849 resultados para Formal Privacy Policy Language
Resumo:
Complexity is a major concern which is aimed to be overcome by people through modeling. One way of reducing complexity is separation of concerns, e.g. separation of business process from applications. One sort of concerns are cross-cutting concerns i.e. concerns which are scattered and tangled through one of several models. In business process management, examples of such concerns are security and privacy policies. To deal with these cross-cutting concerns, the aspect orientated approach was introduced in the software development area and recently also in the business process management area. The work presented in this paper elaborates on aspect oriented process modelling. It extends earlier work by defining a mechanism for capturing multiple concerns and specifying a precedence order according to which they should be handled in a process. A formal syntax of the notation is presented precisely capturing the extended concepts and mechanisms. Finally, the relevant of the approach is demonstrated through a case study.
Resumo:
Pre-service teacher education is unfinished business. New social education teachers face the challenge of fluid policy environments in which curriculum content and pedagogy are continually changing. The evolving Australian curriculum is the most recent example of such fluidity with its emphasis on shifting the educational agenda to a focus on discipline-based approaches. This paper addresses the concerns of final year pre-service and early career social education teachers, in terms of their professional development needs, by drawing on the findings of a pilot study with students and recent graduates from a university in south-east Queensland. It concludes that social education curriculum units which embed links to professional practice and professional development in teaching, learning and assessment may provide the way forward for enhancing the transition to practice for beginning teachers and assist them in navigating constant change.
Resumo:
Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.
Resumo:
Through the rise of cloud computing, on-demand applications, and business networks, services are increasingly being exposed and delivered on the Internet and through mobile communications. So far, services have mainly been described through technical interface descriptions. The description of business details, such as pricing, service-level, or licensing, has been neglected and is therefore hard to automatically process by service consumers. Also, third-party intermediaries, such as brokers, cloud providers, or channel partners, are interested in the business details in order to extend services and their delivery and, thus, further monetize services. In this paper, the constructivist design of the UnifiedServiceDescriptionLanguage (USDL), aimed at describing services across the human-to-automation continuum, is presented. The proposal of USDL follows well-defined requirements which are expressed against a common service discourse and synthesized from currently available servicedescription efforts. USDL's concepts and modules are evaluated for their support of the different requirements and use cases.
Resumo:
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate encryption setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We formalize the notion of attribute hiding in the presence of revocation and propose an RPE scheme, called AH-RPE, which achieves attribute-hiding under the Decision Linear assumption in the standard model. We then present a stronger privacy notion, termed full hiding, which further cares about privacy of revoked users. We propose another RPE scheme, called FH-RPE, that adopts the Subset Cover Framework and offers full hiding under the Decision Linear assumption in the standard model. The scheme offers very flexible privacy-preserving access control to encrypted data and can be used in sender-local revocation scenarios.
Resumo:
This paper argues that the logic of neoliberal choice policy is typically blind to considerations of space and place, but inevitably impacts on rural and remote locations in the way that middle class professionals view the opportunities available in their local educational markets. The paper considers the value of middle class professionals’ educational capitals in regional communities and their problematic distribution, given that class fraction’s particular investment in choice strategies to ensure their children’s future. It then profiles the educational market in six communities along a transect between a major regional centre and a remote ‘outback’ town, using publicly available data from the Australian government’s ‘My School’ website. Comparison of the local markets shows how educational outcomes are distributed across the local markets and how dimensions of ‘choice’ thin out over the transect. Interview data offers insights into how professional families in these localities engage selectively with these local educational markets, or plan to transcend them. The discussion reflects on the growing importance of educational choices as a marker of place in the competition between localities to attract and retain professionals to staff vital human services in their communities.
Resumo:
Listening comprehension is the primary channel of learning a language. Yet of the four dominant macro-skills (listening, speaking, reading and writing), it is often difficult and inaccessible for second and foreign language learners due to its implicit process. The secondary skill, speaking, proceeds listening cognitively. Aural/oral skills precede the graphic skills, such as reading and writing, as they form the circle of language learning process. However, despite the significant relationship with other language skills, listening comprehension is treated lightly in the applied linguistics research. Half of our daily conversation and three quarters of classroom interaction are virtually devoted to listening comprehension. To examine the relationship of listening skill with other language skills, the outcome of 1800 Iranian participants undertaking International English Language Testing System (IELTS) in Tehran indicates the close correlation between listening comprehension and the overall language proficiency.