303 resultados para Airworthiness certificates.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is currently much interest in the appropriate use of obstetrical technology, cost containment and meeting consumers' needs for safe and satisfying maternity care. At the same time, there has been an increase in professionally unattended home births. In response, a new type of service, the out-of-hospital childbearing center (CBC) has been developed which is administratively and structurally separate from the hospital. In the CBC, maternity care is provided by certified nurse-midwives to carefully screened low risk childbearing families in conjunction with physician and hospital back-up.^ It was the purpose of this study to accomplish the following objectives: (1) To describe in a historical prospective study the demographic and medical-obstetric characteristics of patients laboring in eleven selected out-of-hospital childbearing centers in the United States from May 1, 1972, to December 15, 1979. Labor is defined as the onset of regular contractions as determined by the patient. (2) To describe any differences between those patients who require transfer to a back-up hospital and those who do not. (3) To describe administrative and service characteristics of eleven selected out-of-hospital childbearing centers in the United States. (4) To compare the demographic and medical-obstetric characteristics of women laboring in eleven selected out-of-hospital childbearing centers with a national sample of women of similar obstetric risk who according to birth certificates delivered legitimate infants in a hospital setting in the United States in 1972.^ Research concerning CBCs and supportive to the development of CBCs including studies which identified factors associated with fetal and perinatal morbidity and mortality, obstetrical risk screening, and the progress of technological development in obstetrics were reviewed. Information concerning the organization and delivery of care at each selected CBC was also collected and analyzed.^ A stratified, systematic sample of 1938 low risk women who began labor in a selected CBC were included in the study. These women were not unlike those described previously in small single center studies reported in the literature. The mean age was 25 years. Sixty-three per cent were white, 34 per cent Hispanic, 88 per cent married, 45 per cent had completed at least two years of college, nearly one-third were professionals and over a third were housewives. . . . (Author's abstract exceeds stipulated maximum length. Discontinued here with permission of school.) UMI ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En este trabajo analizaremos los lazos sociales mantenidos y generados por los inmigrantes gallegos en el Buenos Aires tardo colonial, con otros familiares y paisanos instalados en la capital virreinal o en la tierra natal. Tomaremos en consideración los aportes del Análisis de Redes a los estudios migratorios y a partir de ello identificaremos las redes étnicas y los mecanismos sociales que las activaron. Nos basaremos en un conjunto variado de fuentes (las actas matrimoniales, las sucesiones testamentarias, los padrones de habitantes y expedientes varios localizados en el Archivo General de la Nación Argentina) que nos permitirán examinar las diferentes vías (el ejercicio comercial, los matrimonios, el temprano asociacionismo, las disposiciones testamentarias, entre otras) a través de las cuales los inmigrantes establecieron los contactos sociales en cuestión. De este modo, constataremos el componente afectivo e identificatorio que pudo orientar los lazos étnicos y su importante funcionalidad instrumental, en un contexto donde el inmigrante necesitaba garantizar su integración en la sociedad de acogida. El estudio también pondrá de manifiesto que, sin llegar a constituirse en un “grupo cerrado", los oriundos de Galicia reforzaron sus vínculos entre sí, cuando fue posible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El objetivo del artículo es analizar la apropiación de la tierra a través de la legalización de títulos precarios ocurrida en la segunda mitad del siglo XIX en la región pampeana argentina. Para ello, se recurrió a un recorte temporal y espacial y aun abordaje cualitativo de documentación judicial, notarial y catastral, relacionada con los inmuebles afectados por mercedes o denuncias coloniales, correspondientes al departamento Rio Cuarto.
Una de las principales conclusiones alcanzadas es que por medio de la legitimación de derechos precarios se constituyó un grupo de grandes propietarios de reciente vinculación con la tierra

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El objetivo del artículo es analizar la apropiación de la tierra a través de la legalización de títulos precarios ocurrida en la segunda mitad del siglo XIX en la región pampeana argentina. Para ello, se recurrió a un recorte temporal y espacial y aun abordaje cualitativo de documentación judicial, notarial y catastral, relacionada con los inmuebles afectados por mercedes o denuncias coloniales, correspondientes al departamento Rio Cuarto.
Una de las principales conclusiones alcanzadas es que por medio de la legitimación de derechos precarios se constituyó un grupo de grandes propietarios de reciente vinculación con la tierra

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El objetivo del artículo es analizar la apropiación de la tierra a través de la legalización de títulos precarios ocurrida en la segunda mitad del siglo XIX en la región pampeana argentina. Para ello, se recurrió a un recorte temporal y espacial y aun abordaje cualitativo de documentación judicial, notarial y catastral, relacionada con los inmuebles afectados por mercedes o denuncias coloniales, correspondientes al departamento Rio Cuarto.
Una de las principales conclusiones alcanzadas es que por medio de la legitimación de derechos precarios se constituyó un grupo de grandes propietarios de reciente vinculación con la tierra

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El objetivo del artículo es analizar la apropiación de la tierra a través de la legalización de títulos precarios ocurrida en la segunda mitad del siglo XIX en la región pampeana argentina. Para ello, se recurrió a un recorte temporal y espacial y aun abordaje cualitativo de documentación judicial, notarial y catastral, relacionada con los inmuebles afectados por mercedes o denuncias coloniales, correspondientes al departamento Rio Cuarto.
Una de las principales conclusiones alcanzadas es que por medio de la legitimación de derechos precarios se constituyó un grupo de grandes propietarios de reciente vinculación con la tierra

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the legal feasibility of different design options for implementing a differentiated electricity tax based on renewable energy (RE) certificates aimed at promoting green electricity generation. It discusses the issue of likeness in light of the recent WTO jurisprudence and looks at the possibility of justification of differentiated tax rates under the general exceptions of the GATT. It also scrutinizes the potential legal hurdles for the implementation of different tax design options including the use of certificates for RE tax exemption. It argues that the placing of a quota on the number of foreign RE certificates eligible for tax exemptions would likely affect the volumes of imported green electricity and therefore trigger a violation of GATT rules. At the same time, restrictions on the eligibility of RE certificates might be defended under WTO law if they are based on qualitative criteria, such as the attachment of RE certificates to green electricity flows or to a green electricity label that is equally available to domestic and foreign suppliers of RE electricity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper empirically examines what kinds of elements affect the gap in free trade agreement (FTA) utilization with regard to customs data and certificates of origin (CoOs) data. We focus on Thai exports to Korea under the ASEAN-Korea FTA in 2011. As a result, we found that the products with the higher demand volatility or those with a larger number of tariff-line products within the same harmonized system (HS) six-digit code have the larger gap. Another important finding is that the difference between the HS version at the time of the FTA negotiation and the current HS version does not have significant association with the gap. These findings have important implications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The literature on the use of free trade agreements (FTAs) has recently been growing because it is becoming more important to encourage the use of current FTAs than to increase the number of FTAs. In this paper, we discuss some practical issues in the computation of FTA utilization rates, which provide a useful measure to discover how much FTA schemes are used in trade. For example, compared with the use of customs data on FTA utilization in imports, when using certificates of origin data on FTA utilization in exports, there are several points about which we should be careful. Our practical guidance on the computation of FTA utilization rates will be helpful when computing such rates and in examining the determinants of those rates empirically.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La estrategia i2010 de la UE tiene como objetivo garantizar el liderazgo europeo en materia de TIC y poner los beneficios de la Sociedad de la Información al servicio de la economía, la sociedad y la calidad de vida personal, teniendo presente que los éxitos de Europa hasta la fecha se han basado en favorecer la competencia leal en los mercados de las telecomunicaciones y crear un mercado sin fronteras para contenidos y medios de comunicación digitales. En esta línea, la Comisión Europea ha establecido que los distintos estados miembros deben contribuir activamente al desarrollo y uso seguro de los servicios telemáticos entre sus ciudadanos. Más concretamente, atribuye a las Administraciones Públicas, tanto a nivel nacional, regional como local, un papel dinamizador de la Sociedad de la Información que les obliga a ofrecer paulatinamente todos los actos administrativos a los ciudadanos a través de Internet. Como primer paso para el uso seguro de los servicios telemáticos que ofrecen las instituciones públicas se hace preciso dotar a los ciudadanos de una identidad digital que les permita identificarse ante un Proveedor de Servicio o ante otros ciudadanos de manera inequívoca. Por esta razón, la mayoría de países europeos – y otros en el resto del mundo – están promoviendo, sistemas fiables de gestión de identidad electrónica (eIDM), de tal manera que los ciudadanos, las empresas y departamentos gubernamentales (incluso en Estados miembros diferentes) pueden identificar y certificar sus operaciones con precisión, rapidez y sencillez. Sin embargo, la gestión de esta identidad por las Administraciones Públicas supone un importante desafío, acentuado cuando se hace necesaria la interoperabilidad entre Administraciones de diferentes países, puesto que personas y entidades tienen credenciales de identificación diferentes en función de su propio marco jurídico nacional. Consciente del problema, en la Unión Europea se han puesto en marcha una serie de proyectos con el objetivo de conseguir la interoperabilidad de los eIDMs entre las instituciones públicas de diferentes Estados miembros. A pesar de ello, las soluciones adoptadas hasta la fecha son insuficientes porque no prevén todos los posibles casos de interacción del usuario con las instituciones. En concreto, no tienen en cuenta un aspecto muy importante que se ofrece en los distintos sistemas jurídicos nacionales, a saber, la delegación de la identidad, mediante la cual un ciudadano puede autorizar a otro para que actúe en su nombre para acceder a determinados servicios prestados por las instituciones públicas. En esta tesis se realizan un conjunto de aportaciones que dan solución a distintos aspectos de los problemas planteados y que, de forma conjunta, permiten la interoperabilidad y la delegación de identidad en determinados Sistemas de Gestión de Identidad aplicados al entorno de las Administraciones Públicas. En el caso de la delegación, se ha definido un sistema de delegación dinámica de identidad entre dos entidades genéricas que permite solucionar el problema del acceso delegado a los servicios telemáticos ofrecidos por las Administraciones Públicas. La solución propuesta se basa en la generación de un token de delegación, constituido a partir de un Certificado Proxy, que permite a la entidad que delega establecer la delegación de identidad en otra entidad en base a un subconjunto de sus atributos como delegador, estableciendo además, en el propio token de delegación, restricciones en el conjunto de servicios accesibles a la entidad delegada y el tiempo de validez de la delegación. Adicionalmente, se presentan los mecanismos necesarios tanto para poder revocar un token de delegación como para comprobar sin un token de delegación ha sido o no revocado. Para ello se propone una solución para la identificación unívoca de tokens de delegación y la creación de una nueva entidad denominada Autoridad de Revocación de Tokens de Delegación. Entre las características del sistema de delegación propuesto destaca el que es lo suficientemente seguro como para ser utilizado en el entorno de la Administración Pública, que no requiere el uso de mecanismos off‐line para la generación de la delegación y que se puede realizar la delegación de forma instantánea y sin la necesidad de trámites complejos o la participación de un elevado número de entidades. Adicionalmente, el token de delegación propuesto es perfectamente integrable en las infraestructura de clave pública actual lo que hace que, dado que gran parte de las Administraciones Públicas europeas basan sus sistemas de identidad digital en el uso de la PKI y certificados de identidad X.509, la solución pueda ser puesta en marcha en un entorno real sin necesidad de grandes cambios o modificaciones de comportamiento. En lo referente a la interoperabilidad, se realiza un análisis exhaustivo y la correspondiente evaluación de las principales propuestas de Sistemas de Gestión de Identidad orientados a conseguir la interoperabilidad realizadas hasta la fecha en el marco de la Unión Europea y se propone, a alto nivel, una arquitectura de interoperabilidad para la gestión de identidad en las Administraciones Públicas. Dicha arquitectura es lo suficientemente genérica como para poder ser aplicada tanto en el entorno pan‐Europeo como en los entornos nacionales, autonómicos y locales, de tal forma que la interoperabilidad en la gestión de la identidad esté garantizada en todos los niveles de la Administración Pública. Por último, mediante la integración de la solución de delegación dinámica de identidad y la arquitectura de interoperabilidad propuestas se presenta una solución al problema de la delegación en un escenario pan‐Europeo de gestión de identidad, dando lugar a una arquitectura global de interoperabilidad pan‐Europea con soporte a la delegación de identidad. SUMMARY The i2010 European Union Plan aims to ensure European leadership in ICT and to promote the positive contribution that information and communication technologies can make to the economic, social and personal quality of life, bearing in mind that, to date, success in Europe has been based on promoting fair competition in telecommunications markets and on creating a borderless market for contents and digital media. In this line, the European Commission has established that the different member states should contribute actively to the development and secure use of telematic services among their citizens. More specifically, it is attributed to national, regional and local Public Administrations to have a supportive role of the Information Society, requiring them to gradually provide the citizens with Internet‐based access to all administrative procedures acts. As a first step for the secure use of telematic services offered by public institutions, it is necessary to provide the citizens with a digital identity to enable them to identify themselves unequivocally to a Service Provider or to other citizens. For this reason, most European countries ‐ and others in the rest of the world ‐ are promoting reliable systems for managing electronic identity (eIDM), so that citizens, businesses and government departments (even in different Member States) can identify and certify their operations with precision, speed and simplicity. However, the identity management by Public Administrations is a major challenge that becomes more difficult when interoperability between administrations of different countries is needed, due to the fact that individuals and entities have different identification credentials according to their own national legal framework. Aware of the problem, the European Union has launched a series of projects with the aim of achieving interoperability of eIDMs between public institutions of different Member States. However, the solutions adopted to date are insufficient because they do not foresee all possible cases of user interaction with the institutions. In particular, solutions do not take into account a very important aspect that is offered in different national legal systems, namely, the delegation of identity, by which a citizen can authorize another to act on his/her behalf to access certain services provided by public institutions. In this thesis a collection of contributions that provide solution to different aspects of the aforementioned problems are carried out. The solutions, in global, enable interoperability and identity delegation in some of the Identity Management Systems applied to Public Administration environment. In the case of delegation, a dynamic identity delegation system between generic entities is defined. This system makes it possible to solve the problem of delegated access to telematic services offered by Public Administrations. The proposed solution is based on the generation of a piece of information called delegation token. This delegation token, derived from a Proxy Certificate, allows the establishment of identity delegation by an entity that delegates (delegator) in other entity (delegatee) making use of a subset of delegator attributes. It also establishes restrictions on services that can be used by the delegated entity and the expiry date of delegation. In addition to this, the mechanisms necessary to revoke and check the revocation status of a delegation token are presented. To do this, a solution to univocally identify delegation tokens and the creation of a completely new entity, called Token Delegation Revocation Authority, are proposed. The most remarkable characteristics of the proposed delegation system are its security, enough for it to be used in the Public Administration environment, the fact that it does not require off‐line processes in order to generate the delegation, and the possibility of performing the delegation instantaneously and without neither complex processes nor the intervention of a large number of entities. The proposed delegation token can be completely incorporated into current Public Key Infrastructure (PKI). Thus, since most of the European Public Administrations base their digital identity systems on PKI and X.509 identity certificates, the solution can be adopted in a real environment without great changes or performance modifications. Regarding interoperability, an exhaustive analysis and evaluation of most significant proposals on Identity Management Systems that aim to achieve interoperability carried out in the European Union framework until now are performed. A high level identity management interoperability architecture for Public Administrations is also proposed. This architecture is sufficiently generic to be applied to both pan‐European environment and national, regional or local environments, thus interoperability in identity management at all Public Administration levels is guaranteed. Finally, through the integration of the proposed dynamic identity delegation solution and the high level interoperability architecture, a solution to the problem of identity delegation in a pan‐European identity management environment is suggested, leading to a pan‐European global interoperability architecture with identity delegation support.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proof-Carrying Code (PCC) is a general approach to mobile code safety in which programs are augmented with a certifícate (or proof). The practical uptake of PCC greatly depends on the existence of a variety of enabling technologies which allow both to prove programs correct and to replace a costly verification process by an efñcient checking procedure on the consumer side. In this work we propose Abstraction-Carrying Code (ACC), a novel approach which uses abstract interpretation as enabling technology. We argüe that the large body of applications of abstract interpretation to program verification is amenable to the overall PCC scheme. In particular, we rely on an expressive class of safety policies which can be defined over different abstract domains. We use an abstraction (or abstract model) of the program computed by standard static analyzers as a certifícate. The validity of the abstraction on the consumer side is checked in a single-pass by a very efficient and specialized abstract-interpreter. We believe that ACC brings the expressiveness, flexibility and automation which is inherent in abstract interpretation techniques to the área of mobile code safety. We have implemented and benchmarked ACC within the Ciao system preprocessor. The experimental results show that the checking phase is indeed faster than the proof generation phase, and that the sizes of certificates are reasonable.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current approaches to mobile code safety – inspired by the technique of Proof-Carrying Code (PCC) [4] – associate safety information (in the form of a certificate) to programs. The certificate (or proof) is created by the code supplier at compile time, and packaged along with the untrusted code. The consumer who receives the code+certificate package can then run a checker which, by a straightforward inspection of the code and the certificate, is able to verify the validity of the certificate and thus compliance with the safety policy. The main practical difficulty of PCC techniques is in generating safety certificates which at the same time: i) allow expressing interesting safety properties, ii) can be generated automatically and, iii) are easy and efficient to check.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstraction-Carrying Code (ACC) is a framework for mobile code safety in which the code supplier provides a program together with an abstraction (or abstract model of the program) whose validity entails compliance with a predefined safety policy. The abstraction plays thus the role of safety certificate and its generation is carried out automatically by a fixed-point analyzer. The advantage of providing a (fixed-point) abstraction to the code consumer is that its validity is checked in a single pass (i.e., one iteration) of an abstract interpretation-based checker. A main challenge to make ACC useful in practice is to reduce the size of certificates as much as possible, while at the same time not increasing checking time. Intuitively, we only include in the certificate the information which the checker is unable to reproduce without iterating. We introduce the notion of reduced certifícate which characterizes the subset of the abstraction which a checker needs in order to validate (and re-construct) the full certificate in a single pass. Based on this notion, we show how to instrument a generic analysis algorithm with the necessary extensions in order to identify the information relevant to the checker.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

CiaoPP is the abstract interpretation-based preprocessor of the Ciao multi-paradigm (Constraint) Logic Programming system. It uses modular, incremental abstract interpretation as a fundamental tool to obtain information about programs. In CiaoPP, the semantic approximations thus produced have been applied to perform high- and low-level optimizations during program compilation, including transformations such as múltiple abstract specialization, parallelization, partial evaluation, resource usage control, and program verification. More recently, novel and promising applications of such semantic approximations are being applied in the more general context of program development such as program verification. In this work, we describe our extensión of the system to incorpórate Abstraction-Carrying Code (ACC), a novel approach to mobile code safety. ACC follows the standard strategy of associating safety certificates to programs, originally proposed in Proof Carrying- Code. A distinguishing feature of ACC is that we use an abstraction (or abstract model) of the program computed by standard static analyzers as a certifícate. The validity of the abstraction on the consumer side is checked in a single-pass by a very efficient and specialized abstractinterpreter. We have implemented and benchmarked ACC within CiaoPP. The experimental results show that the checking phase is indeed faster than the proof generation phase, and that the sizes of certificates are reasonable. Moreover, the preprocessor is based on compile-time (and run-time) tools for the certification of CLP programs with resource consumption assurances.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier augments the program with a certifícate (or proof). The intended benefit is that the program consumer can locally validate the certifícate w.r.t. the "untrusted" program by means of a certifícate checker—a process which should be much simpler, eíñcient, and automatic than generating the original proof. Abstraction Carrying Code (ACC) is an enabling technology for PCC in which an abstract model of the program plays the role of certifícate. The generation of the certifícate, Le., the abstraction, is automatically carried out by an abstract interpretation-based analysis engine, which is parametric w.r.t. different abstract domains. While the analyzer on the producer side typically has to compute a semantic fixpoint in a complex, iterative process, on the receiver it is only necessary to check that the certifícate is indeed a fixpoint of the abstract semantics equations representing the program. This is done in a single pass in a much more efficient process. ACC addresses the fundamental issues in PCC and opens the door to the applicability of the large body of frameworks and domains based on abstract interpretation as enabling technology for PCC. We present an overview of ACC and we describe in a tutorial fashion an application to the problem of resource-aware security in mobile code. Essentially the information computed by a cost analyzer is used to genérate cost certificates which attest a safe and efficient use of a mobile code. A receiving side can then reject code which brings cost certificates (which it cannot validate or) which have too large cost requirements in terms of computing resources (in time and/or space) and accept mobile code which meets the established requirements.