959 resultados para Key policies


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The dream of pervasive computing is slowly becoming a reality. A number of projects around the world are constantly contributing ideas and solutions that are bound to change the way we interact with our environments and with one another. An essential component of the future is a software infrastructure that is capable of supporting interactions on scales ranging from a single physical space to intercontinental collaborations. Such infrastructure must help applications adapt to very diverse environments and must protect people's privacy and respect their personal preferences. In this paper we indicate a number of limitations present in the software infrastructures proposed so far (including our previous work). We then describe the framework for building an infrastructure that satisfies the abovementioned criteria. This framework hinges on the concepts of delegation, arbitration and high-level service discovery. Components of our own implementation of such an infrastructure are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the IoT and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to secure multicast communications. Our protocol is simple and it reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy. To assess our protocol, we conduct a detailed analysis with respect to its communcation and storage costs. This analysis is validated through simulation to highlight energy gains. The obtained results show that our protocol outperforms its peers with respect to keying overhead and the mobility of members.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urquhart, C., Durbin, J. & Turner, J. (2005). North Wales Clinical Librarian project. Final project report. Aberystwyth: Department of Information Studies. Summary report, plus individual site summary reports also available from http://users.aber.ac.uk/cju/ Sponsorship: NHS Trusts in North Wales

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cooper, J. & Urquhart, C. (2004). Confidentiality issues in information systems in social care. In K. Grant, D.A. Edgar & M. Jordan (Eds.), Reflections on the past, making sense of today and predicting the future of information systems, 9th annual UKAIS (UK Academy of Information Systems) conference proceedings, Annual conference, 5-7 May 2004, Glasgow Caledonian University (CD-ROM). Glasgow: Glasgow Caledonian University for UKAIS Sponsorship: AHRC

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Yeoman, A., Durbin, J. & Urquhart, C. (2004). Evaluating SWICE-R (South West Information for Clinical Effectiveness - Rural). Final report for South West Workforce Development Confederations, (Knowledge Resources Development Unit). Aberystwyth: Department of Information Studies, University of Wales Aberystwyth. Sponsorship: South West WDCs (NHS)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Urquhart, C., Spink, S., Thomas, R., Yeoman, A., Durbin, J., Turner, J., Fenton, R. & Armstrong, C. (2004). JUSTEIS: JISC Usage Surveys: Trends in Electronic Information Services Final report 2003/2004 Cycle Five. Aberystwyth: Department of Information Studies, University of Wales Aberystwyth. Sponsorship: JISC

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Journal of Energy and Natural Resources Law, 24(4) pp.574-606 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fuller-Love, Nerys, et al., 'Euro-Commentary : Scenario Analysis and Regional Economic Development: The Case of Mid Wales', European Urban and Regional Studies (2006) 13(2) pp.143-149 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fuller-Love, N., Midmore, P., Thomas, D., Henley, A. (2006). Entrepreneurship and rural economic development: A scenario analysis approach. International Journal of Entrepreneurial Behaviour and Research, 12 (5), 289-305. RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Griffiths, L.; and O'Malley, T. (2007). Media Literacy in Wales: a Critical Review of Industry and Education Policies. Cyfrwng. 4, pp.7-23. RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese apresentada à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Doutor em Ciências Sociais, especialidade em Estudos de Minorias

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For many librarians, institutional repositories (IRs) promised significant change for academic libraries. We envisioned enlarging collection development scope to include locally produced scholarship and an expansion of library services to embrace scholarly publication and distribution. However, at the University of Rochester, as at many other institutions, this transformational technology was introduced in the conservative, controlled manner associated with stereotypical librarian culture, and so these expected changes never materialized. In this case study, we focus on the creation of our institutional repository (a potentially disruptive technology) and how its success was hampered by our organizational culture, manifested as a lengthy and complicated set of policies. In the following pages, we briefly describe our repository project, talk about our original policies, look at the ways those policies impeded our project, and discuss the disruption of those policies and the benefits in user uptake that resulted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transport protocols are an integral part of the inter-process communication (IPC) service used by application processes to communicate over the network infrastructure. With almost 30 years of research on transport, one would have hoped that we have a good handle on the problem. Unfortunately, that is not true. As the Internet continues to grow, new network technologies and new applications continue to emerge putting transport protocols in a never-ending flux as they are continuously adapted for these new environments. In this work, we propose a clean-slate transport architecture that renders all possible transport solutions as simply combinations of policies instantiated on a single common structure. We identify a minimal set of mechanisms that once instantiated with the appropriate policies allows any transport solution to be realized. Given our proposed architecture, we contend that there are no more transport protocols to design—only policies to specify. We implement our transport architecture in a declarative language, Network Datalog (NDlog), making the specification of different transport policies easy, compact, reusable, dynamically configurable and potentially verifiable. In NDlog, transport state is represented as database relations, state is updated/queried using database operations, and transport policies are specified using declarative rules. We identify limitations with NDlog that could potentially threaten the correctness of our specification. We propose several language extensions to NDlog that would significantly improve the programmability of transport policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Web caching aims to reduce network traffic, server load, and user-perceived retrieval delays by replicating "popular" content on proxy caches that are strategically placed within the network. While key to effective cache utilization, popularity information (e.g. relative access frequencies of objects requested through a proxy) is seldom incorporated directly in cache replacement algorithms. Rather, other properties of the request stream (e.g. temporal locality and content size), which are easier to capture in an on-line fashion, are used to indirectly infer popularity information, and hence drive cache replacement policies. Recent studies suggest that the correlation between these secondary properties and popularity is weakening due in part to the prevalence of efficient client and proxy caches (which tend to mask these correlations). This trend points to the need for proxy cache replacement algorithms that directly capture and use popularity information. In this paper, we (1) present an on-line algorithm that effectively captures and maintains an accurate popularity profile of Web objects requested through a caching proxy, (2) propose a novel cache replacement policy that uses such information to generalize the well-known GreedyDual-Size algorithm, and (3) show the superiority of our proposed algorithm by comparing it to a host of recently-proposed and widely-used algorithms using extensive trace-driven simulations and a variety of performance metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this Report is to inform discussions, policy formulation, and strategic planning on teacher education in Ireland. The research gives priority to initial teacher education (ITE) and induction, their interface, and implications for the continuum of teacher education, including continuing professional development (CPD). The study involved a two-pronged approach: a narrative review of recent and relevant literature and a cross-national review of teacher education policies in nine countries, namely, Ireland, Northern Ireland, Scotland, England, Finland, USA, Poland, Singapore and New Zealand. Adopting a broad, balanced and comprehensive understanding of the role of the contemporary teacher, it provides a framework for developing quality teacher education in Ireland. The Report incorporates exemplars of good practice and notes their implementation challenges for the Irish context.  Chapter One provides a framework for conceptualising quality teacher education and the continuum. Key features that emerge from the literature are discussed: teachers¿ practice, quality teaching, the professional life-cycle, teacher learning and relationships. With more specific reference to the continuum, Chapter Two overviews initial teacher education, induction, learning outcomes and accreditation in the selected countries, including Ireland. Key features of policy in the various countries are summarised. Individual country profiles, incorporating descriptions of socio-political, teaching and teacher education contexts, are further detailed in Appendix A. Chapter Three analyses relevant literature on initial teacher education, induction, learning outcomes/professional standards and accreditation. Along with previous chapters it provides the basis for recommendations for teacher education that are presented in Chapter Four. Chapter Four draws together the findings emerging from the cross-national review in terms of the contemporary context of teacher education in Ireland and identifies key challenges and possible lines of policy development as well as recommendations for the Teaching Council and other teacher education stakeholders. Each generation has an opportunity to provide the vision and resources for renewing teacher education in light of ambitious social, economic and educational aspirations to meet perceived societal and education challenges (as occurred in the 1970s). Despite the publication of two key reviews of initial teacher education a number of years ago, there is considerable scope for further reform of teacher education. However, significant changes have occurred to teacher education course provision and content over the last 100 years. In this report, we have stressed the need for, and called for investment in, greater system and programme coherence, mentoring to support assisted practice, knowledge integration, critical reflective practice, inquiry and the development of vibrant partnerships between higher education institutions and schools as the basis for teacher education reform across the continuum. This Executive Summary presents the Report¿s context, key findings and recommendations emerging from the analysis.