867 resultados para Generic Security Services Application Program Interface (GSS-API)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Co-creation between customers and providers has recently gained more attention by business service providers as a promising endeavour. The different perspectives of co-creation - innovation, sourcing and marketing - are well deployed. From a provider’s point of view, the question of how to manage business services with respect to co-creation is vitally important. However, service engineering and service lifecycle management typically take a mostly internal, closed-loop approach, although a logical implication of acknowledging the value co-creation perspective on “service” would be to leverage customer and other stakeholder competences to the full extent. This paper aims at reconciling the perspectives of co-creation and makes a contribution by analysing where and how co-creation can be effectively utilised throughout the various stages of a generic business service lifecycle. The result will be a framework guiding companies in using co-creation when managing their business services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This document presents the newly updated strategic directions for strengthening nursing and midwifery services (SDNM) for the period 2011–2015. Complementing and building on the 2002–2008 SDNM, it seeks to provide policymakers, practitioners and other stakeholders at every level with a flexible framework for broad-based, collaborative action to enhance the capacity of nurses and midwives to contribute to: * universal coverage * people-centred health care * policies affecting their practice and working conditions, and the * scaling up of national health systems to meet global goals and targets. The SDNM for 2011–2015 draws on several key World Health Assembly resolutions, and are underpinned by the associated global policy recommendations and codes of practice. (1,2) After two years of extensive research and consultation, a SDNM task force was developed, and a consensus on a range of specific activities revolving around 13 objectives in five interrelated key results areas (KRAs), was achieved: n health system and service strengthening n policy and practice * education, training and career development * workforce management and * partnership. Stakeholders, although free to prioritize certain parts of the framework to meet their own particular needs, are encouraged to adhere to the cornerstone of collaborative action, namely the common goal enshrined in the core SDNM 2011–2015 vision statement: improved health outcomes for individuals, families and communities through the provision of competent, culturally sensitive, evidence-based nursing and midwifery services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Privacy has become one of the main impediments for e-health in its advancement to providing better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Web service technology is increasingly being used to build various e-Applications, in domains such as e-Business and e-Science. Characteristic benefits of web service technology are its inter-operability, decoupling and just-in-time integration. Using web service technology, an e-Application can be implemented by web service composition — by composing existing individual web services in accordance with the business process of the application. This means the application is provided to customers in the form of a value-added composite web service. An important and challenging issue of web service composition, is how to meet Quality-of-Service (QoS) requirements. This includes customer focused elements such as response time, price, throughput and reliability as well as how to best provide QoS results for the composites. This in turn best fulfils customers’ expectations and achieves their satisfaction. Fulfilling these QoS requirements or addressing the QoS-aware web service composition problem is the focus of this project. From a computational point of view, QoS-aware web service composition can be transformed into diverse optimisation problems. These problems are characterised as complex, large-scale, highly constrained and multi-objective problems. We therefore use genetic algorithms (GAs) to address QoS-based service composition problems. More precisely, this study addresses three important subproblems of QoS-aware web service composition; QoS-based web service selection for a composite web service accommodating constraints on inter-service dependence and conflict, QoS-based resource allocation and scheduling for multiple composite services on hybrid clouds, and performance-driven composite service partitioning for decentralised execution. Based on operations research theory, we model the three problems as a constrained optimisation problem, a resource allocation and scheduling problem, and a graph partitioning problem, respectively. Then, we present novel GAs to address these problems. We also conduct experiments to evaluate the performance of the new GAs. Finally, verification experiments are performed to show the correctness of the GAs. The major outcomes from the first problem are three novel GAs: a penaltybased GA, a min-conflict hill-climbing repairing GA, and a hybrid GA. These GAs adopt different constraint handling strategies to handle constraints on interservice dependence and conflict. This is an important factor that has been largely ignored by existing algorithms that might lead to the generation of infeasible composite services. Experimental results demonstrate the effectiveness of our GAs for handling the QoS-based web service selection problem with constraints on inter-service dependence and conflict, as well as their better scalability than the existing integer programming-based method for large scale web service selection problems. The major outcomes from the second problem has resulted in two GAs; a random-key GA and a cooperative coevolutionary GA (CCGA). Experiments demonstrate the good scalability of the two algorithms. In particular, the CCGA scales well as the number of composite services involved in a problem increases, while no other algorithms demonstrate this ability. The findings from the third problem result in a novel GA for composite service partitioning for decentralised execution. Compared with existing heuristic algorithms, the new GA is more suitable for a large-scale composite web service program partitioning problems. In addition, the GA outperforms existing heuristic algorithms, generating a better deployment topology for a composite web service for decentralised execution. These effective and scalable GAs can be integrated into QoS-based management tools to facilitate the delivery of feasible, reliable and high quality composite web services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The last two decades have seen the application of six sigma methodologies in many manufacturing and also some service industries. Six sigma’s success in manufacturing is well published. But the same cannot be said about its implementation in services. Applying six sigma to services is still limited to only a small number of services. This paper reviews the application of six sigma in service industries. Emphasis is given to application issues such as what are necessary critical success factors and key performance indicators in order for a project to be successful. A pilot study was carried out in order to highlight the issues discussed. Regardless of the service that is provided, a number of guidelines can be commonly applied to varying types of services. The aim of this paper is to help widen the scope of six sigma application in services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Barreto-Lynn-Scott (BLS) curves are a stand-out candidate for implementing high-security pairings. This paper shows that particular choices of the pairing-friendly search parameter give rise to four subfami- lies of BLS curves, all of which offer highly efficient and implementation- friendly pairing instantiations. Curves from these particular subfamilies are defined over prime fields that support very efficient towering options for the full extension field. The coefficients for a specific curve and its correct twist are automat-ically determined without any computational effort. The choice of an extremely sparse search parameter is immediately reflected by a highly efficient optimal ate Miller loop and final exponentiation. As a resource for implementors, we give a list with examples of implementation-friendly BLS curves through several high-security levels.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Organizations seeking improvements in their performance are increasingly exploring alternative models and approaches for providing support services; one such approach being Shared Services. Because of the possible consequential impact of Shared Services on organizations, and given that information systems (IS) is both an enabler of Shared Services (for other functional areas) as well as a promising area for Shared Services application, Shared Services is an important area for research in the IS field. Though Shared Services has been extensively adopted on the promise of economies of scale and scope, factors of Shared Services success (or failure) have received little research attention. This paper reports the distillation of success and failure factors of Shared Services from an IS perspective. Employing NVIVO and content analysis of 158 selected articles, 9 key success factors and 5 failure factors are identified, suggesting important implications for practice and further research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This workshop provides an ergonomic framework and design rules for the design of automotive controls, considering anthropometric design, physiologic design, biomechanic design and information design.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Our paper approaches Twitter through the lens of “platform politics” (Gillespie, 2010), focusing in particular on controversies around user data access, ownership, and control. We characterise different actors in the Twitter data ecosystem: private and institutional end users of Twitter, commercial data resellers such as Gnip and DataSift, data scientists, and finally Twitter, Inc. itself; and describe their conflicting interests. We furthermore study Twitter’s Terms of Service and application programming interface (API) as material instantiations of regulatory instruments used by the platform provider and argue for a more promotion of data rights and literacy to strengthen the position of end users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of public space by children and young people is a contentious issue in a number of developed and developing countries and a range of measures are frequently deployed to control the public space which usually deny the rights of children and young people to claim the space for their use. Child and youth curfews, oppressive camera surveillance and the unwarranted attentions of police and private security personnel as control measures in public space undermine attempts to secure greater participation by children and young people in constructing positive strategies to address concerns that impact on them and others in a local area. Evidence from research in Scotland undertaken by Article 12 (2000) suggests that young people felt strongly that they did not count in local community matters and decision making and the imposition on them of a curfew by the adult world of the local area created resentment both at the harshness of the measure and disappointment at an opportunity lost to be consulted and involved in dealing with perceived problems of the locality. This is an important cluster of linked issues as Brown (1998:116) argues that young people are ‘selectively constructed as “problem” and “other” with their concerns marginalised, their lifestyles problematised and their voices subdued’, and this flows into their use of public space as their claims to its use as an aspect of social citizenship are usually cast as inferior or rejected as they ‘stand outside the formal polity’ as ‘non persons’. This has major implications for the ways in which young people view their position in a community as many report a feeling of not being wanted, valued or tolerated. The ‘youth question’ according to Davis (1990) acts as a form of ‘screen’ on which observers and analysts project hopes and fears about the state of society, while in the view of Loader (1996:89) the ‘question of young people’ sits within a discourse comprising two elements, the one being youth, particularly young males, as the ‘harbinger of often unwelcome social change and threat’ and the other element ‘constructs young people as vulnerable’. This discourse of threat is further exemplified in the separation of children from teenagers as Valentine (1996) suggests, the treatment of younger children using public space is often dramatically different to that of older children and the most feared stage of all, 'youth'

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book develops tools and techniques that will help urban residents gain access to urban computing. Metaphorically speaking, it is taking computing to the street by giving the general public – rather than just researchers and professionals – the power to leverage available city infrastructure and create solutions tailored to their individual needs. It brings together five chapters that are based on presentations given at the Street Computing Workshop held on 24 November 2009 in Melbourne in conjunction with the Australian Computer-Human Interaction Conference (OZCHI 2009). This book focuses on applying urban informatics, urban and community sensing and open application programming interfaces (APIs) to the public space through the delivery of online services, on demand and in real time. It then offers a case study of how the city of Singapore has harnessed the potential of an online infrastructure so that residents and visitors can access services electronically. This book was published as a special issue of the Journal of Urban Technology, 19(2), 2012.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We report on an accurate numerical scheme for the evolution of an inviscid bubble in radial Hele-Shaw flow, where the nonlinear boundary effects of surface tension and kinetic undercooling are included on the bubble-fluid interface. As well as demonstrating the onset of the Saffman-Taylor instability for growing bubbles, the numerical method is used to show the effect of the boundary conditions on the separation (pinch-off) of a contracting bubble into multiple bubbles, and the existence of multiple possible asymptotic bubble shapes in the extinction limit. The numerical scheme also allows for the accurate computation of bubbles which pinch off very close to the theoretical extinction time, raising the possibility of computing solutions for the evolution of bubbles with non-generic extinction behaviour.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The emergence of shopping malls in Europe, the UK and Australia over the last thirty years or so, raises questions about the disruptive effects of such capital intensive developments on local area shopping facilities, transport and other infrastructures and the maintenance of artificially high prices for goods, whereby the promised greater choice of shops and prices is rarely a genuine free market of competition leading to lower prices. A central question to be addressed is whom these centres represent and belong to. While many claim to exist to ‘serve the community’ almost all malls and centres are private property and the community of shoppers has few, if any rights compared with the conventional high street, which is a public thoroughfare. This permits the management of the centres through their own private security staff, to observe, follow, eject and refuse further admission to anyone considered to be ‘undesirable’. What is different about the newest shopping centres is the routine use of increasingly sophisticated CCTV surveillance equipment to observe and record, for later evidential and entry restriction use, the movements of centre visitors.