9 resultados para Generic Security Services Application Program Interface (GSS-API)
em Universidade Federal do Rio Grande do Norte(UFRN)
Resumo:
Java Card technology allows the development and execution of small applications embedded in smart cards. A Java Card application is composed of an external card client and of an application in the card that implements the services available to the client by means of an Application Programming Interface (API). Usually, these applications manipulate and store important information, such as cash and confidential data of their owners. Thus, it is necessary to adopt rigor on developing a smart card application to improve its quality and trustworthiness. The use of formal methods on the development of these applications is a way to reach these quality requirements. The B method is one of the many formal methods for system specification. The development in B starts with the functional specification of the system, continues with the application of some optional refinements to the specification and, from the last level of refinement, it is possible to generate code for some programming language. The B formalism has a good tool support and its application to Java Card is adequate since the specification and development of APIs is one of the major applications of B. The BSmart method proposed here aims to promote the rigorous development of Java Card applications up to the generation of its code, based on the refinement of its formal specification described in the B notation. This development is supported by the BSmart tool, that is composed of some programs that automate each stage of the method; and by a library of B modules and Java Card classes that model primitive types, essential Java Card API classes and reusable data structures
Resumo:
In the sociability of the capital, the challenges to the consolidation of social security as a public policy become expressive, which has implications for social security services, particularly for Social Works who works for the security and fulfillment of social rights. Therefore, in this context of denial of these rights becomes relevant the work of social worker, as a professional committed to the ethical-political project and the Matrix Theory and Methodology of Social work, which potentiate the action able to establish professional articulated strategies for the strengthening of collective struggles for equality in society. Thus, this study examines the instrumentality of social work in the contemporary world and its contribution to the realization of rights. For this, we conducted a literature review, using authors dealing with the issue, as Behring (2008), Boschetti (2003), Mota (1995), Guerra (2007) among others, as well as documentary research through laws, decrees, instructions Normative, Internal Guidelines, and especially the analysis of the Matrix itself of Social Work in welfare. We use also of paramount importance to our analysis - the field research, using techniques such as semi-structured interview and questionnaire. The research enables the identification of important aspects of the subject studied, as the understanding of professionals about the instrumentality of Social Works in its ethical-political aspects, both theoretical and methodological and technicaloperative. The demands made by the managers for the profession on the sociooccupational have extrapolated the powers and duties of the Law Regulating the Profession and the Matrix of Social Work in welfare. The subjects of this study emphasize the role of social category of the National Institute of Social Security and the Federal Council of Social Service in defense of Social Works. The knowledge of social and institutional framework is critical to building control strategies that strengthen social security and public policy, the guarantor of social rights for workers in Brazil
Resumo:
PEDRINI, Aldomar; SZOKOLAY, Steven. Recomendações para o desenvolvimento de uma ferramenta de suporte às primeiras decisões projetuais visando ao desempenho energético de edificações de escritório em clima quente. Ambiente Construído, Porto Alegre, v. 5, n. 1, p.39-54, jan./mar. 2005. Trimestral. Disponível em:
Resumo:
This research aims to systematize a proposal of developing a mobile tablet application in order to help implementing the Semantic Differential technique – SD, under the approach of Participatory Design. In 1975, Osgood et al. created the Semantic Differential technique. Since then, many experiments use it to measure the affective perception of individuals concerning objects and concepts by means of compounded scales of bipolar adjectives, based on the theoretical models that support the technique: the conductible, spatial and metric models. During the application of the technique with potential users, the researcher must simultaneously manage several contexts, that is, audio recorder, when authorized, and observe and record spontaneous reports of the respondent. It is noticeable that often occurs a cognitive overload during this event. Thus, the use of a single application whose interface is assigned to its users and respondents could assist researchers in applying the SD technique. This research aimed to understand the processes inherent to the task of implementing the Semantic Differential technique and obeyed the following steps: a) training of users, b) background questionnaire c) interview with Focus Group, and d) cooperative evaluation. Besides these procedures, one can also observe the degrees of facilitation or difficulty concerning the use of the conventional model, which is the development and application of scales with the aid of printed material, pencil, pens, clipboards, and recorder software for editing the document and data analysis. This paper comprises reactions and impressions from the experiences of users of SD technique. Considering the data recollected from the user’s observation, the hypothesis of the experiment proved to be right. It means that the development of the application for mobile tablet employing the technique of Semantic Differential is viable, since it assembles all the steps in one only tool, increases the accomplishment of the task between user/researcher and user/respondent resulting in their mutual satisfaction.
Resumo:
PEDRINI, Aldomar; SZOKOLAY, Steven. Recomendações para o desenvolvimento de uma ferramenta de suporte às primeiras decisões projetuais visando ao desempenho energético de edificações de escritório em clima quente. Ambiente Construído, Porto Alegre, v. 5, n. 1, p.39-54, jan./mar. 2005. Trimestral. Disponível em:
Resumo:
Based on the presupposition that the arts in the West always counted on resources, supports, and devices pertaining to its time context, an reflection is intended regarding the scenic compositions mediated by digital technologies do. Such technologies are inserted in the daily routine, also composing artistic experiments, thus playing a dialogical role with the art/technology intersection. Therefore, the proposal is to investigate what relationships are established in the contemporary theatrical scene from the contagion by digital technologies, aiming at establishing this parallel through a dialogue with the authors discussing the subject, and also based on the group practices having technological resources as a determinant factor in their plays. Furthermore, a reflection should be made on the scene that incorporates or is carried out in intermediatic events, analyzing how digital technologies (re)configure compositional processes of the plays by GAG Phila7, in the city of São Paulo/SP. For such, the dissertation is organized in three sections comprising four moments, to wit: brief overview of the field, contextualization, poetic analysis and synthesis. Qualitative methods are used as the methodological proposal: semi-structure interview, note and document taking (program, website, playing book, disclosure material for advertising text, photographs, and videos). Within the universe of qualitative research, it works with the epistemological perspective of the Gadamer philosophical hermeneutics. The possibilities allowed by the double virtual (Internet/web) generated a type of theater with another material basis and new forms of organization and structure, being possible to perceive that such technological advances and the arts are mutually contaminated, generating a dislocation in the logics of theatrical composition, movement beginning with the artistic vanguards, gradually intensified, thus offering new possibilities of constructions and hybridization of the of the most different possible types. Experiment ―Profanações_superfície de eventos de construção coletiva‖, idealized by Phila7 is inserted in this perspective. Object of the discussion of such research, the experiment works with possible poetics arising from the intersection with the digital technologies, aiming at identifying and problematizing the challenges from the technological evolution and expansion in a scenic context
Resumo:
This dissertation aims to understand the importance of the National School Feeding as a strategy for ensuring the promotion of food and nutrition security in the municipality of Macaíba / RN, taking into account the implementation of the Law School Feeding, 11,947, 2009. The program was extended to all public basic education, youth and adults, in addition to ensuring that 30% of transfers from FNDE, were intended for the purchase of products from family farms. The survey was conducted with 160 students from public schools and farmers nesting Quilombo dos Palmares II, who produce on their land vegetables, fruits and cereals for their own consumption, for sale in local markets, in addition to providing for PNAE. The reciprocity between neighbors, such as mutual aid and sharing of common goods was noticeable in this group of farmers, since it was necessary to meet weekly deliveries of products to schools. As students, we applied a test of acceptability in two schools located in rural and in urban areas, to learn the opinion of ourselves in relation to school food consumed. It was concluded that to be most effective program in the region, there must be a better match in school menus, so that it can be attractive to students and to ensure greater use of fresh food, the main ingredient of same, practice of nutrition education in schools, to teach students the importance of food to health. In relation to local management, noted the need for adjustments bureaucratic as hiring staff for the departments, in order to be more agile in releasing payments to farmers, in addition to hiring assistants general services for schools, one Since the cooks exert dual role, the cooking while being responsible for cleaning the entire school environment. Government investments in the rural sector would be extremely valuable for farmers, since they need financial resources to purchase inputs, irrigation projects for gardens, availability of land for planting, transportation to facilitate the delivery of its products to schools and technical assistance more frequently
Resumo:
The electronic mail service is one of the most Internet services that grow in the corporate environment. This evolution is bringing several problems for the organizations, especially to information that circulates inside of the corporate net. The lack of correct orientation to the people, about the usage and the security importance of these resources, is leaving breaches and causing misusage and overuse of service, for example. In recent literature, it starts to coming out several ideas, which has helped to rganizations how to plain and how to implement the information security system to the electronic mail in computer environment. However, these ideas are still not placed in practice in many companies, public or private. This dissertation tries to demonstrate the results of a research that has like goal, identify the importance that user training has over the information security policy, through a case study inside of private superior education institute in this state. Besides, this work had by basic orientation the ISO/IEC 17799, which talk about People Security. This study was developed over a proposed model to this research, which looked for offer conditions to guide the institution studied, how to plan better a information security policy to the electronic mail. Also, this research has an exploratory and descreptive nature and your type, qualitative. Firstly, it was applied na questionary to the information technology manager, as better way to get some general data and to deepen the contact which still then, it was being kept through e-mail. Thereupon this first contact, eleven interviews were done with the same manager, beside one interview with twenty-four users, among employees e students. After that to collect and transcript the interviews, were review with the manager all informations given, to correct any mistakes and to update that informations, to then, start the data analyze. The research suggests that the institution has a pro attitude about the information security policy and the electronic mail usage. However, it was clear that answers have their perception about information security under a very inexperient way, derived of a planning lack in relation to training program capable to solve the problem
Resumo:
Nowadays due to the security vulnerability of distributed systems, it is needed mechanisms to guarantee the security requirements of distributed objects communications. Middleware Platforms component integration platforms provide security functions that typically offer services for auditing, for guarantee messages protection, authentication, and access control. In order to support these functions, middleware platforms use digital certificates that are provided and managed by external entities. However, most middleware platforms do not define requirements to get, to maintain, to validate and to delegate digital certificates. In addition, most digital certification systems use X.509 certificates that are complex and have a lot of attributes. In order to address these problems, this work proposes a digital certification generic service for middleware platforms. This service provides flexibility via the joint use of public key certificates, to implement the authentication function, and attributes certificates to the authorization function. It also supports delegation. Certificate based access control is transparent for objects. The proposed service defines the digital certificate format, the store and retrieval system, certificate validation and support for delegation. In order to validate the proposed architecture, this work presents the implementation of the digital certification service for the CORBA middleware platform and a case study that illustrates the service functionalities