2 resultados para Resource Description and Access (RDA)

em DigitalCommons@University of Nebraska - Lincoln


Relevância:

100.00% 100.00%

Publicador:

Resumo:

ABSTRACT This thesis will determine if there is a discrepancy between how literature defines conservation, preservation, and restoration, and how natural resource professionals define these terms. Interviews were conducted with six professionals from six different agencies that deal with natural resources. These agencies consisted of both government and non-government groups. In addition to interviewing these professionals regarding how they define the terms, they were asked where their work fits into the context of these terms. The interviewees’ responses were then compared with the literature to determine inconsistencies with the use of these terms in the literature and real world settings. The literature and the interviewees have agreed on the term conservation. There are some different points of view about preservation, some see it as ‘no management’ and some others see it as keeping things the same or ‘static.’ Restoration was the term where both the literature and professionals thought of moving an ecosystem from one point of succession or community, to another point on a continuum. The only thing in which they disagree on is the final goal of a restoration project. The literature would suggest restoring the ecosystem to a past historic condition, where the interviewees said to restore it to the best of their abilities and to a functioning ecosystem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for set- UP).