969 resultados para zone-based policy


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The economic and financial crisis of 2007/2009 has posed unexpected challenges on both the global and the regional level. Besides the US, the EU has been the most severely hit by the current economic crisis. The financial and banking crisis on the one hand and the sovereign debt crisis on the other hand have clearly shown that without a bold, constructive and systematic change of the economic governance structure of the Union, not just the sustainability of the monetary zone but also the viability of the whole European integration process can be seriously undermined. The current crisis is, however, only a symptom, which made all those contradictions overt that were already heavily embedded in the system. Right from the very beginning, the deficit and the debt rules of the Maastricht Treaty and the Stability and Growth Pact have proved to be controversial cornerstones in the fiscal governance framework of the European Economic and Monetary Union (EMU). Yet, member states of the EU (both within and outside of the EMU) have shown an immense interest in adopting numerical constraints on the domestic level without hesitation. The main argument for the introduction of national fiscal rules was mostly to strengthen the accountability and credibility of national fiscal policy-making. The paper, however, claims that a relatively large portion of national rules were adopted only after the start of deceleration of the debt-to-GDP ratios. Accordingly, national rules were hardly the sole triggering factors of maintaining fiscal discipline; rather, they served as the key elements of a comprehensive reform package of public budgeting. It can be safely argued, therefore, that countries decide to adopt fiscal rules because they want to explicitly signal their strong commitment to fiscal discipline. In other words, it is not fiscal rules per se what matter in delivering fiscal stability but a strong political commitment.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing of geographically distributed and heterogeneous resources from commercial data centers and scientific institutions. Research in the areas of utility, grid and cloud computing, together with improvements in network and hardware virtualization has resulted in methods to locate and use resources to rapidly provision virtual environments in a flexible manner, while lowering costs for consumers and providers. ^ However, there is still a lack of methodologies to enable efficient and seamless sharing of resources among institutions. In this work, we concentrate in the problem of executing parallel scientific applications across distributed resources belonging to separate organizations. Our approach can be divided in three main points. First, we define and implement an interoperable grid protocol to distribute job workloads among partners with different middleware and execution resources. Second, we research and implement different policies for virtual resource provisioning and job-to-resource allocation, taking advantage of their cooperation to improve execution cost and performance. Third, we explore the consequences of on-demand provisioning and allocation in the problem of site-selection for the execution of parallel workloads, and propose new strategies to reduce job slowdown and overall cost.^

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Adaptation is an important requirement for mobile applications due to the varying levels of resource availability that characterizes mobile environments. However without proper control, multiple applications can each adapt independently in response to a range of different adaptive stimuli, causing conflicts or sub optimal performance. In this thesis we presented a framework, which enables multiple adaptation mechanisms to coexist on one platform. The key component of this framework was the 'Policy Server', which has all the system policies and governs the rules for adaptation. We also simulated our framework and subjected it to various adaptation scenarios to demonstrate the working of the system as a whole. With the help of the simulation it was shown that our framework enables seamless adaptation of multiple applications.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In competitive knowledge-based economies, policymakers recognize the importance of universities’ engagement in third mission activities. This article investigates how a specific policy approach to encourage third mission engagement—the use of performance-based funding to reward universities’ success in this domain—aligns with the broader goals of third mission policy. Considering the case of the UK, the first country to have implemented a system of this kind, we analyse how the system has come into being and how it has evolved, and we discuss whether its implementation is likely to encourage universities to behave in ways that are aligned with the goals of third mission policy, as outlined in government documents. We argue that the system encourages universities to focus on a narrow range of income-producing third mission activities, and this is not well aligned with the policy goal to support a complex innovation ecosystem comprising universities with different third mission objectives and strategies. The article concludes by proposing possible avenues for achieving greater alignment between incentives and policy goals.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Dados suplementares associados com este artigo disponíveis na versão online em: http://dx.doi.org/10.1016/j.marpol.2016.06.021

Relevância:

40.00% 40.00%

Publicador:

Resumo:

While SQL injection attacks have been plaguing web application systems for years, the possibility of them affecting RFID systems was only identified very recently. However, very little work exists to mitigate this serious security threat to RFID-enabled enterprise systems. In this paper, we propose a policy-based SQLIA detection and prevention method for RFID systems. The proposed technique creates data validation and sanitization policies during content analysis and enforces those policies during runtime monitoring. We tested all possible types of dynamic queries that may be generated in RFID systems with all possible types of attacks that can be mounted on those systems. We present an analysis and evaluation of the proposed approach to demonstrate the effectiveness of the proposed approach in mitigating SQLIA.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The increasing needs for computational power in areas such as weather simulation, genomics or Internet applications have led to sharing of geographically distributed and heterogeneous resources from commercial data centers and scientific institutions. Research in the areas of utility, grid and cloud computing, together with improvements in network and hardware virtualization has resulted in methods to locate and use resources to rapidly provision virtual environments in a flexible manner, while lowering costs for consumers and providers. However, there is still a lack of methodologies to enable efficient and seamless sharing of resources among institutions. In this work, we concentrate in the problem of executing parallel scientific applications across distributed resources belonging to separate organizations. Our approach can be divided in three main points. First, we define and implement an interoperable grid protocol to distribute job workloads among partners with different middleware and execution resources. Second, we research and implement different policies for virtual resource provisioning and job-to-resource allocation, taking advantage of their cooperation to improve execution cost and performance. Third, we explore the consequences of on-demand provisioning and allocation in the problem of site-selection for the execution of parallel workloads, and propose new strategies to reduce job slowdown and overall cost.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The chapter will set out to explain the KBUD and urban policy making processes in Queensland, Australia. This chapter will draw on providing a clear understanding on policy frameworks and relevant ICT applications of the Queensland ‘Smart State’ experience. The chapter is consisted of six sections. The first section following the introduction provides background information. The second section focuses on the KBUD processes in Queensland. The third section offers a comprehensive analysis of the ‘Queensland Smart State’ initiative, and it also identifies actors and goals of the agenda of Smart State experience. The fourth section reviews knowledge based development and ICT applications and policies of the Queensland Smart State and Brisbane Smart City experiences, and their impacts on Brisbane’s successful KBUD. The fifth section discusses knowledge hubs and ICT developments within the Brisbane metropolitan area. Then the chapter concludes with future trends and conclusion sections.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The importance of broadening community participation in environmental decision-making is widely recognized and lack of participation in this process appears to be a perennial problem. In this context, there have been calls from some academics for the more extensive use of geographic information systems (GIS) and distance learning technologies, accessible via the Internet, as a possible means to inform and empower communities. However, a number of problems exist. For instance, at present the scope for online interaction between policy-makers and citizens is currently limited. Contemporary web-based environmental information systems suffer from this lack of interactivity on the one hand and on the other hand from the apparent complexity for the lay user. This paper explores the issue of online community participation at the local level and attempts to construct a framework for a new (and potentially more effective) model of online participatory decision-making. The key components, system architecture and stages of such a model are introduced. This model, referred to as a ‘Community Based Interactive Environmental Decision Support System’, incorporates advanced information technologies, distance learning and community involvement tools which will be applied and evaluated in the field through a pilot project in Tokyo in the summer of 2002.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report investigates lessons learned by educators in the United States when providing a standards-based curriculum for all students including Students with Disabilities (SWD). Assumptions about implementation of these lessons are then made to the Queensland school system. Queensland mainstream schools currently provide a standards-based curriculum for over sixteen thousand-four hundred students with mild-moderate disabilities and appear to be challenged by this new educational reform and its implications to school and teacher practices, beliefs and attitudes. The analysis of US research, literature and educational policy for this report, has provided some implications for Queensland schools in the areas of student participation, achievement and curriculum planning to provide an “education for all”. The analysis and comparison of legislation and policy, which demonstrates some significant similarities, provides greater validity for the application of lessons learned in the United States to the Queensland context. The key findings about lessons learned provides Queensland schools with some assumptions as to why and how they need to refocus school leader and teachers’ practices, beliefs and attitudes to provide an “education for all”. These lessons infer that school leaders and teachers to explicitly focus on equity, expectation, accountability, performance, alignment and collaboration so that effective curriculum is provided for SWD, indeed all students, in the Queensland standards-based curriculum environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Under the Alien Tort Statute United States of America (“America”) Federal Courts have the jurisdiction to hear claims for civil wrongs, committed against non-American citizens, which were perpetrated outside America’s national borders. The operation of this law has confronted American Federal Courts with difficulties on how to manage conflicts between American executive foreign policy and judicial interpretations of international law. Courts began to pass judgment over conduct which was approved by foreign governments. Then in 2005 the American Supreme Court wound back the scope of the Alien Tort Statute. This article will review the problems with the expansion of the Alien Tort Statute and the reasons for its subsequent narrowing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Key topics: Since the birth of the Open Source movement in the mid-80's, open source software has become more and more widespread. Amongst others, the Linux operating system, the Apache web server and the Firefox internet explorer have taken substantial market shares to their proprietary competitors. Open source software is governed by particular types of licenses. As proprietary licenses only allow the software's use in exchange for a fee, open source licenses grant users more rights like the free use, free copy, free modification and free distribution of the software, as well as free access to the source code. This new phenomenon has raised many managerial questions: organizational issues related to the system of governance that underlie such open source communities (Raymond, 1999a; Lerner and Tirole, 2002; Lee and Cole 2003; Mockus et al. 2000; Tuomi, 2000; Demil and Lecocq, 2006; O'Mahony and Ferraro, 2007;Fleming and Waguespack, 2007), collaborative innovation issues (Von Hippel, 2003; Von Krogh et al., 2003; Von Hippel and Von Krogh, 2003; Dahlander, 2005; Osterloh, 2007; David, 2008), issues related to the nature as well as the motivations of developers (Lerner and Tirole, 2002; Hertel, 2003; Dahlander and McKelvey, 2005; Jeppesen and Frederiksen, 2006), public policy and innovation issues (Jullien and Zimmermann, 2005; Lee, 2006), technological competitions issues related to standard battles between proprietary and open source software (Bonaccorsi and Rossi, 2003; Bonaccorsi et al. 2004, Economides and Katsamakas, 2005; Chen, 2007), intellectual property rights and licensing issues (Laat 2005; Lerner and Tirole, 2005; Gambardella, 2006; Determann et al., 2007). A major unresolved issue concerns open source business models and revenue capture, given that open source licenses imply no fee for users. On this topic, articles show that a commercial activity based on open source software is possible, as they describe different possible ways of doing business around open source (Raymond, 1999; Dahlander, 2004; Daffara, 2007; Bonaccorsi and Merito, 2007). These studies usually look at open source-based companies. Open source-based companies encompass a wide range of firms with different categories of activities: providers of packaged open source solutions, IT Services&Software Engineering firms and open source software publishers. However, business models implications are different for each of these categories: providers of packaged solutions and IT Services&Software Engineering firms' activities are based on software developed outside their boundaries, whereas commercial software publishers sponsor the development of the open source software. This paper focuses on open source software publishers' business models as this issue is even more crucial for this category of firms which take the risk of investing in the development of the software. Literature at last identifies and depicts only two generic types of business models for open source software publishers: the business models of ''bundling'' (Pal and Madanmohan, 2002; Dahlander 2004) and the dual licensing business models (Välimäki, 2003; Comino and Manenti, 2007). Nevertheless, these business models are not applicable in all circumstances. Methodology: The objectives of this paper are: (1) to explore in which contexts the two generic business models described in literature can be implemented successfully and (2) to depict an additional business model for open source software publishers which can be used in a different context. To do so, this paper draws upon an explorative case study of IdealX, a French open source security software publisher. This case study consists in a series of 3 interviews conducted between February 2005 and April 2006 with the co-founder and the business manager. It aims at depicting the process of IdealX's search for the appropriate business model between its creation in 2000 and 2006. This software publisher has tried both generic types of open source software publishers' business models before designing its own. Consequently, through IdealX's trials and errors, I investigate the conditions under which such generic business models can be effective. Moreover, this study describes the business model finally designed and adopted by IdealX: an additional open source software publisher's business model based on the principle of ''mutualisation'', which is applicable in a different context. Results and implications: Finally, this article contributes to ongoing empirical work within entrepreneurship and strategic management on open source software publishers' business models: it provides the characteristics of three generic business models (the business model of bundling, the dual licensing business model and the business model of mutualisation) as well as conditions under which they can be successfully implemented (regarding the type of product developed and the competencies of the firm). This paper also goes further into the traditional concept of business model used by scholars in the open source related literature. In this article, a business model is not only considered as a way of generating incomes (''revenue model'' (Amit and Zott, 2001)), but rather as the necessary conjunction of value creation and value capture, according to the recent literature about business models (Amit and Zott, 2001; Chresbrough and Rosenblum, 2002; Teece, 2007). Consequently, this paper analyses the business models from these two components' point of view.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The highway express freight transportation (HEFT) is a new transportation organization form separated from the common freight transportation with economic development and incessant adjustment of highway transportation structure in China. At present, the phenomenon of inadaptability still exists in the HEFT system of China, from foundation structure like highways, parking lots and stations to transportation equipments and transportation organizing. In order to develop the HEFT system more rationally and effectively, we should start with the structure of the system, conform the resources existing, and consummate the freight transport system. In due course, relevant policies and measures to supervise, lead and support are necessary and important. This paper analyzes the existing problems of HEFT system in our country, based on its characteristics, development situation and adaptability, and presents the policy and measures of promoting and leading the development of the HEFT system.