909 resultados para Security system


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A report and recommendations by the Illinois Office of Banks and Real Estate in response to Illinois Senate Resolution No. 134, adopted May 26, 1999, which requested the Office to study safety and security issues regarding the use of automated teller machines by consumers--particularly, the merits of the reverse PIN warning system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

All public school districts, vocational centers, charter schools and special education cooperatives must submit the Annual Claim for Pupil Transportation Reimbursement (ISBE 50-23) electronically online through a web-based system named, "Pupil Transportation Claim Reimbursement System" or "PTCRS."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bill Chappell, Jr., chairman, Subcommittee on Defense, Committee on Appropriations, House of Representatives. -- p. [1].

Relevância:

30.00% 30.00%

Publicador:

Resumo:

"H.R. 6675, an act to provide a hospital insurance program for the aged under the Social security act, with a supplementary health benefits program and an expanded program on medical assistance, to increase benefits under the old-age, survivors, and disability insurance system, to improve the Federal-State public assistance programs, and for other purposes."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An increased incidence of attack has been identified as a major characteristic of the new threat posed by terrorist groups such as al Qaeda. This article considers what such a change means for Western national security systems by examining bow different parts of the system change over time. It becomes evident that Western national security systems are structured on an assumption of comparatively slow state-based threats. In contrast, terrorist franchises operate at a faster pace, are more 'lightweight' and can adapt within the operational and capability cycles of Western governments. Neither network-centric warfare nor an improved assessment of the threat, called for by some, offers a panacea in this regard. Rather, it is clear that not only do Western governments need to adjust their operational and capability cycles, but that they also need a greater diversity of responses to increase overall national security resilience and offer more tools for policy-makers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since 2001, Mexico has been designing, legislating, and implementing a major health-system reform. A key component was the creation of Seguro Popular, which is intended to expand insurance coverage over 7 years to uninsured people, nearly half the total population at the start of 2001. The reform included five actions: legislation of entitlement per family affiliated which, with full implementation, will increase public spending on health by 0.8-1.0% of gross domestic product; creation of explicit benefits packages; allocation of monies to decentralised state ministries of health in proportion to number of families affiliated; division of federal resources flowing to states into separate funds for personal and non-personal health services; and creation of a fund to protect families against catastrophic health expenditures. Using the WHO health-systems framework, we used a wide range of datasets to assess the effect of this reform on different dimensions of the health system. Key findings include: affiliation is preferentially reaching the poor and the marginalised communities; federal non-social security expenditure in real per-head terms increased by 38% from 2000 to 2005; equity of public-health expenditure across states improved; Seguro Popular affiliates used more inpatient and outpatient services than uninsured people; effective coverage of 11 interventions has improved between 2000 and 2005-06; inequalities in effective coverage across states and wealth deciles has decreased over this period; catastrophic expenditures for Seguro Popular affiliates are lower than for uninsured people even though use of services has increased. We present some lessons for Mexico based on this interim evaluation and explore implications for other countries considering health reforms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An expanding literature exists to suggest that the trading mechanism can influence the volatility of security returns. This study adds to this literature by examining the impact that the introduction of SETS, on the London Stock Exchange, had on the volatility of security returns. Using a Markov switching regime change model security volatility is categorized as being in a regime of either high or low volatility. It is shown that prior to the introduction of SETS securities tended to be in a low volatility regime. At the time SETS was introduced securities moved to a high volatility regime. This suggests that volatility increased when SETS was introduced.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Radio-frequency identification technology (RFID) is a popular modern technology proven to deliver a range of value-added benefits to achieve system and operational efficiency, as well as cost-effectiveness. The operational characteristics of RFID outperform barcodes in many aspects. Despite its well-perceived benefits, a definite rationale for larger scale adoption is still not so promising. One of the key reasons is high implementation cost, especially the cost of tags for applications involving item-level tagging. This has resulted in the development of chipless RFID tags which cost much less than conventional chip-based tags. Despite the much lower tag cost, the uptake of chipless RFID system in the market is still not as widespread as predicted by RFID experts. This chapter explores the value-added applications of chipless RFID system to promote wider adoption. The chipless technology's technical and operational characteristics, benefits, limitations and current uses will also be examined. The merit of this chapter is to contribute fresh propositions to the promising applications of chipless RFID to increase its adoption in the industries that are currently not (or less popular in) utilising it, such as retail, logistics, manufacturing, healthcare, and service sectors. © 2013, IGI Global.