issued in the form of certificates by the national competent authority of the IAEA Member State in which the package is designed or from which a shipment originates, and may be validated or endorsed by the corresponding authority of other Member States as the need arises. This directory summarizes in tabular form the key information on existing package approval certificates contained in PACKTRAM database. 5 tabs

  17. The electricity certificate system, 2007

    Energy Technology Data Exchange (ETDEWEB)

    2007-07-01

    The electricity certificate system is a market based support system to assist the expansion of electricity production in Sweden from renewable energy sources and peat. Its objective is to increase the production of electricity from such sources by 17 TWh by 2016 relative to the production level in 2002. It is part of the country's overall objective of moving Sweden towards a more ecologically sustainable energy system. This report describes the market status of the electricity certificate system, and includes statistics from 2003 to 2006. It is our aim to create a forum for continuously developing the statistical material and analyses, in order to assist those involved in the market, and all other interested persons, to follow achievement of the objectives set out in the Government's Bill No. 2005/06:154, Renewable Electricity with Green Certificates. It is also our aim that, in future, each issue of the report should include a more in depth theme article on some particular subject. This year the report provides expanded information and statistics on wind power. Electricity certificates are issued to those who produce electricity from various renewable energy sources, and from peat, and who have had their production plants approved by the Swedish Energy Agency. To date, certificates have been issued to producers of electricity from biofuels and peat, wind power, hydro power and solar energy. Production from the renewable sources amounted to 11.6 TWh in 2006, which is 5.1 TWh more than corresponding production in 2002

  18. AutoCAD 2014 review for certification official certification preparation

    CERN Document Server

    ASCENT center for technical knowledge

    2014-01-01

    The AutoCAD® 2014 Review for Certification book is intended for users of AutoCAD® preparing to complete the AutoCAD 2014 Certified Professional exam. This book contains a collection of relevant instructional topics, practice exercises, and review questions from the Autodesk Official Training Guides (AOTG) from ASCENT - Center for Technical Knowledge pertaining specifically to the Certified Professional exam topics and objectives. This book is intended for experienced users of AutoCAD in preparation for certification. New users of AutoCAD should refer to the AOTG training guides from ASCENT, such as AutoCAD/AutoCAD LT 2014 Fundamentals, for more comprehensive instruction.

  19. Telecoupled governance of land use change: Sustainable palm oil conservation benefits limited by preferential certification

    Science.gov (United States)

    Heilmayr, R.; Carlson, K. M.; Gibbs, H.; Noojipady, P.; Burns, D.; Morton, D. C.; Walker, N.; Paoli, G.; Kremen, C.

    2016-12-01

    Dozens of trans-national corporations have made public commitments to purchase only zero-deforestation palm oil, a commodity responsible for substantial tropical forest loss. Eco-certification is a basic requirement of most such forest-related procurement policies, and >20% of palm oil was certified in 2015.While the impact of certification on deforestation in oil palm plantations has never been tested, such evaluation is critical to inform improvements of voluntary sustainability initiatives. Here, we use a new, comprehensive data set of Roundtable on Sustainable Palm Oil (RSPO) certified and non-certified oil palm plantation boundaries (191,561 km2) in Indonesia, the leading global producer of palm oil to generate robust spatio-temporal estimates of certification's impact on deforestation and fires from 2000-2014. We find that certification reduced forest cover loss embodied in RSPO certified palm oil through two mechanisms. Certification had a significant protective effect, which lowered plantation deforestation rates by 29%.However, due to preferential certification of plantations developed before 2000, little forest was available for protection; forest area conserved totaled 56±4.9 km2. Our models suggest that increased adoption of RSPO certification may reduce the ability of palm oil companies to selectively certify previously cleared regions, and consequently strengthen the role of certification in protecting the tropical forests at greatest risk from agricultural encroachment. We reflect upon the complex interactions between traditional government policies, and emerging market-based governance structures in this telecoupled system.

  20. The ASEAN community-based tourism standards: looking beyond certification

    OpenAIRE

    Novelli, M.; Klatte, N.; Dolezal, C.

    2017-01-01

    This paper reports findings from an opportunity study on the appropriateness of implementing community-based tourism standards (CBTS) certification through the Association of Southeast Asian Nations (ASEAN) criteria, as a way to improve sustainable tourism provision in the region. Framed by critical reflections on community-based tourism (CBT) literature and existing sustainable tourism standards (STS) practices, qualitative research consisting of interviews with six key industry experts prov...

  1. Online Information Technologies Certificate Program

    Directory of Open Access Journals (Sweden)

    Erman YUKSELTURK

    2005-01-01

    Full Text Available Online Information Technologies Certificate Program Res. Ass. Erman YUKSELTURK Middle East Technical University Department of Computer Education and Instructional Technology, Faculty of Education, Ankara, TURKEY ABSTRACT In this study, Information Technologies Certificate Program which is based on synchronous and asynchronous communication methods over the Internet offered by cooperation of Middle East Technical University, Computer Engineering Department and Continuing Education Center were examined. This online certificate program started in May 1998 and it is still active. The program includes eight fundamental courses of Computer Engineering Department and comprised of four semesters lasting totally nine months. The main aim of this program is to train the participants in IT field to meet demand in the field of computer technologies in Turkey. As a conclusion, the properties of this program were discussed in a detailed way.

  2. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  3. U.S. licensing process and ABWR certification

    International Nuclear Information System (INIS)

    Quirk, J.F.; Williams, W.A.

    1996-01-01

    Part 50 of Title 10 of the Code of Federal Regulation (CFR) establishes a two-step licensing process by which the U.S. Nuclear Regulatory Committee (NRC) authorizes nuclear reactor plant construction through issuance of a construction permit and authorizes operation by issuance of an operating license. At each stage, the NRC Staff conducts technical reviews and there is potential for public hearings. In 1989, the NRC issued a new, simplified licensing process: Part 52. The purpose of the Part 52 licensing process is to provide a regulatory framework that brings about earlier resolution of licensing issues. Because issues are not resolved early in the Part 50 licensing process, approval of an operating license is not assured until after a significant investment has been made in the plant. Part 52 increases the stability and certainty of the licensing process by providing for the early resolution of safety and environmental issues. The Part 52 licensing process features (1) early site permits, (2) design certification, and (3) combined construction permit and operating licenses. As part of the U.S. Advanced Light Water Reactor (ALWR) Program to revitalize the nuclear option through the integration of government/utility/industry efforts, GE undertook the role of applying for certification for its latest product line, the Advanced Boiling Water Reactor (ABWR), under the U.S. ABWR certification program. The ABWR design is an essentially complete plant. Initial application for design certification was in 1987 under Part 50. GE reapplied in late 1991 under the newly promulgated Part 52. Following seven years of intensive interactions with the NRC and ACRS, GE was awarded the first Final Design Approval (FDA) under Part 52. The Commission initiated rulemaking by publishing the proposed ABWR Certification Rule in the Federal Register in early 1995. Certification is anticipated mid-1996. (J.P.N.)

  4. A Certificate Authority (CA-based cryptographic solution for HIPAA privacy/security regulations

    Directory of Open Access Journals (Sweden)

    Sangram Ray

    2014-07-01

    Full Text Available The Health Insurance Portability and Accountability Act (HIPAA passed by the US Congress establishes a number of privacy/security regulations for e-healthcare systems. These regulations support patients’ medical privacy and secure exchange of PHI (protected health information among medical practitioners. Three existing HIPAA-based schemes have been studied but appear to be ineffective as patients’ PHI is stored in smartcards. Moreover, carrying a smartcard during a treatment session and accessing PHI from different locations results in restrictions. In addition, authentication of the smartcard presenter would not be possible if the PIN is compromised. In this context, we propose an MCS (medical center server should be located at each hospital and accessed via the Internet for secure handling of patients’ PHI. All entities of the proposed e-health system register online with the MCS, and each entity negotiates a contributory registration key, where public-key certificates issued and maintained by CAs are used for authentication. Prior to a treatment session, a doctor negotiates a secret session key with MCS and uploads/retrieves patients’ PHI securely. The proposed scheme has five phases, which have been implemented in a secure manner for supporting HIPAA privacy/security regulations. Finally, the security aspects, computation and communication costs of the scheme are analyzed and compared with existing methods that display satisfactory performance.

  5. Drug lag and key regulatory barriers in the emerging markets

    Directory of Open Access Journals (Sweden)

    Harriet Wileman

    2010-01-01

    This work concludes that the overall relative drug lag in the emerging markets has decreased over time and that there are seven key regulatory barriers which need to be targeted in order to make further improvements; ′Western Approval′, local clinical development (LCD, Certificate of Pharmaceutical Product (CPP, Good Manufacturing Practice (GMP, pricing approval, document authentication and harmonisation.

  6. Open source systems security certification

    CERN Document Server

    Damiani, Ernesto; El Ioini, Nabil

    2009-01-01

    Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems, including OSS, meet performance and security requirements as well as achieving the necessary certifications, according to the overall strategy of OSS usage on the part of the adopter

  7. 16 CFR 1207.9 - Product certification.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Product certification. 1207.9 Section 1207.9 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION CONSUMER PRODUCT SAFETY ACT REGULATIONS SAFETY STANDARD FOR SWIMMING POOL SLIDES § 1207.9 Product certification. (a) Certification shall be in accordance...

  8. 40 CFR 82.161 - Technician certification.

    Science.gov (United States)

    2010-07-01

    ... shall address the subject areas listed in appendix D. (c) Program Approval. Persons may seek approval of... the closed-book certification exam, within 30 days. Programs providing Type I certification using the... percent or higher on the certification exam, no later than 30 days after the program has received the exam...

  9. Modeling landowner behavior regarding forest certification

    Science.gov (United States)

    David C. Mercker; Donald G. Hodges

    2008-01-01

    Nonindustrial private forest owners in western Tennessee were surveyed to assess their awareness, acceptance, and perceived benefits of forest certification. More than 80 percent of the landowners indicated a willingness to consider certification for their lands. A model was created to explain landowner behavior regarding their willingness to consider certification....

  10. Certification and the Branding of HRD

    Science.gov (United States)

    Carliner, Saul

    2012-01-01

    Although calls continue to establish certification, several certifications for human resource development (HRD) practitioners already exist, although none use the name HRD. This Forum explores what those certification programs are and what their availability means to the development of the HRD "brand" (the impressions of the service derived from…

  11. 48 CFR 33.207 - Contractor certification.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor certification... CONTRACTING REQUIREMENTS PROTESTS, DISPUTES, AND APPEALS Disputes and Appeals 33.207 Contractor certification. (a) Contractors shall provide the certification specified in paragraph (c) of this section when...

  12. Alternative Certification Pathways: Filling a Gap?

    Science.gov (United States)

    Ludlow, Carlyn

    2013-01-01

    The purpose of this article is to examine the proliferation of alternative certification pathways through an analysis of the role and history of teacher certification and supply followed by a synthesis of national, regional, and state research studies on alternative routes to certification programs and a review of studies conducted on well-known…

  13. 40 CFR 85.1406 - Certification.

    Science.gov (United States)

    2010-07-01

    ... POLLUTION FROM MOBILE SOURCES Urban Bus Rebuild Requirements § 85.1406 Certification. (a) Certification... provide some level of particulate emission reduction, and will not cause the urban bus engine to fail to... urban bus engines. (c) Test equipment selection. Certification shall be based upon tests utilizing...

  14. Converse Theorems for Safety and Barrier Certificates

    OpenAIRE

    Ratschan, Stefan

    2017-01-01

    An important tool for proving safety of dynamical systems is the notion of a barrier certificate. In this paper we prove that every robustly safe ordinary differential equation has a barrier certificate. Moreover, we show a construction of such a barrier certificate based on a set of states that is reachable in finite time.

  15. 42 CFR 493.638 - Certificate fees.

    Science.gov (United States)

    2010-10-01

    ... for quality control, quality assurance, and proficiency testing purposes) and specialties tested, with... collected by HHS under the laboratory program must be sufficient to cover the general costs of administering... certificates and certificates of compliance, the costs include issuing the certificates, collecting the fees...

  16. Professional Certification in Counseling Psychology.

    Science.gov (United States)

    Fretz, Bruce R.; And Others

    1980-01-01

    Certification procedures protect consumers, but when licensing institutions become monopolistic, alternative paths to credentialing need to be considered. A series of articles examine third party payments, a changing job market and consumer protection concerns, all of which have had an impact on credentialing problems. (JAC)

  17. How to price imperfect certification

    Czech Academy of Sciences Publication Activity Database

    Mysliveček, Jan

    -, č. 364 (2008), s. 1-37 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Grant - others:Univerzita Karlova(CZ) 7743/2007 Institutional research plan: CEZ:AV0Z70850503 Keywords : certification * imperfect testing * competition Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp364.pdf

  18. Current Status and Problems in Certification of Sustainable Forest Management in China

    Science.gov (United States)

    Zhao, Jingzhu; Xie, Dongming; Wang, Danyin; Deng, Hongbing

    2011-12-01

    Forest certification is a mechanism involving the regulation of trade of forest products in order to protect forest resources and improve forest management. Although China had a late start in adopting this process, the country has made good progress in recent years. As of July 31, 2009, 17 forest management enterprises and more than one million hectares of forests in China have been certified by the Forest Stewardship Council (FSC). Several major factors affect forest certification in China. The first set is institutional in nature. Forest management in China is based on centralized national plans and therefore lacks flexibility. A second factor is public awareness. The importance and value of forest certification are not widely understood and thus consumers do not make informed choices regarding certified forest products. The third major factor is the cost of certification. Together these factors have constrained the development of China's forest certification efforts. However, the process does have great potential. According to preliminary calculations, if 50% of China's commercial forests were certified, the economic cost of forest certification would range from US0.66-86.63 million while the economic benefits for the forestry business sector could exceed US150 million. With continuing progress in forest management practices and the development of international trade in forest products, it becomes important to improve the forest certification process in China. This can be achieved by improving the forest management system, constructing and perfecting market access mechanisms for certificated forest products, and increasing public awareness of environmental protection, forest certification, and their interrelationship.

  19. Current status and problems in certification of sustainable forest management in China.

    Science.gov (United States)

    Zhao, Jingzhu; Xie, Dongming; Wang, Danyin; Deng, Hongbing

    2011-12-01

    Forest certification is a mechanism involving the regulation of trade of forest products in order to protect forest resources and improve forest management. Although China had a late start in adopting this process, the country has made good progress in recent years. As of July 31, 2009, 17 forest management enterprises and more than one million hectares of forests in China have been certified by the Forest Stewardship Council (FSC). Several major factors affect forest certification in China. The first set is institutional in nature. Forest management in China is based on centralized national plans and therefore lacks flexibility. A second factor is public awareness. The importance and value of forest certification are not widely understood and thus consumers do not make informed choices regarding certified forest products. The third major factor is the cost of certification. Together these factors have constrained the development of China's forest certification efforts. However, the process does have great potential. According to preliminary calculations, if 50% of China's commercial forests were certified, the economic cost of forest certification would range from US$0.66-86.63 million while the economic benefits for the forestry business sector could exceed US$150 million. With continuing progress in forest management practices and the development of international trade in forest products, it becomes important to improve the forest certification process in China. This can be achieved by improving the forest management system, constructing and perfecting market access mechanisms for certificated forest products, and increasing public awareness of environmental protection, forest certification, and their interrelationship.

  20. 7 CFR Appendix B to Subpart E of... - Certificate of Incumbency and Signature

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Certificate of Incumbency and Signature B Appendix B... Signature U.S. Department of Agriculture—Farmers Home Administration or its successor agency under Public... successor agency under Public Law 103-354 and that the signature appearing below and that the signatures...

  1. Autodesk Revit Architecture 2014 review for certification official certification preparation

    CERN Document Server

    ASCENT center for technical knowledge

    2014-01-01

    The Autodesk® Revit® Architecture 2014 Review for Certification guide is intended for users of the Autodesk Revit Architecture software who are preparing to complete the Autodesk Revit Architecture 2014 Certified Professional exam. This guide contains a collection of relevant instructional topics, practices, and review questions from the Autodesk Official Training Guides (AOTG) training guides created by ASCENT - Center for Technical Knowledge® and pertaining specifically to the Certified Professional exam topics and objectives. This training guide is intended for experienced users of the Autodesk Revit Architecture software in preparation for certification. New users of the software should refer to the AOTG training guides from ASCENT, such as Autodesk Revit Architecture 2014 Fundamentals, for more comprehensive instruction.

  2. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  3. Enactment of mandatory pharmacy technician certification in Kansas.

    Science.gov (United States)

    Lucas, Amber; Massey, Lindsay; Gill, Taylor; Burger, Gregory; Little, Jeff D

    2016-02-01

    The successful enactment of mandatory pharmacy technician certification in Kansas is described. In 2004, Kansas began requiring registration of all pharmacy technicians with the state board of pharmacy. Registration identified individuals working as pharmacy technicians but did not require any specific education or certification. In September 2012, the Kansas Board of Pharmacy created a task force of key stakeholders including pharmacists from multiple areas of practice, the University of Kansas School of Pharmacy, organizational leaders from the Kansas Council of Health-System Pharmacists (KCHP) and Kansas Pharmacists Association, and professional lobbyists. The goals of this task force were to research practices of technician certification in other states and to make recommendations to the state board of pharmacy on how Kansas could accomplish mandatory technician certification. The task force outlined the steps needed to achieve legislation that could be supported by the members. These topics included the creation of a technician trainee category, grandfathering certain technicians who had been practicing for a designated period of time, state board-approved exemptions, training requirements, age and education requirements, continuing-education requirements, and pharmacist:technician ratio. The recommendations were finalized at the August 2013 Kansas Pharmacy Summit, and the proposed legislation was introduced and passed during the 2014 legislative session. KCHP members learned many valuable lessons about advocacy and the legislative process with this initiative, including building relationships, working with legislators, and working with other professional organizations. The formation of a task force led to the successful passage of a bill granting the Kansas Board of Pharmacy the authority to issue regulations regarding mandatory pharmacy technician certification. Copyright © 2016 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  4. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  5. Sickness certification difficulties in Ireland--a GP focus group study.

    Science.gov (United States)

    Foley, M; Thorley, K; Von Hout, M-C

    2013-07-01

    Sickness certification causes problems for general practitioners (GPs). Difficulty with the assessment of capacity to work, conflict with patients and other non-medical factors have been shown to influence GPs' decision-making. Inadequate leadership and management of certification issues add to GPs' difficulties. To explore problems associated with sickness certification, as part of a larger mixed method research project exploring GPs' experiences and perceptions of sickness certification in Ireland. A qualitative study in an urban region of Ireland. A focus group of four male and four female GPs explored problems encountered by GPs in certifying sickness absence. Thematic data analysis was used. Three major themes emerged: perception of the sickness certification system, organization of health care and cultural factors in sickness absence behaviour. Employment structures in public and private sectors and lack of communication with other health care providers and employers were identified as complicating sickness certification. GPs encounter a complexity of issues in sick certification and are dissatisfied with their role in certifying sickness absence. Our results open the debate for policy change and development in Ireland.

  6. The electricity certificate system, 2009

    Energy Technology Data Exchange (ETDEWEB)

    Joehnemark, Maria; Oestberg, Roger; Johansson, Martin

    2009-07-01

    Over the years, the electricity certificate system has been maturing and consolidating, so that it is today an effective and functional policy measure that has won wide acceptance from all parties concerned. The long term approach and security of the system are attracting an increasing number of investors, which is described more fully in this report. This year's special theme chapter, Investing in Renewable Energy, presents the status of the system from an investment point of view. In addition to this chapter, the report includes, as always, an introduction to how the certificate system works, together with an updating with the latest statistics. A quick glance at external factors that can affect the system indicates that there are several that may do so in the future. Just the fact that the climate problem is still high on the political agenda, despite strong competition from economic crises, shows that there is a need for more renewable energy. The EU Renewable Energy Directive, which was adopted at the end of 2008, requires the Swedish energy system to deliver 49 % of its output from renewable sources by 2020. In addition, the Energy Bill adopted by the Swedish Parliament identifies the electricity certificate system as one of the most important means of achieving the country's objectives. Taken together, this indicates that there are many factors that will further strengthen the role of the certificate system in the next few years. If we look at the system itself, we can see that a number of important changes have been made since the previous report. With effect from 1st January 2009, the definition of electricity-intensive industries has changed, bringing it more closely in line with the definition used in energy taxation. Since 1st May, the rules have changed concerning entitlement to a new allocation period of certificates after a plant has been substantially modified. In addition, certificates can now be allocated for increases in output from

  7. Climate, air and energy - Release 2015 - Key figures

    International Nuclear Information System (INIS)

    2016-05-01

    After an indication of some remarkable key figures (general data, data about office building, housing, industries, renewable energies, wastes, transports, agriculture and forests, and households, indication of some French and European objectives for 2020 and 2030), and a table containing indications of some international official texts (Kyoto protocol and its amendment, European directives) and of their content and scope (bio-fuels in transports, energy efficiency, buildings, labelling and eco-design, transports, renewable energies, energy and climate, greenhouse gas emissions and adaptation, air quality, wastes), and national texts (laws, plans) regarding the same issues, this publication presents figures and data under the form of graphs and tables to illustrate their evolution. They are general data on energy consumptions and intensities (data per sector and per country in Europe), markets and jobs related to renewable energies, certificates of energy saving, greenhouse gas emissions and climate change, regional data for France. The other chapters present large sets of graphs and tables of relevant data concerning housing buildings, office buildings, transports, industries, agriculture and forests, renewable energies and heat networks, wastes, and households. Generally, these data are presented in terms of evolution since the 1970's or the 1990's. They propose a detailed analytical point of view of the various energy and energy-related issues in these different sectors and fields

  8. The new international certification and design principles

    International Nuclear Information System (INIS)

    Heijnen, W.H.P.M.; Heineman, H.

    1995-01-01

    ISO/TC 67 deals with standardization of Equipment for the Petroleum and Natural Gas Industries at a global level. The paper will provide the reader with insight in the Certification system as well as its link with Design. It will explain how the total process fits in the business structure of the Petroleum and Natural Gas Industry, with the focus on the emerging concepts such as partnering, turn key contracts, the developments in the EC and the need to reduce costs at a global basis. The paper will also address the topic of Design Principles based on the results of the study performed for ISO/TC 67. The paper will provide a framework that can be used by the industry in how to deal with issues such as, there shall the activity of the Operator be focused on when ordering equipment or services and how the manufacturer or service provider should prepare himself to become an equal partner with regard to the required equipment, service and its associated technology now and in the future. In the changing world with ever increasing focus on Health, Safety and Environment (HSE), the topic efficiency, technology, equipment performance and functionality should not be overlooked or been given less attention. The Certification and Design principles, implemented in standards, aim predominantly at Fitness for Purpose of equipment and/or services to regain the balance. A further aim is to limit consequential costs due to deficiencies in the broadest sense, allowing the Petroleum and Natural Gas Industry to produce oil and gas in a cost effective manner with the highest possible HSE targets

  9. Building and Using Digital Repository Certifications across Science

    Science.gov (United States)

    McIntosh, L.

    2017-12-01

    When scientific recommendations are made based upon research, the quality and integrity of the data should be rigorous enough to verify claims and in a trusted location. Key to ensuring the transparency and verifiability of research, reproducibility hinges not only on the availability of the documentation, analyses, and data, but the ongoing accessibility and viability of the files and documents, enhanced through a process of curation. The Research Data Alliance (RDA) is an international, community-driven, action-oriented, virtual organization committed to enabling the open sharing of data by building social and technical bridges. Within the RDA, multiple groups are working on consensus-building around the certification of digital repositories across scientific domains. For this section of the panel, we will discuss the work to date on repository certification from this RDA perspective.

  10. The effectiveness of market-based conservation in the tropics: forest certification in Ecuador and Bolivia.

    Science.gov (United States)

    Ebeling, Johannes; Yasué, Maï

    2009-02-01

    During the last decade, forest certification has gained momentum as a market-based conservation strategy in tropical forest countries. Certification has been promoted to enhance forest management in countries where governance capacities are insufficient to adequately manage natural resources and enforce pertinent regulations, given that certification relies largely on non-governmental organisations and private businesses. However, at present there are few tropical countries with large areas of certified forests. In this study, we conducted semi-structured stakeholder interviews in Ecuador and Bolivia to identify key framework conditions that influence the costs and benefits for companies to switch from conventional to certified forestry operations. Bolivia has a much greater relative area under certified forest management than Ecuador and also significantly more certified producers. The difference in the success of certification between both countries is particularly notable because Bolivia is a poorer country with more widespread corruption, and is landlocked with less access to export routes. Despite these factors, several characteristics of the Bolivian forest industry contribute to lower additional costs of certified forest management compared to Ecuador. Bolivia has stronger government enforcement of forestry regulations a fact that increases the cost of illegal logging, management units are larger, and vertical integration in the process chain from timber extraction to markets is higher. Moreover, forestry laws in Bolivia are highly compatible with certification requirements, and the government provides significant tax benefits to certified producers. Results from this study suggest that certification can be successful in countries where governments have limited governance capacity. However, the economic incentives for certification do not only arise from favourable market conditions. Certification is likely to be more successful where governments enforce

  11. 78 FR 61251 - The National Public Transportation Safety Plan, the Public Transportation Agency Safety Plan, and...

    Science.gov (United States)

    2013-10-03

    ...-0030] RIN 2132-AB20; 2132-AB07 The National Public Transportation Safety Plan, the Public Transportation Agency Safety Plan, and the Public Transportation Safety Certification Training Program; Transit... Public Transportation Safety Program (National Safety Program) and the requirements of the new transit...

  12. Analysis of the results of the first implementation of the Korea Manuscript Editors Certification

    Directory of Open Access Journals (Sweden)

    Hyun Jung Yi

    2017-02-01

    Full Text Available In the field of international scholarly journal publishing, manuscript editing has been established as an essential component of the publication process. As the necessity of this process has increased, the Korean Council of Science Editors has consistently provided education for training professional manuscript editors, and has worked to implement a manuscript editor certification system. Starting in 2014, the Korean Council of Science Editors thoroughly conducted background research and advanced analysis in preparation for such a system. Subsequently, a committee of experts was formed to develop and simulate an examination for this certification. This process culminated in the first manuscript editor certification examination, which was held in November 2016 and resulted in 40 initial Korea Manuscript Editors Certification holders. Examinations for the Korea Manuscript Editors Certification are scheduled to be held annually. The establishment of this certification system will contribute to strengthening individual capacities and further developing science journal publication in Korea by expanding the field of manuscript editing. Ultimately, this system will contribute to the promotion of Korean scientific journals to the level of prominent international journals.

  13. In Brief: Science teaching certificate

    Science.gov (United States)

    Showstack, Randy

    2008-11-01

    More than 200 educators will receive fellowships over the next 5 years to participate in NASA's Endeavor Science Teaching Certificate Project, the agency announced on 14 November. Through workshops, online and on-site graduate courses, and NASA educational materials, the project will expose educators to NASA science and engineering and support them in translating the information for use in classrooms. ``Through the program, educators will learn to deliver cutting-edge science into the classroom, promoting science, technology, engineering, and mathematics education,'' according to Joyce Winterton, assistant administrator for education at NASA Headquarters, in Washington, D. C. Project fellows will earn a certificate from Teachers College Innovations at Teachers College, Columbia University, New York, and graduate credit from other institutional partners. For more information, visit http://education.nasa.gov/home/index.html.

  14. White certificates — Energy efficiency programs under private information of consumers

    International Nuclear Information System (INIS)

    Wirl, Franz

    2015-01-01

    Energy efficiency is an objective of public interventions at least since the Public Utility Regulatory Policy Act of 1978 (PURPA). Recently, conservation has received considerable attention in the United States and in particular in the European Union but this time in order to mitigate global warming. Policy measures include regulations at the technical level and the introduction of white certificates in order to force utilities and firms to invest into conservation in a way similar to the already existing renewable energy quota. This paper derives the optimal mechanism if utilities must deal with white certificates facing consumers holding private information. The optimal mechanism has some theoretically interesting features like restricted participation and a discontinuity. - Highlights: • Energy efficiency programs are again an objective of public interventions. • White certificates force utilities to invest in conservation. • However, issues of private information are ignored. • Conservation program accounting for private information • The optimal contract has non-standard features like a discontinuity

  15. Fairtrade certification, conventions and labor

    DEFF Research Database (Denmark)

    Riisgaard, Lone

    2015-01-01

    This chapter explores the potential of Fairtrade in hired labour situations in terms of improving conditions for agricultural workers. The chapter will address various aspects including the contentious issue of Fairtrade and trade union organisation as well as on issues of worker empowerment....... At a local level, analysis focuses on the implications of Fairtrade certification for large enterprises and workers, drawing on a field-based studies of certified flower farms in Ecuador and Kenya....

  16. We could learn much more from 1918 pandemic-the (mis)fortune of research relying on original death certificates.

    Science.gov (United States)

    Alonso, Wladimir J; Nascimento, Francielle C; Chowell, Gerardo; Schuck-Paim, Cynthia

    2018-05-01

    The analysis of historical death certificates has enormous potential for understanding how the health of populations was shaped by diseases and epidemics and by the implementation of specific interventions. In Brazil, the systematic archiving of mortality records was initiated only in 1944-hence the analysis of death registers before this time requires searching for these documents in public archives, notaries, parishes, and especially ancient cemeteries, which are often the only remaining source of information about these deaths. This article describes an effort to locate original death certificates in Brazil and document their organization, accessibility, and preservation. To this end, we conducted an exploratory study in 19 of the 27 Brazilian states, focusing on the period surrounding the 1918 influenza pandemic (1913-1921). We included 55 cemeteries, 22 civil archives, and one military archive. Apart from few exceptions, the results show the absence of a curatorial policy for the organization, access or even physical preservation of this material, frequently leading to unavailability, deterioration, and ultimately its complete loss. This study indicates the need to promote the preservation of a historical heritage that is a key to understanding historical epidemiological patterns and human responses to global health threats. Copyright © 2018 Elsevier Inc. All rights reserved.

  17. Is ISO 14001 Certification Effective? An Experimental Analysis of Firm Profitability

    Directory of Open Access Journals (Sweden)

    Aridelmo José Campanharo Teixeira

    2012-05-01

    Full Text Available This paper examines the effect environmental management certification (ISO 14001 has on publicly tradedBrazilian companies profitability. Signaling theory predicts that the certification serves to signal to society goodenvironmental behavior; allowing people to screen the different types of firms, improving the financialeconomicperformance of those firms that engage in this behavior. We performed difference-in-difference fixedeffect design comparing the financial performance of companies with and without certification of theirenvironmental management systems, using data on 552 companies over the period from 1996 to 2008. Theresults indicate that firms with an environmental management system certified according to the NBR ISO14001:2004 standard tended to be more profitable, on average, than firms without certification.

  18. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  19. Directory of certificates of compliance for radioactive materials packages

    International Nuclear Information System (INIS)

    1992-10-01

    This directory contains a Report of the US Nuclear Regulatory Commission's Approved Packages (Volume 1), Certificates of Compliance (Volume 2), and a Report of NRC Approved Quality Assurance Programs (Volume 3), for Radioactive Materials Packages effective October 1, 1992. The purpose of this directory is to make available a convenient source of information on packaging which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. A listing by packaging types is included in the back of Volume 2. An alphabetical listing by Company name is included in the back of Volume 3 for approved QA programs. The reports include a listing of all users of each package-design and approved QA programs prior to the publication date of the directory

  20. Directory of Certificates of Compliance for Radioactive Materials Packages

    International Nuclear Information System (INIS)

    1992-10-01

    This directory contains a Report of the US Nuclear Regulatory Commission's Approved Packages (Volume 1), Certificates of Compliance (Volume 2), and a Report of NRC Approved Quality Assurance Programs (Volume 3), for Radioactive Materials Packages effective October 1, 1992. The purpose of this directory is to make available a convenient source of information on packaging which have been approved by the US Nuclear Regulatory Commission. To assist in identifying packaging, an index by Model Number and corresponding Certificate of Compliance Number is included at the front of Volumes 1 and 2. A listing by packaging types is included in the back of Volume 2. An alphabetical listing by Company name is included in the back of Volume 3 for approved QA programs. The reports include a listing of all users of each package-design and approved QA programs prior to the publication date of the directory

  1. 46 CFR 91.60-40 - Duration of Convention certificates.

    Science.gov (United States)

    2010-10-01

    ... VESSELS INSPECTION AND CERTIFICATION Certificates Under International Convention for Safety of Life at Sea... period of not more than 60 months. (1) A Cargo Ship Safety Construction Certificate. (2) A Cargo Ship Safety Equipment Certificate. (3) A Safety Management Certificate. (4) A Cargo Ship Safety Radio...

  2. 46 CFR 107.211 - Original Certificate of Inspection.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Original Certificate of Inspection. 107.211 Section 107... INSPECTION AND CERTIFICATION Inspection and Certification § 107.211 Original Certificate of Inspection. (a) The owner or builder of a unit applies for an inspection for an original Certificate of Inspection by...

  3. Certification of Markets, Markets of Certificates: Tracing Sustainability in Global Agro-Food Value Chains

    NARCIS (Netherlands)

    Mol, A.P.J.; Oosterveer, P.J.M.

    2015-01-01

    There is a blossoming of voluntary certification initiatives for sustainable agro-food products and production processes. With these certification initiatives come traceability in supply chains, to guarantee the sustainability of the products consumed. No systematic analysis exists of traceability

  4. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  5. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  6. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  7. Management system certification benefits: where do we stand?

    International Nuclear Information System (INIS)

    Fonseca, Luis Miguel Ciravegna Martins da; Domingues, José Pedro; Machado, Pilar Baylina; Calderón, Mario

    2017-01-01

    The implementation and certification of Management Systems International Standards, such as ISO 9001 and ISO 14001, achieved a high international recognition, with more than 1 million organizations with their Quality Management Systems certified worldwide. Researchers have been paying considerable attention to this theme and the number of published articles has robustly grown. Although on an overall basis, the research results support the existence of positive impacts on the adoption and certification of these International Standards, there are various inconsistencies and contradictory results, leading to some controversy over its impacts for organizations. This study aims to bring a longitudinal time perspective to this area of research, analyzing the articles published since 1996, on the benefits of Management Systems Certification. A longitudinal perspective of countries of authors origin, keywords and journals is presented, complemented with an evaluation of the research results. Design/methodology/approach: A Bibliometric Study supported the research, with data collected from Web of Science, SCOPUS, and Research Gate data bases. Following the detailed analysis of the journal titles, articles abstracts and their full content, an evaluation scale was adopted to assess if the results support the existence of a positive relationship between Management System Certification and economic, financial or stakeholder results. Findings: The results evidence a steep increase in the number of publications addressing Management Systems Certification benefits, that mainly originate from Europe (48%) and East Asia and Pacific (23%), with Spain as the leading country (accounting for 14% of the total number of articles published between 1996 and April 2017). Journal of Cleaner Production (Environmental Management System Certification) and Total Quality Management and Business Excellence journal (Quality Management Systems Certification) are the leading journals for disseminating

  8. Management system certification benefits: where do we stand?

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Luis Miguel Ciravegna Martins da; Domingues, José Pedro; Machado, Pilar Baylina; Calderón, Mario

    2017-07-01

    The implementation and certification of Management Systems International Standards, such as ISO 9001 and ISO 14001, achieved a high international recognition, with more than 1 million organizations with their Quality Management Systems certified worldwide. Researchers have been paying considerable attention to this theme and the number of published articles has robustly grown. Although on an overall basis, the research results support the existence of positive impacts on the adoption and certification of these International Standards, there are various inconsistencies and contradictory results, leading to some controversy over its impacts for organizations. This study aims to bring a longitudinal time perspective to this area of research, analyzing the articles published since 1996, on the benefits of Management Systems Certification. A longitudinal perspective of countries of authors origin, keywords and journals is presented, complemented with an evaluation of the research results. Design/methodology/approach: A Bibliometric Study supported the research, with data collected from Web of Science, SCOPUS, and Research Gate data bases. Following the detailed analysis of the journal titles, articles abstracts and their full content, an evaluation scale was adopted to assess if the results support the existence of a positive relationship between Management System Certification and economic, financial or stakeholder results. Findings: The results evidence a steep increase in the number of publications addressing Management Systems Certification benefits, that mainly originate from Europe (48%) and East Asia and Pacific (23%), with Spain as the leading country (accounting for 14% of the total number of articles published between 1996 and April 2017). Journal of Cleaner Production (Environmental Management System Certification) and Total Quality Management and Business Excellence journal (Quality Management Systems Certification) are the leading journals for disseminating

  9. Analysis of the green certificate market

    International Nuclear Information System (INIS)

    Storeboe, Inger Oeydis

    2001-04-01

    This report studies the advantages and disadvantages of a separate financial market for the environmental advantages in the production of electricity from renewable energy sources. This market solution is evaluated against other financial systems used to promote the production of green electricity. By starting from a general equilibrium model for the green certificate market, the report discusses how the adaptation in the certificate market is influenced by changes in the market conditions. The certificate market is combined with a quota market for carbon dioxide, with and without international trade with electricity and certificate and market power in the production of electricity from renewable energy sources

  10. General practitioners' use of sickness certificates.

    Science.gov (United States)

    Roope, Richard; Parker, Gordon; Turner, Susan

    2009-12-01

    At present, sickness certification is largely undertaken by general practitioners (GPs). Guidance from the Department of Work and Pensions (DWP) is available to help with this task; however, there has been little formal evaluation of the DWP's guidance in relation to day-to-day general practice. To assess GPs' training, knowledge and application of the DWP's sickness certification guidelines. A structured questionnaire was sent to GPs within a (former) primary care trust (PCT). It probed demographics, training and knowledge of sickness certification guidelines. Case histories and structured questions were used to assess current practice. In this group of 113 GPs, there was a low awareness and use of the DWP's guidelines and Website relating to sickness certification. The majority of the GPs (63%) had received no training in sickness certification, and the mean length of time for those who had received training was 4.1 h. Most GPs also felt that patients and GPs have equal influence on the duration of sickness certification. This evidence of variable practice indicates that GPs should have more guidance and education in sickness certification. Closer sickness certification monitoring through existing GP computer systems may facilitate an improvement in practice that benefits patients and employers. The DWP, medical educators and PCTs may all have an additional role in further improving sickness certification practice.

  11. The influence of trade associations and group certification programs on the hardwood certification movement

    Science.gov (United States)

    Iris B. Montague

    2013-01-01

    Forest certification has gained momentum around the world over the past two decades. Although there are advantages to being certified, many forest landowners and forest products manufacturers consider forest certification of U.S. forest and forest products unnecessary. Many believe that U.S. forests are already sustainably managed, the current certification systems are...

  12. 76 FR 22785 - Direct Certification and Certification of Homeless, Migrant and Runaway Children for Free School...

    Science.gov (United States)

    2011-04-25

    ... [FNS-2008-0001] RIN 0584-AD60 Direct Certification and Certification of Homeless, Migrant and Runaway... concerning the certification of certain children who are homeless, runaway, or migratory. This rule affects... children who are homeless, runaway, or migratory, as determined by the homeless coordinator for homeless or...

  13. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  14. THE ACTIVITIES OF THE NATIONAL BANK OF UKRAINE ON THE OPEN MARKET: OPERATION WITH CERTIFICATES OF DEPOSITS

    Directory of Open Access Journals (Sweden)

    Yuliia Harkusha

    2016-06-01

    Full Text Available In the article investigated the activities of the National Bank of Ukraine on the open market. The analysis of operations of the National Bank of Ukraine banks to raise funds placing deposit certificates. Defined impact operations of the central bank's own debt securities to trading volumes deposit certificates of the National Bank of Ukraine on the stock market and the credit activity of banks. Identified problems interest rate policy and the ways to overcome them. Key words: National Bank of Ukraine, certificates of deposits, open market, interest rate policy, banks, stock exchange. JEL: E 58

  15. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  16. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  17. THE ACTIVITIES OF THE NATIONAL BANK OF UKRAINE ON THE OPEN MARKET: OPERATION WITH CERTIFICATES OF DEPOSITS

    OpenAIRE

    Yuliia Harkusha

    2016-01-01

    In the article investigated the activities of the National Bank of Ukraine on the open market. The analysis of operations of the National Bank of Ukraine banks to raise funds placing deposit certificates. Defined impact operations of the central bank's own debt securities to trading volumes deposit certificates of the National Bank of Ukraine on the stock market and the credit activity of banks. Identified problems interest rate policy and the ways to overcome them. Key words: National Bank o...

  18. Solar Renewable Energy Certificate (SREC) Markets: Status and Trends

    Energy Technology Data Exchange (ETDEWEB)

    Bird, L.; Heeter, J.; Kreycik, C.

    2011-11-01

    This paper examines experience in solar renewable energy certificate (SREC) markets in the United States. It describes how SREC markets function--key policy design provisions, eligible technologies, state and regional eligibility rules, solar alternative compliance payments, measurement and verification methods, long-term contracting provisions, and rate caps. It also examines the trends of SREC markets--trading volumes, sourcing trends, trends in the size of solar photovoltaic (PV) systems driven by these markets, and trends in price and compliance. Throughout, the paper explores key issues and challenges facing SREC markets and attempts by policymakers to address some of these market barriers. Data and information presented in this report are derived from SREC tracking systems, brokers and auctions, published reports, and information gleaned from market participants and interviews with state regulators responsible for SREC market implementation. The last section summarizes key findings.

  19. Environmental aspects of the forest management certification process

    CSIR Research Space (South Africa)

    Scott, DF

    2000-01-01

    Full Text Available Certification has been responsible for a very large improvement in the standard of forest management in South Africa. The reasons for the positive role of certification are set out briefly below. Firstly, and most importantly, certification has...

  20. Impacts of stakeholder consultation in the FSC certification process on sustainable forest management in South Africa

    CSIR Research Space (South Africa)

    Cousins, CC

    2000-01-01

    Full Text Available This research was done so as to understand key issues in the stakeholder consultation process undertaken as a component of the process of forest certification under the Forest Stewardship Council FSC), and to understand the nature of the impacts...

  1. Understanding the potential of eco-certification in salmon and shrimp aquaculture value chains

    NARCIS (Netherlands)

    Bush, Simon R.

    2017-01-01

    This paper examines how value chain coordination affects the ability of aquaculture producers to engage in eco-certification. Through a comparison of global salmon and shrimp value chains, it is argued that production risks and producer capacity are key determinants in the type of chain coordination

  2. The Theory and Practice of Alternative Certification: Implications for the Improvement of Teaching.

    Science.gov (United States)

    Hawley, Willis D.

    1990-01-01

    Identifies questions related to the processes and consequences of alternative teacher certification (AC), answers questions with research-based facts, proposes key elements of a model AC program, and draws conclusions about the directions AC may take and its probable effects on educational reform and on the professionalization of teaching. (SM)

  3. Certification of ICTs in Elections

    DEFF Research Database (Denmark)

    Schürmann, Carsten; Barrat, Jordi; Bolo, Eden

    2015-01-01

    Information and communication technologies play a critical role in the administration and organization of modern elections. Any breakdown of an election technology, security breach or programming error can incur tremendous cost for the electoral management body (EMB)—and may undermine voters’ trust......, starting during the feasibility study, and especially if it is bound by law to provide such a certification. The evaluation reports and related documents can also be used to increase the transparency of the election, improve the dialogue between EMBs and voters, and increase the EMB’s credibility....

  4. An Overview of the Certification of VSB-30 with Emphasis on Technological Innovation

    Directory of Open Access Journals (Sweden)

    Antonio Ramalho de Souza Carvalho

    2012-03-01

    Full Text Available This article is focused on the space sector, mainly due to the devices developed and marketed that require high investments in research, development and technological innovation, supported by a permanent need to meet the standard requirement to guarantee their effectiveness, among all the correct certification. In such scenario, this article has examined, highlighting technological innovation, which are the context and elements involved in the certification of the Vehicle Survey Booster – 30 (VSB-30. The research is characterized as a case study, conducted in the first semester of 2011, and it consisted of reviewing the literature on technological innovation and certification as well as information available in various reports, some of which were public, and interviews. The article presents a brief description of the development of the VSB-30, its importance to the market and the relevant aspects of the certification and the Certification Body of Brazil. The conclusion is that the certification is a contribution to technological innovation for it provides benefits in process improvement, especially regarding the question of documentation, creating conditions for the industry to adapt to formal established and qualified processes and, in return, to become restricted to trade companies unable to adjust to these requirements.

  5. Harmonisation of wind turbine certification in Europe JOULE project EWTC

    Energy Technology Data Exchange (ETDEWEB)

    Nath, C [Germanischer Lloyd, Hamburg (Germany); Eriksson, C [Det Norske Veritas, Hellerup (Denmark); Hulle, F van [Frans van Hulle, Petten (Netherlands); Skamris, C [Risoe National Lab., Roskilde (Denmark); Stam, W [CIWI Holland, Arnheim (Netherlands); Vionis, P [CRES, Attki (Greece)

    1999-03-01

    Wind turbine certification requirements are currently fairly divers within Europe. Therefore the leading European certification bodies initiated a JOULE project to harmonise the certification procedure on the basis of the current set of IEC/EN 61400 series standards. The paper presents a review of the state of the art of wind turbine certification in European countries and an outline of the sturcture of the project. The main steps of the project are (a) the collection of differences in certification practices by round robin certification of three wind turbine types; (b) assessment of the different certification results and (c) the development of a harmonised certification procedure. (au) EU-JOULE-3. 19 refs.

  6. 21 CFR 900.22 - Standards for certification agencies.

    Science.gov (United States)

    2010-04-01

    ... accreditation bodies for issues related to mammography image quality and clinical practice. The certification... interest. The certification agency shall establish and implement measures that FDA has approved in...

  7. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  8. 40 CFR 86.007-30 - Certification.

    Science.gov (United States)

    2010-07-01

    ... of its franchise agreement with the manufacturer and the dealer certification requirements of § 85... contrary to the terms of its franchise agreement with the manufacturer and the dealer certification... part because a manufacturer has located its facility in a foreign jurisdiction where local law...

  9. 9 CFR 156.6 - Certificates.

    Science.gov (United States)

    2010-01-01

    ... products, if the inspector finds that the requirements as stated in the certification have been met. The... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Certificates. 156.6 Section 156.6 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE...

  10. 49 CFR 179.11 - Welding certification.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Welding certification. 179.11 Section 179.11 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY... Design Requirements § 179.11 Welding certification. (a) Welding procedures, welders and fabricators shall...

  11. 12 CFR 4.65 - Certification.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Certification. 4.65 Section 4.65 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY ORGANIZATION AND FUNCTIONS, AVAILABILITY...; Contracting for Goods and Services § 4.65 Certification. (a) Objective. To preserve the integrity and foster...

  12. 40 CFR 92.208 - Certification.

    Science.gov (United States)

    2010-07-01

    ... the construction of a locomotive or locomotive engine, where such step may reasonably be expected to... POLLUTION FROM LOCOMOTIVES AND LOCOMOTIVE ENGINES Certification Provisions § 92.208 Certification. (a) This paragraph (a) applies to manufacturers of new locomotives and new locomotive engines. If, after a review of...

  13. 5 CFR 430.404 - Certification criteria.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT Performance Appraisal Certification for Pay Purposes § 430.404 Certification criteria. (a) To be... system(s) must provide for the following: (1) Alignment, so that the performance expectations for... that the performance expectations for senior employees meet the requirements of 5 CFR part 430...

  14. 34 CFR 34.21 - Employer certification.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Employer certification. 34.21 Section 34.21 Education Office of the Secretary, Department of Education ADMINISTRATIVE WAGE GARNISHMENT § 34.21 Employer... by the Secretary of the Treasury. (b) The employer must complete and return the certification to us...

  15. Is Halal Certification Process “Green”?

    Directory of Open Access Journals (Sweden)

    Mohd Rizal Razalli

    2012-09-01

    Full Text Available These days, the environmental perspective on operations is becoming more common. In fact, any effort in improving efficiency in the organization is closely related to sustainability of our environment. The Environmental Management System (EMS certification such as ISO 14001 has been accepted as the world standard. In addition to these ISO standards, there are other certifications such as Halal certification. There is no research that investigates the relationship between Halal Certification process and its effect on our environment. Hence, our main research question is that is Halal Certification process can be considered as environmental friendly? In this paper, we argue that Halal Certification also contributes towards green initiatives. We used EDC-UUM as our case study. EDC-UUM is actively seeking the Halal certification from Malaysian authority agency or JAKIM. In this study, we assessed the perception of the EDC-UUM staff on the issue of going green. The findings and implications are discussed in the paper. Keywords: halal certification, hotel operations, sustainability, green

  16. General certification procedure of formation organizations

    CERN Document Server

    Int. At. Energy Agency, Wien

    2002-01-01

    This document presents the procedure dealing with the certification of formation organizations dispensing the formation and the risks prevention to the personnel of A or B category in nuclear facilities. This certification proves the organization ability to satisfy the ''F'' specification of the CEFRI. (A.L.B.)

  17. 20 CFR 655.163 - Certification fee.

    Science.gov (United States)

    2010-04-01

    ... States Department of Labor. In the case of an agricultural association acting as a joint employer... determination by the CO to grant an Application for Temporary Employment Certification in whole or in part will include a bill for the required certification fees. Each employer of H-2A workers under the Application...

  18. 40 CFR 68.185 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Certification. 68.185 Section 68.185 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CHEMICAL... certification that, to the best of the signer's knowledge, information, and belief formed after reasonable...

  19. 49 CFR 172.204 - Shipper's certification.

    Science.gov (United States)

    2010-10-01

    ... the certification the words “herein-named” may be substituted for the words “above-named”. (2) “I... respects in proper condition for transport according to applicable international and national governmental... national governmental regulations. Note to paragraph (c)(1): In the certification, the word “packed” may be...

  20. 40 CFR 86.094-30 - Certification.

    Science.gov (United States)

    2010-07-01

    ... of its franchise agreement with the manufacturer and the dealer certification requirements of § 85... test vehicle(s) (or test engine(s)) meets the requirements of the Act and of this subpart, he will... requirements of the Act and this subpart have been met, he will issue one certificate of conformity per...

  1. 47 CFR 76.1502 - Certification.

    Science.gov (United States)

    2010-10-01

    ... sufficient time to comply with the Commission's notification requirements. (b) Certifications must be... certification in its cable franchise area, a statement that the applicant is qualified to operate an open video... that the applicant will comply with the Commission's notice and enrollment requirements for...

  2. 40 CFR 86.1848-10 - Certification.

    Science.gov (United States)

    2010-07-01

    ... be covered by the certificate(s). (ii) Failure to comply fully with the prohibition against selling... selling credits that are not generated or that are not available, as specified in § 86.1864-10, will be... paragraph (c)(9), effective July 6, 2010. For the convenience of the user, the added text is set forth as...

  3. 29 CFR 570.121 - Age certificates.

    Science.gov (United States)

    2010-07-01

    ... certificate furnishes protection to the employer as provided by the act only if it shows the minor to be above the minimum age applicable thereunder to the occupation in which he is employed. Thus, a State.... Pursuant to the regulations of the Secretary, State employment or age certificates are accepted as proof of...

  4. 10 CFR 431.36 - Compliance Certification.

    Science.gov (United States)

    2010-01-01

    ... number”) for any brand name, trademark or other label name under which the manufacturer or private... Certification, the Department will determine whether the document contains all of the elements required by this... Certification is acceptable, it will provide a unique CC number for any brand name, trademark or other name when...

  5. 48 CFR 1609.471 - Contractor certification.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor certification... EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Debarment, Suspension, and Ineligibility 1609.471 Contractor certification. All FEHBP carriers and applicant carriers...

  6. School Library Media Certification Requirements: 1990 Update.

    Science.gov (United States)

    Perritt, Patsy H.

    1990-01-01

    Presents a compilation of school library media certification requirements taken from responses to a national survey. For each state, existing certificates or endorsements are listed, along with credit hours and/or experience required, whether it is an accredited or approved program, and required subject areas or competencies. A directory of…

  7. Generic Certificates. Agricultural Economic Report Number 594.

    Science.gov (United States)

    Glauber, Joseph W.

    The Food Security Act of 1985 authorizes the U.S. Department of Agriculture to issue generic certificates in lieu of cash payments due to program participants and merchants of agricultural products under provisions of several programs. The certificates may be used to acquire stocks held as collateral on government loans or owned by the Commodity…

  8. 19 CFR 191.76 - Landing certificate.

    Science.gov (United States)

    2010-04-01

    ... landing certificate shall be waived by the requiring Customs authority if the claimant demonstrates... 19 Customs Duties 2 2010-04-01 2010-04-01 false Landing certificate. 191.76 Section 191.76 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY...

  9. White certificates: 14 concerned countries in Europe

    International Nuclear Information System (INIS)

    Signoret, Stephane

    2017-01-01

    Under the constraint of the European directive on energy efficiency, several countries have created or strengthened their white-certificate-type (or certificate of energy saving) obligation system. This article proposes brief overviews of the situation and implemented systems in Austria, Bulgaria, Croatia, Denmark, Greece, Ireland, Italy, Luxembourg, Poland, Slovenia, Spain, and United Kingdom

  10. 28 CFR 26.23 - Certification process.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Certification process. 26.23 Section 26.23 Judicial Administration DEPARTMENT OF JUSTICE DEATH SENTENCES PROCEDURES Certification Process for... mechanism for providing legal representation to indigent prisoners in state postconviction proceedings in...

  11. 9 CFR 93.913 - Health certificate.

    Science.gov (United States)

    2010-01-01

    ... who issues the health certificate. (2) Cleaning and disinfection must be sufficient to neutralize any VHS virus to which shipping containers may have been exposed. (3) The cleaning and disinfection protocols used must be referenced in the health certificate or in a separate cleaning and disinfection...

  12. 29 CFR 1926.29 - Acceptable certifications.

    Science.gov (United States)

    2010-07-01

    ... Acceptable certifications. (a) Pressure vessels. Current and valid certification by an insurance company or... by an insurance company or regulatory authority attesting to the safe installation, inspection, and... types of pressure vessels and similar equipment are contained in subparts F and O of this part. ...

  13. How the CEA sorts out its certifications

    International Nuclear Information System (INIS)

    Lembezat, C.

    2011-01-01

    In order to better manage its numerous certifications, the French CEA decided to implement an integrated management system. It aims at simplifying these certifications, at sharing best practices, and at obtaining a better efficiency. For this project, i.e. the management of quality, safety and environment, the CEA asked for the support of experts in integrated complex system management

  14. Maintenance of Certification: Perceptions and Attitudes of Neurosurgeons.

    Science.gov (United States)

    Babu, Maya A; Liau, Linda M; Connolly, E Sander; Meyer, Fredric B

    2018-02-09

    Assuring clinical competence throughout the career of a neurosurgeon is of paramount importance for patient safety. We present the first comprehensive survey of all neurosurgeons board certified through the American Board of Neurological Surgery (ABNS) to evaluate perceptions of Maintenance of Certification (MOC). We administered a validated, online, confidential survey to 4899 neurosurgeons (2435 ABNS diplomates participating in MOC, 1440 diplomates certified prior to 1999 [time-unlimited certificates], and 1024 retired diplomates). We received 1449 responses overall (30% response rate). Our study found that most respondents believe that neurosurgeons should be required to participate in continuing professional improvement following initial board certification (75%). Most believe that specialty boards, working in conjunction with specialty societies, should require diplomates to participate in programs meant to promote continuous professional development (73%). The majority of respondents (76%) believed that self-assessment tests constituted a meaningful professional development activity, in addition to periodic case log reviews (33%) or quality improvement projects (32.6%). A plurality of respondents (44%) do not feel that the MOC process as currently structured provides them with value. There were no differences between those who were "grandfathered" and those who actively participate in MOC and no differences between those in private practice versus those in academics. The ABNS is cognizant of diplomate concerns and is actively developing new MOC paradigms to ensure that the process achieves both the goals of meeting the public interest and assuring that the quality of American neurosurgery remains exemplary. Copyright © 2018 by the Congress of Neurological Surgeons.

  15. Certification of Corporate Social Responsibility in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Eva Abramuszkinová Pavlíková

    2013-01-01

    Full Text Available Corporate social responsibility is in the focus of many companies in recent years. It becomes a way of sustainability for many companies on the market. It expresses a voluntary commitment of companies to behave responsibly to their surroundings within three pillars: economic, social and environmental one. The issue of social responsibility is developing in many European countries and European Commission is aiming at support for national CSR strategies. There are countries with highly developed CSR, on the other hand there are countries, such as the Czech Republic, where a public policy is being reformed, including discussions about CSR. This paper supports the idea that states should encourage social responsibility, as it allows businesses to become sustainable which leads to the stability of the economy. CSR activities can be focused on philanthropy, the care of the employees, the environment and transparency of economic activities. The process of CSR certification is important in the development of CSR in the Czech Republic. It allows companies to demonstrate their activities and visible achievements in this field. This paper describes the most popular types of certifications that are used in the Czech Republic and standards that do not have certification purposes, but they are very important. These are standards SA 8000, ISO 26000, ISO 9001, ISO 9004, ISO 9000, ISO 14001, ISO 14004, OHSAS 18001, IQNet SR 10 and the National Quality Policy.

  16. National Certification Standard for Ground Source Heat Pump Personnel

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, John [Geothermal Heat Pump Consortium, Washington, DC (United States)

    2013-07-31

    The National Certification Standard for the Geothermal Heat Pump Industry adds to the understanding of the barriers to rapid growth of the geothermal heat pump (GHP) industry by bringing together for the first time an analysis of the roles and responsibilities of each of the individual job tasks involved in the design and installation of GHP systems. The standard addresses applicable qualifications for all primary personnel involved in the design, installation, commissioning, operation and maintenance of GHP systems, including their knowledge, skills and abilities. The resulting standard serves as a foundation for subsequent development of curriculum, training and certification programs, which are not included in the scope of this project, but are briefly addressed in the standard to describe ways in which the standard developed in this project may form a foundation to support further progress in accomplishing those other efforts. Follow-on efforts may use the standard developed in this project to improve the technical effectiveness and economic feasibility of curriculum development and training programs for GHP industry personnel, by providing a more complete and objective assessment of the individual job tasks necessary for successful implementation of GHP systems. When incorporated into future certification programs for GHP personnel, the standard will facilitate increased consumer confidence in GHP technology, reduce the potential for improperly installed GHP systems, and assure GHP system quality and performance, all of which benefit the public through improved energy efficiency and mitigated environmental impacts of the heating and cooling of homes and businesses.

  17. Reporting of meticillin-resistant and -susceptible Staphylococcus aureus on death certificates in Irish hospitals.

    LENUS (Irish Health Repository)

    Collins, C J

    2011-02-01

    The documentation of infection with meticillin-resistant Staphylococcus aureus (MRSA) on death certificates has been the subject of considerable public discussion. Using data from five tertiary referral hospitals in Ireland, we compared the documentation of MRSA and meticillin-susceptible S. aureus (MSSA) on death certificates in those patients who died in hospital within 30 days of having MRSA or MSSA isolated from blood cultures. A total of 133 patients had MRSA or MSSA isolated from blood cultures within 30 days of death during the study period. One patient was excluded as the death certificate information was not available; the other 132 patients were eligible for inclusion. MRSA and MSSA were isolated from blood cultures in 59 (44.4%) and 74 (55.6%) cases respectively. One patient was included as a case in both categories as both MRSA and MSSA were isolated from a blood culture. In 15 (25.4%) of the 59 MRSA cases, MRSA was documented on the death certificate. In nine (12.2%) of the 74 patients with MSSA cases, MSSA was documented on the death certificate. MRSA was more likely to be documented on the death certificate than MSSA (odds ratio: 2.46; 95% confidence interval: 1.01-6.01; P < 0.05). These findings indicate that there may be inconsistencies in the way organisms and infections are documented on death certificates in Ireland and that death certification data may underestimate the mortality related to certain organisms. In particular, there appears to be an overemphasis by certifiers on the documentation of MRSA compared with MSSA.

  18. Certification and equity: Applying an “equity framework” to compare certification schemes across product sectors and scales

    International Nuclear Information System (INIS)

    McDermott, Constance L.

    2013-01-01

    -scale corporate actors. Scheme priorities are reflected in scheme standards. Schemes where producers are the primary subjects of equity are less prescriptive about safeguarding non-producer interests. A focus on non-producers, in contrast, leads to more prescriptive requirements to protect the environment and/or other actors not involved in production. Finally, there is a significant gap between the ways that schemes frame equity and the outcomes. Contextual factors such as land and resource ownership, supply chain structures, export dependence and the organizational capacity of different stakeholders play a key role in shaping certification uptake and benefit distribution. Hence, the distribution of certificates largely mirrors existing patterns of global trade. While envirosocial certification has likely increased the overall influence of Northern NGOs relative to industrial producers, the balance of power between these two interest groups has been a constant point of contention. Meanwhile, without further deliberative strategies aimed at addressing contextual barriers to participation, certification is likely to exacerbate inequalities among other stakeholders and regions

  19. Certification Considerations for Adaptive Systems

    Science.gov (United States)

    Bhattacharyya, Siddhartha; Cofer, Darren; Musliner, David J.; Mueller, Joseph; Engstrom, Eric

    2015-01-01

    Advanced capabilities planned for the next generation of aircraft, including those that will operate within the Next Generation Air Transportation System (NextGen), will necessarily include complex new algorithms and non-traditional software elements. These aircraft will likely incorporate adaptive control algorithms that will provide enhanced safety, autonomy, and robustness during adverse conditions. Unmanned aircraft will operate alongside manned aircraft in the National Airspace (NAS), with intelligent software performing the high-level decision-making functions normally performed by human pilots. Even human-piloted aircraft will necessarily include more autonomy. However, there are serious barriers to the deployment of new capabilities, especially for those based upon software including adaptive control (AC) and artificial intelligence (AI) algorithms. Current civil aviation certification processes are based on the idea that the correct behavior of a system must be completely specified and verified prior to operation. This report by Rockwell Collins and SIFT documents our comprehensive study of the state of the art in intelligent and adaptive algorithms for the civil aviation domain, categorizing the approaches used and identifying gaps and challenges associated with certification of each approach.

  20. Commission decision on the Department of Water Resources' Application for Certification for the Bottle Rock Geothermal Project

    Energy Technology Data Exchange (ETDEWEB)

    1980-11-01

    The Application for Certification for the construction of a 55 MW geothermal power plant and related facilities in Lake County was approved subject to terms identified in the Final Decision. The following are covered: findings on compliance with statutory site-certification requirements; final environmental impact report; procedural steps; evidentiary bases; need, environmental resources; public health and safety; plant and site safety and reliability; socioeconomic, land use, and cultural concerns, and transmission tap line. (MHR)