991 resultados para Open University of Brazil System


Relevância:

100.00% 100.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Apart from compulsory lectures on classical homeopathy (CH), traditional Chinese medicine/acupuncture, neural therapy and anthroposophically extended medicine (AEM), our institute at the University of Bern offers several optional practical courses for medical students. The aim of this course during autumn 2011 and spring 2012 was to discuss basic research, observational and clinical studies in the fields of CH and AEM, so that students i) learned how to read and appraise scientific publications, ii) learned how complementary medicine can be investigated with scientific methods, and iii) were able to form their own opinion about the possible specific effects and effectiveness of homeopathically potentised substances. Methods Introductory lectures on AEM, CH and study design were given to 12 second year medical students. The students appraised 12 research articles and presented the results in class, followed by discussions with experts in the fields of basic and clinical research from our institute. A company producing homeopathic remedies was visited and students could practise potentization procedures and trituration. At the end of the course, students compiled posters with arguments in favour of and against specific effects and effectiveness as well as their own conclusions. The course was evaluated using a written questionnaire with closed and open questions. Results Previous knowledge about CH and AEM was scarce among the students. It slightly increased during the course, and the course itself fostered their interest on the topic. This course was chosen by most students, because they were genuinely interested in the topic (and not because other courses they had wanted to visit were fully booked). The students especially valued the discussions, the various perspectives presented to them, and experiencing a potentization process. Conclusion Medical students were interested to learn more about homeopathically potentised substances. The contradictory study results made it difficult for them to form their own opinion. Apart from appraising articles, the students would have liked to meet and talk to patients.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

by Hyman Hurwitz

Relevância:

100.00% 100.00%

Publicador:

Resumo:

By March, 1936, the University of Missouri formally rejected Gaines because Missouri law would not permit a person of African descent to enter a white school. Within three weeks, the NAACP petitioned the court asking the University of Missouri to open its doors to Gaines on the grounds that it was the only public law school in Missouri.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, the new features that IR-n system applies on the topic processing for CL-SR are described. This set of features are based on applying logic forms to topics with the aim of incrementing the weight of topic terms according to a set of syntactic rules.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although it is known that the Spanish current Educative System promotes using the Communicate Approach to teach foreign languages in schools, other recently designed approaches are also used to help students improve their skills when communicating in a foreign language. One of these approaches is Content and Language Integrated Learning, also known as CLIL, which is used to teach content courses using the English language as the language of instruction. This approach improves the students’ skills in English as the same time as they learn content from other areas. The goal of this thesis is to present a research project carried out at the University of Alicante during the academic year 2011-2012. With this research we obtained results that provide quantitative and qualitative data which explains how the use of the CLIL methodology affects the English level of students in the “Didactics of the English Language in Preschool Education” course in Preschool Education Teacher Undergraduate Program as students acquire the contents of the course.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Four pieces of paper containing notes and figures related to colleges in the University of Cambridge including calculations of the number of fellows, scholars, and masters. The verso of one leaf contains a February 21, 1800 request for the creation of a pamphlet with eulogies for George Washington.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Description based on: 1871

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Published as a testimonial to a great bookman [Francis Hull]"

Relevância:

100.00% 100.00%

Publicador:

Resumo:

National Highway Traffic Safety Administration, Washington, D.C.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"This work has been supported by the National Science Foundation under Grant G-1221"