857 resultados para OSI Security, Mandatory Access Control, Security Education, Operating System Security, Web Services Security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Universities are encouraged to widen access to a broad range of applicants, including mature students taking Access qualifications. Admissions tutors can find it difficult to compare and choose between Access and A-level applications, and Access applicants for popular courses may be disadvantaged relative to students with good A-levels. In this evaluative case study a foundation year designed to avoid Access selection problems and widen participation in psychology, biology, optometry and pharmacy is reviewed. Progression and success rates are compared to national averages for Access courses and issues in Foundation Year management considered. The Foundation Year is rejected as unsatisfactory and it is concluded that widening participation for mature students can be achieved through Access courses. Difficulties in achieving this for high-demand courses in leading universities are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article assesses the impact of education reform and the new public management (NPM) on the discretion of school teachers. The focal point of the study is Michael Lipsky's theory of discretion which casts public service professionals and others involved in service delivery as 'street-level bureaucrats' because their high degree of discretionary rule-making power enabled them to effectively make policy as well as implement it. The article considers the relationship between education reform and the NPM and focuses on the increased emphasis on skills-based teaching and changes in management and leadership in schools. The literature and survey of teachers demonstrate that discretion in the workplace has been eroded to such an extent due to a high degree of central regulation and local accountability as to question the applicability of Lipsky's model. The findings are based on the literature and a small survey undertaken by the author. © 2007 BELMAS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Access control (AC) limits access to the resources of a system only to authorized entities. Given that information systems today are increasingly interconnected, AC is extremely important. The implementation of an AC service is a complicated task. Yet the requirements to an AC service vary a lot. Accordingly, the design of an AC service should be flexible and extensible in order to save development effort and time. Unfortunately, with conventional object-oriented techniques, when an extension has not been anticipated at the design time, the modification incurred by the extension is often invasive. Invasive changes destroy design modularity, further deteriorate design extensibility, and even worse, they reduce product reliability. ^ A concern is crosscutting if it spans multiple object-oriented classes. It was identified that invasive changes were due to the crosscutting nature of most unplanned extensions. To overcome this problem, an aspect-oriented design approach for AC services was proposed, as aspect-oriented techniques could effectively encapsulate crosscutting concerns. The proposed approach was applied to develop an AC framework that supported role-based access control model. In the framework, the core role-based access control mechanism is given in an object-oriented design, while each extension is captured as an aspect. The resulting framework is well-modularized, flexible, and most importantly, supports noninvasive adaptation. ^ In addition, a process to formalize the aspect-oriented design was described. The purpose is to provide high assurance for AC services. Object-Z was used to specify the static structure and Predicate/Transition net was used to model the dynamic behavior. Object-Z was extended to facilitate specification in an aspect-oriented style. The process of formal modeling helps designers to enhance their understanding of the design, hence to detect problems. Furthermore, the specification can be mathematically verified. This provides confidence that the design is correct. It was illustrated through an example that the model was ready for formal analysis. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to low cost and easy deployment, multi-hop wireless networks become a very attractive communication paradigm. However, IEEE 802.11 medium access control (MAC) protocol widely used in wireless LANs was not designed for multi-hop wireless networks. Although it can support some kinds of ad hoc network architecture, it does not function efficiently in those wireless networks with multi-hop connectivity. Therefore, our research is focused on studying the medium access control in multi-hop wireless networks. The objective is to design practical MAC layer protocols for supporting multihop wireless networks. Particularly, we try to prolong the network lifetime without degrading performances with small battery-powered devices and improve the system throughput with poor quality channels. ^ In this dissertation, we design two MAC protocols. The first one is aimed at minimizing energy-consumption without deteriorating communication activities, which provides energy efficiency, latency guarantee, adaptability and scalability in one type of multi-hop wireless networks (i.e. wireless sensor network). Methodologically, inspired by the phase transition phenomena in distributed networks, we define the wake-up probability, which maintained by each node. By using this probability, we can control the number of wireless connectivity within a local area. More specifically, we can adaptively adjust the wake-up probability based on the local network conditions to reduce energy consumption without increasing transmission latency. The second one is a cooperative MAC layer protocol for multi-hop wireless networks, which leverages multi-rate capability by cooperative transmission among multiple neighboring nodes. Moreover, for bidirectional traffic, the network throughput can be further increased by using the network coding technique. It is a very helpful complement for current rate-adaptive MAC protocols under the poor channel conditions of direct link. Finally, we give an analytical model to analyze impacts of cooperative node on the system throughput. ^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public school choice education policy attempts to create an education marketplace. Although school choice research has focused on the parent role in the school choice process, little is known about parents served by low-performing schools. Following market theory, students attending low-performing schools should be the primary students attempting to use school choice policy to access high performing schools rather than moving to a better school. However, students remain in these low-performing schools. This study took place in Miami-Dade County, which offers a wide variety of school choice options through charter schools, magnet schools, and open-choice schools. ^ This dissertation utilized a mixed-methods design to examine the decision-making process and school choice options utilized by the parents of students served by low-performing elementary schools in Miami-Dade County. Twenty-two semi-structured interviews were conducted with the parents of students served by low-performing schools. Binary logistic regression models were fitted to the data to compare the demographic characteristics, academic achievement and distance from alternative schooling options between transfers and non-transfers. Multinomial logistic regression models were fitted to the data to evaluate how demographic characteristics, distance to transfer school, and transfer school grade influenced the type of school a transfer student chose. A geographic analysis was conducted to determine how many miles students lived from alternative schooling options and the miles transfer students lived away from their transfer school. ^ The findings of the interview data illustrated that parents’ perceived needs are not being adequately addressed by state policy and county programs. The statistical analysis found that students from higher socioeconomic social groups were not more likely to transfer than students from lower socioeconomic social groups. Additionally, students who did transfer were not likely to end up at a high achieving school. The findings of the binary logistic regression demonstrated that transfer students were significantly more likely to live near alternative school options.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public school choice education policy attempts to create an education marketplace. Although school choice research has focused on the parent role in the school choice process, little is known about parents served by low-performing schools. Following market theory, students attending low-performing schools should be the primary students attempting to use school choice policy to access high performing schools rather than moving to a better school. However, students remain in these low-performing schools. This study took place in Miami-Dade County, which offers a wide variety of school choice options through charter schools, magnet schools, and open-choice schools. This dissertation utilized a mixed-methods design to examine the decision-making process and school choice options utilized by the parents of students served by low-performing elementary schools in Miami-Dade County. Twenty-two semi-structured interviews were conducted with the parents of students served by low-performing schools. Binary logistic regression models were fitted to the data to compare the demographic characteristics, academic achievement and distance from alternative schooling options between transfers and non-transfers. Multinomial logistic regression models were fitted to the data to evaluate how demographic characteristics, distance to transfer school, and transfer school grade influenced the type of school a transfer student chose. A geographic analysis was conducted to determine how many miles students lived from alternative schooling options and the miles transfer students lived away from their transfer school. The findings of the interview data illustrated that parents’ perceived needs are not being adequately addressed by state policy and county programs. The statistical analysis found that students from higher socioeconomic social groups were not more likely to transfer than students from lower socioeconomic social groups. Additionally, students who did transfer were not likely to end up at a high achieving school. The findings of the binary logistic regression demonstrated that transfer students were significantly more likely to live near alternative school options.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter considers the policy and practice of partnership working amongst educational organisations and related service providers as a means of promoting social inclusion in higher education (HE). It draws on an empirical study of partnership working in an area of England which has low levels of participation in HE, consistently performs poorly in national measures of educational achievement, and contains pockets of severe economic and social deprivation. The empirical research focuses on the work of senior managers from seventeen organisations who formed a sub-regional partnership as a strategy to raise aspirations, widen participation in HE and promote social inclusion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Web is a powerful hypermedia-based information retrieval mechanism that provides a user-friendly access across all major computer platforms connected over Internet. This paper demonstrates the application of Web technology when used as an educational delivery tool. It also reports on the development of a prototype electronic publishing project where Web technology was used to deliver power engineering educational resources. The resulting hyperbook will contain diverse teaching resources such as hypermedia-based modular educational units and computer simulation programs that are linked in a meaningful and structured way. The use of Web for disseminating information of this nature has many advantages that cannot possibly be achieved otherwise. PREAMBLE The continual increase of low-cost functionality available in desktop computing has opened up a new possibility in learning within a wider educational framework. This technology also is supported by enhanced features offered by new and ...