960 resultados para Generic Security Services Application Program Interface (GSS-API)
Resumo:
Data are provided to CJJP through statistical summary forms completed by the JCSLs. Because forms are completed only when meaningful contact between a student and a liaison takes place, only a portion of the total population served is reported. Meaningful contact is defined as having at least five contacts within a 60-day period (at any point during the academic year) regarding at least one of the referral reasons supplied on the form. Data are entered into a web-based application by the liaisons and retrieved electronically by CJJP via the internet. Service information is submitted and uploaded only at the end of the academic year.
Resumo:
This review of preventative controls for fraud, waste, and abuse in the Supplemental Nutrition Assistance Program (SNAP), administered by the Department of Social Services, was self-initiated by the State Inspector General as part of a broader statewide review of preventative fraud, waste, and abuse management controls of major benefit programs in State agencies. This review’s scope and objectives were: Assess SNAP’s preventative management controls for fraud, waste, and abuse; Identify SNAP preventative management control best practices; and Identify opportunities to improve SNAP management controls to cost/effectively mitigate risks of fraud, waste, and abuse.
Resumo:
The State contracted with six managed care organizations to deliver Medicaid managed care at an annual cost of $2.7 billion, representing 10% of the State’s annual budget, to 750,000 Medicaid beneficiaries in South Carolina. This review’s scope and objectives were: Test the six MCOs’ compliance and effective execution of the SCDHHS’s managed care contract “Section 11 - Program Integrity” focusing on the operational components of pre-payment review and post-payment review. Identify opportunities to improve SCDHHS’s biennial managed care contract, contract monitoring, and MCO compliance and effective execution of the contract.
Resumo:
The information contained in this Annual Safety and Security Report is provided to new and prospective students and employees, as well as their families, and all current members of the campus community. It contains Public Safety Services and Programming,Building Threat and Vulnerability Assessment Program,Campus Security authorities, Annual Preparation of Crime Statistics, Disclosure of Crime Statistics, Daily Crime Log, How to Report a Crime, Suspicious Activity or Emergency, Silent Witness Program, Relationship with Local Authorities, Off-Campus Violations & Criminal Activity, Confidential Reporting, Timely Warning Procedures, Emergency Response, Notification and Evacuation Procedures Activation Authority, Available Communications Media, Emergency Notification Tests, Emergency Evacuation Procedures, Shelter-in-Place Procedures,Crime Prevention and Safety Awareness Programs, Emergency Telephones, Access To Facilities, Maintenance of Buildings and Grounds, Alcohol and Other Drugs, Domestic Violence, Dating Violence, Sexual Assault, and Stalking, Sex Offender Registration, Weapons on Campus, Referrals for Disciplinary Action, Crime Information: Definitions and Statistics, Uniform Crime Reporting Definitions, Reporting Areas. Crime Statistics
Resumo:
This review was initiated based upon allegations from multiple sources of possible fraud in the Disaster Supplemental Nutrition Assistance Program (D-SNAP) administered by the South Carolina Department of Social Services (SCDSS), which was implemented in response to the 10/3/2015 statewide flooding from Hurricane Joaquin. This review’s scope and objectives were: Assess SCDSS’s D-SNAP implementation for compliance with federal guidelines, with emphasis on fraud preventative controls; Assess the SCDSS’s post-disaster review and audit methodology for compliance with federal guidelines, with emphasis on understanding the fraud risks and resolution strategies; and Identify residual risk/suspected fraud not addressed through the SCDSS review and available opportunities to address.
Resumo:
The generalization of the quasi mode theory of macroscopic quantization in quantum optics and cavity QED presented in the previous paper, is applied to provide a fully quantum theoretic derivation of the laws of reflection and refraction at a boundary. The quasi mode picture of this process involves the annihilation of a photon travelling in the incident region quasi mode, and the subsequent creation of a photon in either the incident region or transmitted region quasi modes. The derivation of the laws of reflection and refraction is achieved through the dual application of the quasi mode theory and a quantum scattering theory based on the Heisenberg picture. Formal expressions from scattering theory are given for the reflection and transmission coefficients. The behaviour of the intensity for a localized one photon wave packet coming in at time minus infinity from the incident direction is examined and it is shown that at time plus infinity, the light intensity is only significant where the classical laws of reflection and refraction predict. The occurrence of both refraction and reflection is dependent upon the quasi mode theory coupling constants between incident and transmitted region quasi modes being nonzero, and it is seen that the contributions to such coupling constants come from the overlap of the mode functions in the boundary layer region, as might be expected from a microscopic theory.
Resumo:
Graphical user interfaces (GUIs) make software easy to use by providing the user with visual controls. Therefore, correctness of GUI's code is essential to the correct execution of the overall software. Models can help in the evaluation of interactive applications by allowing designers to concentrate on its more important aspects. This paper presents a generic model for language-independent reverse engineering of graphical user interface based applications, and we explore the integration of model-based testing techniques in our approach, thus allowing us to perform fault detection. A prototype tool has been constructed, which is already capable of deriving and testing a user interface behavioral model of applications written in Java/Swing.
Resumo:
Purpose – The purpose of this paper is to propose a generic model of Integrated Management System of Quality, Environment and Safety (IMS-QES) that can be adapted and progressively to assimilate various Management Systems, of which highlights: ISO 9001 for Quality; ISO 14001 for Environment; OHSAS 18001 for Occupational Health and Safety. Design/methodology/approach – The model was designed in the real environment of a Portuguese Organization and 160 employees were surveyed. The rate response was equal to 86 percent. The conceived model was implemented in a first phase for the integration of Quality, Environment and Safety Management Systems. Findings – Among the main findings of the survey the paper highlights: the elimination of conflicts between individual systems with resources optimization; creation of added value to the business by eliminating several types of wastes; the integrated management of sustainability components in a global market; the improvement of partnerships with suppliers of goods and services; reducing the number of internal and external audits. Originality/value – This case study is one of the first Portuguese empirical researches about IMS-QES and the paper believes that it can be useful in the creation of a Portuguese guideline for integration, namely the Quality Management Systems; Environmental Management Systems and Occupational Health and Safety Management Systems among others.
Resumo:
The current level of demand by customers in the electronics industry requires the production of parts with an extremely high level of reliability and quality to ensure complete confidence on the end customer. Automatic Optical Inspection (AOI) machines have an important role in the monitoring and detection of errors during the manufacturing process for printed circuit boards. These machines present images of products with probable assembly mistakes to an operator and him decide whether the product has a real defect or if in turn this was an automated false detection. Operator training is an important aspect for obtaining a lower rate of evaluation failure by the operator and consequently a lower rate of actual defects that slip through to the following processes. The Gage R&R methodology for attributes is part of a Six Sigma strategy to examine the repeatability and reproducibility of an evaluation system, thus giving important feedback on the suitability of each operator in classifying defects. This methodology was already applied in several industry sectors and services at different processes, with excellent results in the evaluation of subjective parameters. An application for training operators of AOI machines was developed, in order to be able to check their fitness and improve future evaluation performance. This application will provide a better understanding of the specific training needs for each operator, and also to accompany the evolution of the training program for new components which in turn present additional new difficulties for the operator evaluation. The use of this application will contribute to reduce the number of defects misclassified by the operators that are passed on to the following steps in the productive process. This defect reduction will also contribute to the continuous improvement of the operator evaluation performance, which is seen as a quality management goal.
Resumo:
A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.
Resumo:
O presente projecto tem como objectivo a disponibilização de uma plataforma de serviços para gestão e contabilização de tempo remunerável, através da marcação de horas de trabalho, férias e faltas (com ou sem justificação). Pretende-se a disponibilização de relatórios com base nesta informação e a possibilidade de análise automática dos dados, como por exemplo excesso de faltas e férias sobrepostas de trabalhadores. A ênfase do projecto está na disponibilização de uma arquitectura que facilite a inclusão destas funcionalidades. O projecto está implementado sobre a plataforma Google App Engine (i.e. GAE), de forma a disponibilizar uma solução sob o paradigma de Software as a Service, com garantia de disponibilidade e replicação de dados. A plataforma foi escolhida a partir da análise das principais plataformas cloud existentes: Google App Engine, Windows Azure e Amazon Web Services. Foram analisadas as características de cada plataforma, nomeadamente os modelos de programação, os modelos de dados disponibilizados, os serviços existentes e respectivos custos. A escolha da plataforma foi realizada com base nas suas características à data de iniciação do presente projecto. A solução está estruturada em camadas, com as seguintes componentes: interface da plataforma, lógica de negócio e lógica de acesso a dados. A interface disponibilizada está concebida com observação dos princípios arquitecturais REST, suportando dados nos formatos JSON e XML. A esta arquitectura base foi acrescentada uma componente de autorização, suportada em Spring-Security, sendo a autenticação delegada para os serviços Google Acounts. De forma a permitir o desacoplamento entre as várias camadas foi utilizado o padrão Dependency Injection. A utilização deste padrão reduz a dependência das tecnologias utilizadas nas diversas camadas. Foi implementado um protótipo, para a demonstração do trabalho realizado, que permite interagir com as funcionalidades do serviço implementadas, via pedidos AJAX. Neste protótipo tirou-se partido de várias bibliotecas javascript e padrões que simplificaram a sua realização, tal como o model-view-viewmodel através de data binding. Para dar suporte ao desenvolvimento do projecto foi adoptada uma abordagem de desenvolvimento ágil, baseada em Scrum, de forma a implementar os requisitos do sistema, expressos em user stories. De forma a garantir a qualidade da implementação do serviço foram realizados testes unitários, sendo também feita previamente a análise da funcionalidade e posteriormente produzida a documentação recorrendo a diagramas UML.
Resumo:
Com a generalização das tecnologias de informação e comunicação na área da saúde, a monitorização remota de pacientes, a partir de dispositivos móveis, é uma realidade que contribui para uma melhor qualidade de vida dos pacientes. Mas, não são só os pacientes que ganham com a introdução destas tecnologias, também os profissionais de saúde e os hospitais retiram as suas vantagens. Os profissionais de saúde são munidos de uma ferramenta móvel de monitorização permanente de sinais vitais, aumentando desta forma a ligação médico-paciente. Relativamente aos hospitais, estes vêem os custos de manutenção reduzirem, em virtude da possibilidade dos pacientes puderem ser monitorizados a partir dos seus lares. Neste projecto pretende-se identificar mecanismos que possibilitem responder de forma eficaz à necessidade de partilha de informação, nomeadamente protocolos de comunicação, segurança e sistemas de integração. Foi projectado um protótipo, constituído por um middleware e uma aplicação cliente móvel, onde o middleware tem como missão garantir a interoperabilidade entre um servidor HL7 e a aplicação cliente, utilizada pelo profissional de saúde. A normalização da informação médica trocada entre o servidor HL7 e o middleware obedece à norma internacional HL7.
Resumo:
The remediation of contaminated sites supports the goal of sustainable development but may also have environmental impacts at a local, regional and global scale. Life cycle assessment (LCA) has increasingly been used in order to support site remediation decision-making. This review article discusses existing LCA methods and proposed models focusing on critical decisions and assumptions of the LCA application to site remediation activities. It is concluded that LCA has limitations as an adequate holistic decisionmaking tool since spatial and temporal differentiation of non-global impacts assessment is a major hurdle in site remediation LCA. Moreover, a consequential LCA perspective should be adopted when the different remediation services to be compared generate different site’s physical states, displacing alternative post-remediation scenarios. The environmental effects of the post-remediation stage of the site is generally disregarded in the past site remediation LCA studies and such exclusion may produce misleading conclusions and misdirected decision-making. In addition, clear guidance accepted by all stakeholders on remediation capital equipment exclusion and on dealing with multifunctional processes should be developed for site remediation LCA applications.