Sample records for access control list

  1. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  2. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  3. Population Education Accessions List. January-December 1993.

    ERIC Educational Resources Information Center

    United Nations Educational, Scientific and Cultural Organization, Bangkok (Thailand). Principal Regional Office for Asia and the Pacific.

    This document consists of the two issues of the bi-annual Population Education Accessions list, an output from a computerized bibliographic database. The first issue lists the entries from January to June, and the second issue lists the entries from July to December. The issues categorize the total of 387 entries into four parts. Part I,…

  4. A Document-Based EHR System That Controls the Disclosure of Clinical Documents Using an Access Control List File Based on the HL7 CDA Header.

    PubMed

    Takeda, Toshihiro; Ueda, Kanayo; Nakagawa, Akito; Manabe, Shirou; Okada, Katsuki; Mihara, Naoki; Matsumura, Yasushi

    2017-01-01

    Electronic health record (EHR) systems are necessary for the sharing of medical information between care delivery organizations (CDOs). We developed a document-based EHR system in which all of the PDF documents that are stored in our electronic medical record system can be disclosed to selected target CDOs. An access control list (ACL) file was designed based on the HL7 CDA header to manage the information that is disclosed.

  5. Population Education Accessions List, September-December 1996.

    ERIC Educational Resources Information Center

    United Nations Educational, Scientific and Cultural Organization, Bangkok (Thailand). Principal Regional Office for Asia and the Pacific.

    This issue of the Population Education Accessions List is an output from United Nation's Educational Social and Cultural Organization's (UNESCO) computerized bibliographic database. It categorizes entries into three parts. Part I, Population Education, consists of titles that address various aspects of population education arranged by country in…

  6. NASA Thesaurus. Volume 1: Hierarchical listing. Volume 2: Access vocabulary. Volume 3: Definitions

    NASA Technical Reports Server (NTRS)

    1994-01-01

    There are over 17,500 postable terms and some 4,000 nonpostable terms approved for use in the NASA Scientific and Technical Information Database in the Hierarchical Listing of the NASA Thesaurus. The generic structure is presented for many terms. The broader term and narrower term relationships are shown in an indented fashion that illustrates the generic structure better than the more widely used BT and NT listings. Related terms are generously applied, thus enhancing the usefulness of the Hierarchical Listing. Greater access to the Hierarchical Listing may be achieved with the collateral use of Volume 2 - Access Vocabulary and Volume 3 - Definitions.

  7. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  8. Contexts and Control Operations Used in Accessing List-Specific, Generalized, and Semantic Memories

    ERIC Educational Resources Information Center

    Humphreys, Michael S.; Murray, Krista L.; Maguire, Angela M.

    2009-01-01

    The human ability to focus memory retrieval operations on a particular list, episode or memory structure has not been fully appreciated or documented. In Experiment 1-3, we make it increasingly difficult for participants to switch between a less recent list (multiple study opportunities), and a more recent list (single study opportunity). Task…

  9. 76 FR 81793 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... Commerce Control List), Category 9 Aerospace and Propulsion, Product Group E is amended by revising the...'' ``technology'' for repair, rebuild and overhaul. Excluded from 9E001 to 9E003 control are: technical data...

  10. 77 FR 46948 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-07

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... to 7A005. 0 C. On page 840, in 7A008, add ``License Requirements'' above ``Reason for Control''. 0 D... text to be added is set forth below: Supplement No. 1 to Part 774--The Commerce Control List...

  11. 41 CFR 102-36.435 - How do we identify Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring demilitarization? 102-36.435... Personal Property Whose Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.435 How do we identify Munitions List Items (MLIs)/Commerce Control List Items...

  12. 41 CFR 102-36.435 - How do we identify Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring demilitarization? 102-36.435... Personal Property Whose Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.435 How do we identify Munitions List Items (MLIs)/Commerce Control List Items...

  13. 41 CFR 102-36.435 - How do we identify Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring demilitarization? 102-36.435... Personal Property Whose Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.435 How do we identify Munitions List Items (MLIs)/Commerce Control List Items...

  14. 41 CFR 102-36.435 - How do we identify Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring demilitarization? 102-36.435... Personal Property Whose Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.435 How do we identify Munitions List Items (MLIs)/Commerce Control List Items...

  15. 41 CFR 102-36.435 - How do we identify Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs) requiring demilitarization? 102-36.435... Personal Property Whose Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.435 How do we identify Munitions List Items (MLIs)/Commerce Control List Items...

  16. 41 CFR 102-36.430 - May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? 102-36.430 Section 102-36.430 Public... Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.430 May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? You may...

  17. 41 CFR 102-36.430 - May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? 102-36.430 Section 102-36.430 Public... Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.430 May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? You may...

  18. 41 CFR 102-36.430 - May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? 102-36.430 Section 102-36.430 Public... Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.430 May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? You may...

  19. 41 CFR 102-36.430 - May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? 102-36.430 Section 102-36.430 Public... Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.430 May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? You may...

  20. 41 CFR 102-36.430 - May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? 102-36.430 Section 102-36.430 Public... Disposal Requires Special Handling Munitions List Items/commerce Control List Items (mlis/cclis) § 102-36.430 May we dispose of excess Munitions List Items (MLIs)/Commerce Control List Items (CCLIs)? You may...

  1. 76 FR 66181 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300-799, revised as of January 1... to read as follows: Supplement No. 1 to PART 774--THE COMMERCE CONTROL LIST * * * * * 1C118 Titanium...

  2. 76 FR 66181 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300-799, revised as of January 1... read as follows: Supplement No. 1 to PART 774--THE COMMERCE CONTROL LIST * * * * * 2B008 Assemblies or...

  3. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  4. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  5. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  6. Capturing the Sun: A Roadmap for Navigating Data-Access Challenges and Auto-Populating Solar Home Sales Listings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stukel, Laura; Hoen, Ben; Adomatis, Sandra

    Capturing the Sun: A Roadmap for Navigating Data-Access Challenges and Auto-Populating Solar Home Sales Listings supports a vision of solar photovoltaic (PV) advocates and real estate advocates evolving together to make information about solar homes more accessible to home buyers and sellers and to simplify the process when these homes are resold. The Roadmap is based on a concept in the real estate industry known as automatic population of fields. Auto-population (also called auto-pop in the industry) is the technology that allows data aggregated by an outside industry to be matched automatically with home sale listings in a multiple listingmore » service (MLS).« less

  7. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical. The terms narcotic drug, controlled substance, and listed chemical have the meanings given those terms...

  8. The ATS Web Page Provides "Tool Boxes" for: Access Opportunities, Performance, Interfaces, Volume, Environments, "Wish List" Entry and Educational Outreach

    NASA Technical Reports Server (NTRS)

    1999-01-01

    This viewgraph presentation gives an overview of the Access to Space website, including information on the 'tool boxes' available on the website for access opportunities, performance, interfaces, volume, environments, 'wish list' entry, and educational outreach.

  9. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  10. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  11. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  12. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  13. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  14. 31 CFR 598.309 - Narcotic drug; controlled substance; listed chemical.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Narcotic drug; controlled substance; listed chemical. 598.309 Section 598.309 Money and Finance: Treasury Regulations Relating to Money and... SANCTIONS REGULATIONS General Definitions § 598.309 Narcotic drug; controlled substance; listed chemical...

  15. 77 FR 41670 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... Requirements'' above ``Reason for Control''. C. On page 665, in 0A986, correct the table under ``License...'' and ``Rwanda'' in UN Reason for Control. 2. In Category 1: A. On page 676, in 1A004, add ``(1)'' after...

  16. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  17. Modernizing the World Health Organization List of Essential Medicines for Preventing and Controlling Cardiovascular Diseases.

    PubMed

    Kishore, Sandeep P; Blank, Evan; Heller, David J; Patel, Amisha; Peters, Alexander; Price, Matthew; Vidula, Mahesh; Fuster, Valentin; Onuma, Oyere; Huffman, Mark D; Vedanthan, Rajesh

    2018-02-06

    The World Health Organization (WHO) Model List of Essential Medicines (EML) is a key tool for improving global access to medicines for all conditions, including cardiovascular diseases (CVDs). The WHO EML is used by member states to determine their national essential medicine lists and policies and to guide procurement of medicines in the public sector. Here, we describe our efforts to modernize the EML for global CVD prevention and control. We review the recent history of applications to add, delete, and change indications for CVD medicines, with the aim of aligning the list with contemporary clinical practice guidelines. We have identified 4 issues that affect decisions for the EML and may strengthen future applications: 1) cost and cost-effectiveness; 2) presence in clinical practice guidelines; 3) feedback loops; and 4) community engagement. We share our lessons to stimulate others in the global CVD community to embark on similar efforts. Copyright © 2018 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  18. The Near-Earth Object Human Space Flight Accessible Targets Study (NHATS) List of Near-Earth Asteroids: Identifying Potential Targets for Future Exploration

    NASA Astrophysics Data System (ADS)

    Abell, Paul; Barbee, B. W.; Mink, R. G.; Adamo, D. R.; Alberding, C. M.; Mazanek, D. D.; Johnson, L. N.; Yeomans, D. K.; Chodas, P. W.; Chamberlin, A. B.; Benner, L. A. M.; Drake, B. G.; Friedensen, V. P.

    2012-10-01

    Introduction: Much attention has recently been focused on human exploration of near-Earth asteroids (NEAs). Detailed planning for deep space exploration and identification of potential NEA targets for human space flight requires selecting objects from the growing list of known NEAs. NASA therefore initiated the Near-Earth Object Human Space Flight Accessible Target Study (NHATS), which uses dynamical trajectory performance constraints to identify potentially accessible NEAs. Accessibility Criteria: Future NASA human space flight capability is being defined while the Orion Multi-Purpose Crew Vehicle and Space Launch System are under development. Velocity change and mission duration are two of the most critical factors in any human spaceflight endeavor, so the most accessible NEAs tend to be those with orbits similar to Earth’s. To be classified as NHATS-compliant, a NEA must offer at least one round-trip trajectory solution satisfying purposely inclusive constraints, including total mission change in velocity ≤ 12 km/s, mission duration ≤ 450 days (with at least 8 days at the NEA), Earth departure between Jan 1, 2015 and Dec 31, 2040, Earth departure C3 ≤ 60 km2/s2, and Earth return atmospheric entry speed ≤ 12 km/s. Monitoring and Updates: The NHATS list of potentially accessible targets is continuously updated as NEAs are discovered and orbit solutions for known NEAs are improved. The current list of accessible NEAs identified as potentially viable for future human exploration under the NHATS criteria is available to the international community via a website maintained by NASA’s NEO Program Office (http://neo.jpl.nasa.gov/nhats/). This website also lists predicted optical and radar observing opportunities for each NHATS-compliant NEA to facilitate acquisition of follow-up observations. Conclusions: This list of NEAs will be useful for analyzing robotic mission opportunities, identifying optimal round trip human space flight trajectories, and

  19. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  20. 77 FR 43711 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300 to 799, revised as of January... II, in 5E002, after ``Related Controls'' and before ``Items'', add ``Related Definitions: N/A''. [FR...

  1. 77 FR 45927 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-02

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List... ``6A001.a.1 does not control''. 0 B. On page 807, in paragraph a.1.a.1.a, remove ``20'' and add ``20[deg... for Control''. 0 5. In 6D001, on page 831, remove ``CIV: * * *'' and add ``CIV: N/A'' in its place. 0...

  2. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  3. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  4. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  5. 76 FR 79054 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction 0 In Title 15 of the Code of Federal Regulations, Parts 300 to 799, revised as of... entry in the table under Reasons for control for NS Column 1 and adding an entry following the remaining...

  6. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  7. 15 CFR 738.2 - Commerce Control List (CCL) structure.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... identified, you should match the particular characteristics and functions of your item to a specific ECCN. If the ECCN contains a list under the Items heading, you should review the list to determine within which..., individual items are identified by an Export Control Classification Number (ECCN). Each number consists of a...

  8. 15 CFR 738.2 - Commerce Control List (CCL) structure.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... identified, you should match the particular characteristics and functions of your item to a specific ECCN. If the ECCN contains a list under the Items heading, you should review the list to determine within which..., individual items are identified by an Export Control Classification Number (ECCN). Each number consists of a...

  9. The CDC Hemophilia B mutation project mutation list: a new online resource.

    PubMed

    Li, Tengguo; Miller, Connie H; Payne, Amanda B; Craig Hooper, W

    2013-11-01

    Hemophilia B (HB) is caused by mutations in the human gene F9. The mutation type plays a pivotal role in genetic counseling and prediction of inhibitor development. To help the HB community understand the molecular etiology of HB, we have developed a listing of all F9 mutations that are reported to cause HB based on the literature and existing databases. The Centers for Disease Control and Prevention (CDC) Hemophilia B Mutation Project (CHBMP) mutation list is compiled in an easily accessible format of Microsoft Excel and contains 1083 unique mutations that are reported to cause HB. Each mutation is identified using Human Genome Variation Society (HGVS) nomenclature standards. The mutation types and the predicted changes in amino acids, if applicable, are also provided. Related information including the location of mutation, severity of HB, the presence of inhibitor, and original publication reference are listed as well. Therefore, our mutation list provides an easily accessible resource for genetic counselors and HB researchers to predict inhibitors. The CHBMP mutation list is freely accessible at http://www.cdc.gov/hemophiliamutations.

  10. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  11. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  12. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  13. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  14. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  15. 30 CFR 773.25 - Who may challenge ownership or control listings and findings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Who may challenge ownership or control listings... EXPLORATION SYSTEMS UNDER REGULATORY PROGRAMS REQUIREMENTS FOR PERMITS AND PERMIT PROCESSING § 773.25 Who may challenge ownership or control listings and findings. You may challenge a listing or finding of ownership or...

  16. 50 CFR 648.92 - Effort-control program for monkfish limited access vessels.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... Limited access NE multispecies and limited access sea scallop permit holders who also possess a limited... Regional Administrator within 24 hours after tags have been discovered lost, destroyed, or missing. (iv... § 648.92, see the List of CFR Sections Affected, which appears in the Finding Aids section of the...

  17. Microbial threat lists: obstacles in the quest for biosecurity?

    PubMed

    Casadevall, Arturo; Relman, David A

    2010-02-01

    Anxiety about threats from the microbial world and about the deliberate misuse of microorganisms has led to efforts to define and control these dangers using lists and regulations. One list with tremendous legal implications and a potentially huge impact on research is the Select Agents and Toxins List, which was created by the US Government to limit the possession of and access to particular microorganisms and toxins. In this article, in addition to highlighting general problems with taxonomy-based, microorganism-centric lists, we discuss our view that such lists may have the paradoxical effect of increasing the societal vulnerability to biological attack and natural epidemics by interfering with the sharing of microbial samples and hindering research on vaccines and therapeutics.

  18. 78 FR 37371 - Wassenaar Arrangement 2012 Plenary Agreements Implementation: Commerce Control List, Definitions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-20

    ...The Bureau of Industry and Security (BIS) maintains, as part of its Export Administration Regulations (EAR), the Commerce Control List (CCL), which identifies certain of the items subject to Department of Commerce jurisdiction. This final rule revises the CCL to implement changes made to the Wassenaar Arrangement's List of Dual-Use Goods and Technologies (Wassenaar List) maintained and agreed to by governments participating in the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (Wassenaar Arrangement, or WA) at the December 2012 WA Plenary Meeting (the Plenary). The Wassenaar Arrangement advocates implementation of effective export controls on strategic items with the objective of improving regional and international security and stability. This rule harmonizes the CCL with the changes made to the WA List at the Plenary by revising ECCNs controlled for national security reasons in each category of the CCL, except category 8, as well as amending the General Software Note, WA reporting requirements, and definitions section in the EAR. BIS is adding unilateral controls to the CCL for specific software and technology for aviation control systems, which the WA agreements removed from the WA List, i.e., EAR national security controls.

  19. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  20. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  1. Union Listing via OCLC's Serials Control Subsystem.

    ERIC Educational Resources Information Center

    O'Malley, Terrence J.

    1984-01-01

    Describes library use of Conversion of Serials Project's (CONSER) online national machine-readable database for serials to create online union lists of serials via OCLC's Serial Control Subsystem. Problems in selection of appropriate, accurate, and authenticated records and prospects for the future are discussed. Twenty sources and sample records…

  2. NASA thesaurus. Volume 1: Hierarchical Listing

    NASA Technical Reports Server (NTRS)

    1988-01-01

    There are over 17,000 postable terms and nearly 4,000 nonpostable terms approved for use in the NASA scientific and technical information system in the Hierarchical Listing of the NASA Thesaurus. The generic structure is presented for many terms. The broader term and narrower term relationships are shown in an indented fashion that illustrates the generic structure better than the more widely used BT and NT listings. Related terms are generously applied, thus enhancing the usefulness of the Hierarchical Listing. Greater access to the Hierarchical Listing may be achieved with the collateral use of Volume 2 - Access Vocabulary and Volume 3 - Definitions.

  3. NASA thesaurus. Volume 1: Hierarchical listing

    NASA Technical Reports Server (NTRS)

    1985-01-01

    There are 16,835 postable terms and 3,765 nonpostable terms approved for use in the NASA scientific and technical information system in the Hierarchical Listing of the NASA Thesaurus. The generic structure is presented for many terms. The broader term and narrower term relationships are shown in an indented fashion that illustrates the generic structure better than the more widely used BT and NT listings. Related terms are generously applied, thus enhancing the usefulness of the Hierarchical Listing. Greater access to the Hierarchical Listing may be achieved with the collateral use of Volume 2 - Access Vocabulary.

  4. NASA Thesaurus. Volume 1: Hierarchical listing

    NASA Technical Reports Server (NTRS)

    1982-01-01

    There are 16,713 postable terms and 3,716 nonpostable terms approved for use in the NASA scientific and technical information system in the Hierarchical Listing of the NASA Thesaurus. The generic structure is presented for many terms. The broader term and narrower term relationships are shown in an indented fashion that illustrates the generic structure better than the more widely used BT and NT listings. Related terms are generously applied, thus enhancing the usefulness of the Hierarchical Listing. Greater access to the Hierarchical Listing may be achieved with the collateral use of Volume 2 - Access Vocabulary.

  5. Parallel Systems Laboratory: Access, Allocation, and Control

    DTIC Science & Technology

    1992-06-30

    boog Eae...4d READ ISTRUCTIONSREPORT DOCUMENTATIO PAGE BEFOR COMPLETNG FORM I. REPORT NUMNER 2. GOVT ACCESSION NO 3- RECIPINT’S CATALOG NUMR9 . TITLE (an...a summary of the salient results of this research in capsule form which is followed by an extensive list of publications, dissertations and theses...because it provides the asymptotic use of currently wasted cycles. To do so, we examine a distribution of w(u It) in a very simple form and for

  6. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  7. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  8. List of Publicly Accessible Internet Sites Hosting Compliance Data and Information Required by the Disposal of Coal Combustion Residuals Rule

    EPA Pesticide Factsheets

    This page is to make accessible a list of the websites coal-fired power plants have created to post for the public to view with respect to their compliance with the disposal of coal combustion residuals final rule.

  9. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2015-01-01

    ... 15 Commerce and Foreign Trade 2 2015-01-01 2015-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  10. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  11. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  12. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  13. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  14. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. 1...

  15. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2017-01-01

    ... 15 Commerce and Foreign Trade 2 2017-01-01 2017-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. No. 1...

  16. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2016-01-01

    ... 15 Commerce and Foreign Trade 2 2016-01-01 2016-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. No. 1...

  17. 15 CFR Supplement No. 1 to Part 774 - The Commerce Control List

    Code of Federal Regulations, 2010 CFR

    2018-01-01

    ... 15 Commerce and Foreign Trade 2 2018-01-01 2018-01-01 false The Commerce Control List No. Supplement No. 1 to Part 774 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS THE COMMERCE CONTROL LIST Pt. 774, Supp. No. 1...

  18. 77 FR 48429 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-14

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In the Federal Register published on July 26, 2012, on page 43711, in the third column, in instruction 3.C., ``5A003'' is corrected to read ``5A002''. [FR Doc. 2012-19955 Filed 8-13-12; 8...

  19. 76 FR 30538 - The Commerce Control List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-26

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 The Commerce Control List CFR Correction In Title 15 of the Code of Federal Regulations, Parts 300 to 799, revised as of January 1, 2011, on page 802, in Supplement No. 1 to Part 774, in Category 6, in ECCN 6A005, the following...

  20. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  1. Revealing List-Level Control in the Stroop Task by Uncovering Its Benefits and a Cost

    PubMed Central

    Bugg, Julie M.; McDaniel, Mark A.; Scullin, Michael K.; Braver, Todd S.

    2012-01-01

    Interference is reduced in mostly incongruent relative to mostly congruent lists. Classic accounts of this list-wide proportion congruence effect assume that list-level control processes strategically modulate word reading. Contemporary accounts posit that reliance on the word is modulated poststimulus onset by item-specific information (e.g., proportion congruency of the word). To adjudicate between these accounts, we used novel designs featuring neutral trials. In two experiments, we showed that the list-wide proportion congruence effect is accompanied by a change in neutral trial color-naming performance. Because neutral words have no item-specific bias, this pattern can be attributed to list-level control. Additionally, we showed that list-level attenuation of word reading led to a cost to performance on a secondary prospective memory task but only when that task required processing of the irrelevant, neutral word. These findings indicate that the list-wide proportion congruence effect at least partially reflects list-level control and challenge purely item-specific accounts of this effect. PMID:21767049

  2. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  3. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  4. NSSDC data listing

    NASA Technical Reports Server (NTRS)

    Horowitz, Richard; King, Joseph H.

    1993-01-01

    This document identifies, in a highly summarized way, all the data held at the NSSDC. These data cover astrophysics and astronomy, solar and space physics, planetary and lunar, and Earth science disciplines. They are primarily, but not exclusively, from past and ongoing NASA spaceflight missions. We first identify all the data electronically available through NSSDC's principal online (magnetic disk-based) and nearline (robotics jukebox-based) systems, and then those data available on CDROM's. Finally, we identify all NSSDC-held data, the majority of which are still offline on magnetic tape, film, etc., but including the electronically accessible and CD-ROM resident data of earlier sections. These comprehensive identifications are in the form of two listings, one for the majority of NSSDC-held data sets resulting from individual instruments flown on individual spacecraft, and the other listing for the remainder of NSSDC-held data sets which do not adhere to this spacecraft/experiment/dataset hierarchy. The latter listing is presented in two parts, one for the numerous source catalogs of the NSSDC-operated Astronomical Data Center, and the other for the remainder. Access paths to all these data, and to further information about each, are also given in the related sections of this Data Listing. Note that this document is a companion to the electronically accessible information files (in particular, the NASA Master Directory) at NSSDC which also identify NSSDC-resident (and other) data.

  5. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  6. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  7. A national analysis of dental waiting lists and point-in-time geographic access to subsidised dental care: can geographic access be improved by offering public dental care through private dental clinics?

    PubMed

    Dudko, Yevgeni; Kruger, Estie; Tennant, Marc

    2017-01-01

    Australia is one of the least densely populated countries in the world, with a population concentrated on or around coastal areas. Up to 33% of the Australian population are likely to have untreated dental decay, while people with inadequate dentition (fewer than 21 teeth) account for up to 34% of Australian adults. Historically, inadequate access to public dental care has resulted in long waiting lists, received much media coverage and been the subject of a new federal and state initiative. The objective of this research was to gauge the potential for reducing the national dental waiting list through geographical advantage, which could arise from subcontracting the delivery of subsidised dental care to the existing network of private dental clinics across Australia. Eligible population data were collected from the Australian Bureau of Statistics website. Waiting list data from across Australia were collected from publicly available sources and confirmed through direct communication with each individual state or territory dental health body. Quantum geographic information system software was used to map distribution of the eligible population across Australia by statistical area, and to plot locations of government and private dental clinics. Catchment areas of 5 km for metropolitan clinics and 5 km and 50 km for rural clinics were defined. The number of people on the waiting list and those eligible for subsidised dental care covered by each of the catchment areas was calculated. Percentage of the eligible population and those on the waiting list that could benefit from the potential improvement in geographic access was ascertained for metropolitan and rural residents. Fifty three percent of people on the waiting list resided within metropolitan areas. Rural and remote residents made up 47% of the population waiting to receive care. The utilisation of both government and private dental clinics for the delivery of subsidised dental care to the eligible population

  8. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  9. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  10. Population Education Accessions List. July-December 1978.

    ERIC Educational Resources Information Center

    United Nations Educational, Scientific, and Cultural Organization, Bangkok (Thailand). Regional Office for Education in Asia and Oceania.

    Identified in this pamphlet are 317 resources about population education. Compiled by UNESCO's Population Education Clearing House in Thailand, the list contains references to journal articles, monographs, research reports, teaching guides, and curriculum materials. Most were published in Asian countries and the United States during the period…

  11. Population Education Accessions Lists, July-December 1986.

    ERIC Educational Resources Information Center

    United Nations Educational, Scientific, and Cultural Organization, Bangkok (Thailand). Regional Office for Education in Asia and the Pacific.

    Part I of this resource guide contains listings of instructional materials, computer-assisted instructions, classroom activities and teaching methods. Part II deals with the knowledge base of population education. These publications are divided into 11 topics including: (1) demography; (2) documentation; (3) education (including environmental,…

  12. Population Education Accessions List. January-April, 1999.

    ERIC Educational Resources Information Center

    United Nations Educational, Scientific, and Cultural Organization, Bangkok (Thailand). Regional Office for Education in Asia and the Pacific.

    This document features output from a computerized bibliographic database. The list categorizes entries into three parts. Part I, Population Education, consists of titles that address various aspects of population education arranged by country in the first section and general materials in the second. Part II, Knowledge Base Information, consists of…

  13. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  14. NSSDC data listing

    NASA Technical Reports Server (NTRS)

    Horowitz, Richard; King, Joseph H.

    1990-01-01

    In a highly summarized way, data available from the National Space Science Data Center (NSSDC) is identified. Most data are offline data sets (on magnetic tape or as film/print products of various sizes) from individual instruments carried on spacecraft; these compose the Satellite Data Listing. Descriptive names, time spans, data form, and quantity of these data sets are identified in the listing, which is sorted alphabetically-first by spacecraft name and then by the principal investigator's or team leader's last name. Several data sets held at NSSDC, not associated with individual spaceflight instruments, are identified in separate listings following the Satellite Data Listing. These data sets make up the Supplementary Data Listings and include composite spacecraft data sets, ground-based data, models, and computer routines. The identifiers used in the Supplementary Data Listings were created by NSSDC and are explained in the pages preceding the listings. Data set form codes are listed. NSSDC offers primarily archival, retrieval, replication, and dissemination services associated with the data sets discussed in the two major listings identified above. NSSDC also provides documentation which enables the data recipient to use the data received. NSSDC is working toward expanding presently limited capabilities for data subsetting and for promotion of data files to online residence for user downloading. NSSDC data holdings span the range of scientific disciplines in which NASA is involved, and include astrophysics, lunar and planetary science, solar physics, space plasma physics, and Earth science. In addition to the functions mentioned above, NSSDC offers data via special services and systems in a number of areas, including Astronomical Data Center (ADC), Coordinated Data Analysis Workshops (CDAWs), NASA Climate Data System (NCDS), Pilot Land Data System (PLDS), and Crustal Dynamics Data Information System (CDDIS). Furthermore, NSSDC has a no-password account on its

  15. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  16. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  17. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  18. National List of Beaches

    EPA Pesticide Factsheets

    EPA has published a list of coastal recreation waters adjacent to beaches (or similar points of access) used by the public in the U.S. The list, required by the Beaches Environmental Assessment and Coastal Health Act (BEACH Act), identifies waters that are subject to a state beach water quality monitoring and public notification program consistent with the National Beach Guidance and Required Performance Criteria for BEACH Act Grants.

  19. Review of SDDOT's highway access control process

    DOT National Transportation Integrated Search

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  20. Typing for Conflict Detection in Access Control Policies

    NASA Astrophysics Data System (ADS)

    Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge

    In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

  1. Development of an Information Model for Kidney Transplant Wait List.

    PubMed

    Bircan, Hüseyin Yüce; Özçelik, Ümit; Uysal, Nida; Demirağ, Alp; Haberal, Mehmet

    2015-11-01

    Deceased-donor kidney transplant is unique among surgical procedures that are an urgent procedure performed in an elective population. It has not been possible to accurately determine when a given patient will be called for transplant. Patients on the active transplant list can be called for a transplant at any time. As a result, every effort must be made to optimize their health according to best practices and published clinical practice guidelines. Once the patient is placed on the transplant wait list after undergoing an initial extensive evaluation, continued surveillance is required. Therefore, we developed a kidney transplant wait list surveillance software program that alerts organ transplant coordinator on time regarding which patients need a work-up. The new designed software has a database of our waiting patients with their completed and pending controls. The software also has built-in functions to warn the responsible staff with an E-mail. If one of the controls of a recipient delayed, the software sends an automated E-mail to the staff regarding the patients delayed controls. The software is a Web application that works on any platform with a Web browser and Internet connection and allows access by multiple users. The software has been developed with NET platform. The database is SQL server. The software has the following functions: patient communication info, search, alert list, alert E-mail, control entry, and system management. As of January 2014, a total of 21 000 patients were registered on the National Kidney Transplant wait list in Turkey and the kidney transplant wait list had been expanding by 2000 to 3000 patients each year. Therefore computerized wait list programs are crucial to help to transplant centers to keep their patients up-to-date on time.

  2. Nencki Affective Word List (NAWL): the cultural adaptation of the Berlin Affective Word List-Reloaded (BAWL-R) for Polish.

    PubMed

    Riegel, Monika; Wierzba, Małgorzata; Wypych, Marek; Żurawski, Łukasz; Jednoróg, Katarzyna; Grabowska, Anna; Marchewka, Artur

    2015-12-01

    In the present article, we introduce the Nencki Affective Word List (NAWL), created in order to provide researchers with a database of 2,902 Polish words, including nouns, verbs, and adjectives, with ratings of emotional valence, arousal, and imageability. Measures of several objective psycholinguistic features of the words (frequency, grammatical class, and number of letters) are also controlled. The database is a Polish adaptation of the Berlin Affective Word List-Reloaded (BAWL-R; Võ et al., Behavior Research Methods 41:534-538, 2009), commonly used to investigate the affective properties of German words. Affective normative ratings were collected from 266 Polish participants (136 women and 130 men). The emotional ratings and psycholinguistic indexes provided by NAWL can be used by researchers to better control the verbal materials they apply and to adjust them to specific experimental questions or issues of interest. The NAWL is freely accessible to the scientific community for noncommercial use as supplementary material to this article.

  3. Revealing List-Level Control in the Stroop Task by Uncovering Its Benefits and a Cost

    ERIC Educational Resources Information Center

    Bugg, Julie M.; McDaniel, Mark A.; Scullin, Michael K.; Braver, Todd S.

    2011-01-01

    Interference is reduced in mostly incongruent relative to mostly congruent lists. Classic accounts of this list-wide proportion congruence effect assume that list-level control processes strategically modulate word reading. Contemporary accounts posit that reliance on the word is modulated poststimulus onset by item-specific information (e.g.,…

  4. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  5. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  6. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  7. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  8. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  9. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  10. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  11. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  12. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  13. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  14. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  15. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  16. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. Useful Computer Mailing Lists for Language Teaching and Linguistics.

    ERIC Educational Resources Information Center

    Kitao, Kenji; Kitao, S. Kathleen

    This document provides information on computer mailing lists available on the Internet that may be of interest to those in the fields of language teaching and linguistics. There are more than 24,000 lists on the Internet, all are free, and each list has a specific topic and scope. Users can access each list and enter into ongoing discussions or…

  18. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  19. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  20. Programmable Direct-Memory-Access Controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F.

    1990-01-01

    Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.

  1. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    DTIC Science & Technology

    2013-09-16

    fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011

  2. 22 CFR 121.2 - Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... the Missile Technology Control Regime Annex. 121.2 Section 121.2 Foreign Relations DEPARTMENT OF STATE... Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex. The following... Munitions List which are Missile Technology Control Regime Annex items in accordance with section 71(a) of...

  3. 22 CFR 121.2 - Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... the Missile Technology Control Regime Annex. 121.2 Section 121.2 Foreign Relations DEPARTMENT OF STATE... Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex. The following... Munitions List which are Missile Technology Control Regime Annex items in accordance with section 71(a) of...

  4. 22 CFR 121.2 - Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the Missile Technology Control Regime Annex. 121.2 Section 121.2 Foreign Relations DEPARTMENT OF STATE... Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex. The following... Munitions List which are Missile Technology Control Regime Annex items in accordance with section 71(a) of...

  5. 22 CFR 121.2 - Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... the Missile Technology Control Regime Annex. 121.2 Section 121.2 Foreign Relations DEPARTMENT OF STATE... Interpretations of the U.S. Munitions List and the Missile Technology Control Regime Annex. The following... Munitions List which are Missile Technology Control Regime Annex items in accordance with section 71(a) of...

  6. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  7. Speed control system for an access gate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bzorgi, Fariborz M

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less

  8. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  9. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  10. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  11. Access to Photography: Making Photography Accessible to Persons with Exceptional Educational Needs.

    ERIC Educational Resources Information Center

    Peterson, Charles R., Ed.

    This guide to making photography accessible to persons with exceptional educational needs contains several papers, a list of 27 organizational and bibliographic resources, a list of sources of adaptive equipment, and drawings of sample equipment modifications. Nine papers make up the text of the guide. In "An Adventure into Photography," Charles…

  12. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  13. 77 FR 71213 - Revisions to the Export Administration Regulations (EAR) To Make the Commerce Control List (CCL...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-29

    ...On December 9, 2010, the Bureau of Industry and Security (BIS) published an advance notice of proposed rulemaking entitled Commerce Control List: Revising Descriptions of Items and Foreign Availability as part of the President's Export Control Reform (ECR) Initiative. The December 9, 2010 notice sought, among other things, public comments on how descriptions of items controlled on the Commerce Control List (CCL) could be made clearer. This proposed rule would implement changes identified by BIS and the public that would make the CCL clearer. This rule would only implement changes that can be made to the CCL without requiring changes to multilateral export control regime guidelines or lists. However, BIS has identified changes that would require a decision of a multilateral regime to implement. For those changes, the U.S. Government is developing regime change proposals for consideration by members of those multilateral export control regimes. BIS will implement those changes in separate rulemakings, if approved by the respective multilateral export control regimes.

  14. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  15. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  16. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  17. [Historical changes in the list of plasma fractionation products placed on the WHO Model List of Essential Medicines].

    PubMed

    Sakagami, Yuichiro; Tsutani, Kiichiro

    2014-01-01

    The purpose of this study was to summarize the historical changes in the list of plasma fractionation products (PFP) placed on the Model List of Essential Medicines (EML) issued by the World Health Organization (WHO). PFP such as albumin, blood coagulation factors, and immunoglobulins are derived from blood collected from thousands of people. PFP have been listed since the first edition of the EML (1977). However, the PFP listed on the EML have changed dramatically because EML's selection process has changed from experience-based to evidence-based. For example, albumin, which had been listed since the 2nd edition (1979), was deleted in the 11th edition (2000) because of the uncertainty of its efficacy. Human immunoglobulin normal, which had been deleted from the 13th edition (2003), was relisted in the 15th edition (2007). Moreover, the WHO has issued several resolutions and guidelines regarding PFP production, quality, and safety in order to promote the establishment of blood programmes in every nation. The focus of WHO's EML selection process has changed over 30 years. In the 20th century, WHO mainly focused on PFP efficacy, quality, and safety problems. However, currently the focus is on the problem of PFP accessibility, especially in developing countries. Therefore, it would be important to know how to capitalize on established knowledge and production technology to increase the accessibility of PFP worldwide.

  18. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  19. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  20. Affect adjective check list assessment of mood variations in air traffic controllers.

    DOT National Transportation Integrated Search

    1971-04-01

    Three groups of subjects completed Composite Mood Adjective Check Lists (CMACL) before and after selected shifts at two air traffic control (ATC) facilities as part of a multi-discipline study of stress in ATC work. : At one facility, a high traffic ...

  1. 20 CFR 655.950 - Public access.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....950 Public access. (a) Public examination at ETA. ETA shall compile and maintain a list of employers... to. The list shall be available for public inspection at the ETA office at which the attestation was filed and such list shall be updated monthly. (b) Notice to Public. ETA shall publish semiannually a...

  2. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  3. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  4. NLM Emergency Access Initiative: FAQs

    Science.gov Websites

    provide temporary free access to full-text articles from over 650 biomedical serial titles and over 4,000 specified on the EAI welcome page can access the free full text resources during the period indicated to will I have access to this site? The dates of the free access period are listed on the home page along

  5. The effect of waiting: A meta-analysis of wait-list control groups in trials for tinnitus distress.

    PubMed

    Hesser, Hugo; Weise, Cornelia; Rief, Winfried; Andersson, Gerhard

    2011-04-01

    The response rates and effects of being placed on a wait-list control condition are well documented in psychiatric populations. Despite the usefulness of such estimates and the frequent use of no-treatment controls in clinical trials for tinnitus, the effect of waiting in a tinnitus trial has not been investigated systematically. The aim of the present study was to quantify the overall effect of wait-list control groups on tinnitus distress. Studies were retrieved via a systematic review of randomised controlled trials of cognitive behaviour therapy for tinnitus distress. Outcomes of psychometrically robust tinnitus-specific measures (Tinnitus Handicap Inventory, Tinnitus Questionnaire, Tinnitus Reaction Questionnaire) from wait-list control groups were quantified using meta-analytic techniques. Percentage of change and standard mean difference effect sizes were calculated using the pre and post wait period. Eleven studies involving 314 wait-list subjects with tinnitus were located. The analysis for a waiting period of 6 to 12 weeks revealed a mean decrease in scores on tinnitus-specific measures of 3% to 8%. Across studies, a statically significant small mean within-group effect size was obtained (Hedges' g=.17). The effects were moderated by methodological quality of the trial, sample characteristics (i.e., age, tinnitus duration), time of the wait-list and how diagnosis was established. Subjects in a tinnitus trial improve in tinnitus distress over a short waiting phase. The effects of waiting are highly variable and depend on the characteristics of the sample and of the trial. Copyright © 2011 Elsevier Inc. All rights reserved.

  6. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  7. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  8. NASA Thesaurus. Volumes 1 and 2; Hierarchical Listing with Definitions; Rotated Term Display

    NASA Technical Reports Server (NTRS)

    2012-01-01

    The NASA Thesaurus contains the authorized subject terms by which the documents in the NASA STI Databases are indexed and retrieved. The scope of this controlled vocabulary includes not only aerospace engineering, but all supporting areas of engineering and physics, the natural space sciences (astronomy, astrophysics, planetary science), Earth sciences, and to some extent, the biological sciences. Volume 1 - Hierarchical Listing With Definitions contains over 18,400 subject terms, 4,300 definitions, and more than 4,500 USE cross references. The Hierarchical Listing presents full hierarchical structure for each term along with 'related term' lists, and can serve as an orthographic authority. Volume 2 - Rotated Term Display is a ready-reference tool which provides over 52,700 additional 'access points' to the thesaurus terminology. It contains the postable and nonpostable terms found in the Hierarchical Listing arranged in a KWIC (key-word-in-context) index. This CD-ROM version of the NASA Thesaurus is in PDF format and is updated to the current year of purchase.

  9. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as

  10. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  13. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  15. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  16. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  17. Children's early reading vocabulary: description and word frequency lists.

    PubMed

    Stuart, Morag; Dixon, Maureen; Masterson, Jackie; Gray, Bob

    2003-12-01

    When constructing stimuli for experimental investigations of cognitive processes in early reading development, researchers have to rely on adult or American children's word frequency counts, as no such counts exist for English children. The present paper introduces a database of children's early reading vocabulary, for use by researchers and teachers. Texts from 685 books from reading schemes and story books read by 5-7 year-old children were used in the construction of the database. All words from the 685 books were typed or scanned into an Oracle database. The resulting up-to-date word frequency list of early print exposure in the UK is available in two forms from a website address given in this paper. This allows access to one list of the words ordered alphabetically and one list of the words ordered by frequency. We also briefly address some fundamental issues underlying early reading vocabulary (e.g., that it is heavily skewed towards low frequencies). Other characteristics of the vocabulary are then discussed. We hope the word frequency lists will be of use to researchers seeking to control word frequency, and to teachers interested in the vocabulary to which young children are exposed in their reading material.

  18. Waiting lists and elective surgery: ordering the queue.

    PubMed

    Curtis, Andrea J; Russell, Colin O H; Stoelwinder, Johannes U; McNeil, John J

    2010-02-15

    In the Australian public health system, access to elective surgery is rationed through the use of waiting lists in which patients are assigned to broad urgency categories. Surgeons are principally responsible for referring patients to waiting lists, deciding on the appropriate urgency category, and selecting patients from the waiting list to receive surgery. There are few agreed-upon criteria to help surgeons make these decisions, leading to striking differences between institutions in proportions of patients allocated to urgency categories. In other countries with publicly funded health systems, programs have been developed that aim to make prioritisation more consistent and access to surgery more equitable. As demand for health care increases, similar programs should be established in Australia using relevant clinical and psychosocial factors. Prioritisation methodology adapted for elective surgery may have a role in prioritising high-demand procedures in other areas of health care.

  19. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  20. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  1. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  2. 78 FR 61873 - Revisions to the Export Administration Regulations (EAR) To Make the Commerce Control List (CCL...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-04

    ...This final rule implements changes that were proposed on November 29, 2012 in a proposed rule entitled Revisions to the Export Administration Regulations (EAR) To Make the Commerce Control List (CCL) Clearer. The changes in the November 29 proposed rule were informed by public comments received in response to an advance notice of proposed rulemaking entitled Commerce Control List: Revising Descriptions of Items and Foreign Availability published as part of the President's Export Control Reform (ECR) Initiative on December 9, 2010. This final rule implements changes that can be made to the CCL without requiring changes to multilateral export control regime guidelines or lists. This final rule also makes conforming changes and minor clarifications as a result of the publication of two final rules implementing the Export Control Reform Initiative: the April 16, 2013 final rule entitled Revisions to the Export Administration Regulations: Initial Implementation of Export Control Reform; and the July 8, 2013 final rule entitled Revisions to the Export Administration Regulations: Military Vehicles; Vessels of War; Submersible Vessels, Oceanographic Equipment; Related Items; and Auxiliary and Miscellaneous Items that the President Determines No Longer Warrant Control under the United States Munitions List. Lastly, this final rule is making revisions to the EAR as a result of public comments received in response to the November 29 proposed rule and to a notice of inquiry (NOI) entitled Request for Public Comments on Shipping Tolerances for Export Licenses Issued by the Bureau of Industry and Security (BIS), that BIS published on July 5, 2012.

  3. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  4. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  5. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  6. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  7. Using patient lists to add value to integrated data repositories.

    PubMed

    Wade, Ted D; Zelarney, Pearlanne T; Hum, Richard C; McGee, Sylvia; Batson, Deborah H

    2014-12-01

    Patient lists are project-specific sets of patients that can be queried in integrated data repositories (IDR's). By allowing a set of patients to be an addition to the qualifying conditions of a query, returned results will refer to, and only to, that set of patients. We report a variety of use cases for such lists, including: restricting retrospective chart review to a defined set of patients; following a set of patients for practice management purposes; distributing "honest-brokered" (deidentified) data; adding phenotypes to biosamples; and enhancing the content of study or registry data. Among the capabilities needed to implement patient lists in an IDR are: capture of patient identifiers from a query and feedback of these into the IDR; the existence of a permanent internal identifier in the IDR that is mappable to external identifiers; the ability to add queryable attributes to the IDR; the ability to merge data from multiple queries; and suitable control over user access and de-identification of results. We implemented patient lists in a custom IDR of our own design. We reviewed capabilities of other published IDRs for focusing on sets of patients. The widely used i2b2 IDR platform has various ways to address patient sets, and it could be modified to add the low-overhead version of patient lists that we describe. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. [Change in service provision and availability under the list patient system reform].

    PubMed

    Grytten, Jostein; Skau, Irene; Sørensen, Rune; Aasland, Olaf G

    2004-02-05

    In this article, we analyse the relationship between length of patient lists and general practitioners' (GPs') service provision in order to investigate whether the list patient system reform has led to reduced accessibility and/or supplier inducement. The data were collected from a comprehensive questionnaire survey among GPs in the list patient system in 2002 (2306 GPs) and from the National Insurance Administration in 2001 (1637 GPs). The relationship between length of patient lists and service provision was analysed using regression analysis. The relationship between length of patient lists and number of consultations per GP was almost proportional, as was the relationship between length of patient list and number of consultations initiated by GPs. GPs who wanted more patients on their list had fewer consultations than those who were satisfied with the length of their lists and they did not compensate by taking more laboratory tests per consultation. Analysis of the two independent sets of data gave almost identical results. Patients' access to their GPs is independent of the length of his or her patient list. Even GPs with long lists do not ration consultations. This probably reflects efficient organisation of the practice. Our results do not support the theory that GPs induce demand for their services; one explanation is that GPs with short lists have chosen to have precisely that and have no need to induce demand.

  9. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  10. Evaluation of modified work zone traffic control devices at business accesses

    DOT National Transportation Integrated Search

    2001-01-01

    Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...

  11. 20 CFR 655.550 - Public access.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Activities in U.S. Ports Public Access § 655.550 Public access. (a) Public examination at ETA. ETA shall make... documentation it has received. (b) Notice to public. ETA periodically shall publish a list in the Federal...

  12. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  13. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  14. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  15. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  16. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  17. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  18. Assessing new patient access to mental health providers in HMO networks.

    PubMed

    Barry, Colleen L; Venkatesh, Mohini; Busch, Susan H

    2008-12-01

    This study examined access to mental health providers in health maintenance organization (HMO) networks. A telephone survey was conducted with a stratified random sample of mental health providers listed as being in a network for at lease one of six HMOs operating in Connecticut (response rate=72%; N=366). Data were collected between December 2006 and March 2007. Measures included the accuracy of network listings, acceptance rates of new patients, and reasons for not accepting new patients. Acceptance of new patients was defined as scheduling an appointment within two weeks from the time of the initial contact. Logistic regression was used to examine acceptance rates of new patients while controlling for type of provider (social worker, nurse, psychologist, or psychiatrist) and practice characteristics. Findings indicate that 17% of sampled HMO network listings were inaccurate. Among the providers with an accurate listing, 73% were accepting new HMO patients and 76% were accepting new self-pay patients. These aggregate acceptance rates of new patients mask differences among providers, with psychiatrists significantly less likely than other providers to accept new patients (55% of psychiatrists were accepting new patients). The most common reason for not accepting new patients was the lack of available appointments. Results indicate that access to mental health providers in HMO networks varied by type of provider. For HMO enrollees seeking treatment for mental health problems from a provider with a master's degree in social work (M.S.W. degree), network access was not a major problem. Scheduling an appointment with a psychiatrist, particularly a psychiatrist treating children only, was more difficult.

  19. NASA thesaurus. Volume 2: Access vocabulary

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The Access Vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries, and pseudo-multiword terms that are permutations of words that contain words within words. The Access Vocabulary contains 40,738 entries that give increased access to the hierarchies in Volume 1 - Hierarchical Listing.

  20. NASA Thesaurus. Volume 2: Access vocabulary

    NASA Technical Reports Server (NTRS)

    1982-01-01

    The Access Vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries, and pseudo-multiword terms that are permutations of words that contain words within words. The Access Vocabulary contains, 40,661 entries that give increased access to he hierarchies in Volume 1 - Hierarchical Listing.

  1. NASA thesaurus. Volume 2: Access vocabulary

    NASA Technical Reports Server (NTRS)

    1988-01-01

    The access vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries and pseudo-multiword terms that are permutations of words that contain words within words. The access vocabulary contains almost 42,000 entries that give increased access to the hierarchies in Volume 1 - Hierarchical Listing.

  2. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  3. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  4. 76 FR 34577 - Wassenaar Arrangement 2010 Plenary Agreements Implementation: Commerce Control List, Definitions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Parts 740, 743, and 774 [Docket No. 110124056-1301-02] RIN 0694-AF11 Wassenaar Arrangement 2010 Plenary Agreements Implementation: Commerce Control List, Definitions, Reports; Correction AGENCY: Bureau of Industry and Security, Commerce. ACTION...

  5. With Development, List Recall Includes More Chunks, Not Just Larger Ones

    PubMed Central

    Cowan, Nelson; Hismjatullina, Anna; AuBuchon, Angela M.; Saults, J. Scott; Horton, Neil; Leadbitter, Kathy; Towse, John

    2011-01-01

    The nature of the childhood development of immediate recall has been difficult to determine. There could be a developmental increase in either the number of chunks held in working memory or the use of grouping to make the most of a constant capacity. In 3 experiments with children in the early elementary school years and adults, we show that improvements in the immediate recall of word and picture lists come partly from increases in the number of chunks of items retained in memory. This finding was based on a distinction between access to a studied group of items (i.e., recall of at least 1 item from the group) and completion of the accessed group (i.e., the proportion of the items recalled from the group). Access rates increased with age, even with statistical controls for completion rates, implicating development of capacity in chunks. PMID:20822227

  6. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  7. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  8. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  9. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  10. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  11. 77 FR 26213 - Access Authorization Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ... and Regulations section of this Federal Register. List of Subjects 10 CFR Part 11 Hazardous materials--transportation, Investigations, Nuclear materials, Reporting and recordkeeping requirements, Security measures... amend its access authorization fees charged to licensees for work performed under the Material Access...

  12. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms

  13. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  14. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  15. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  16. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  17. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  18. How to report and monitor the performance of waiting list management.

    PubMed

    Torkki, Markus; Linna, Miika; Seitsalo, Seppo; Paavolainen, Pekka

    2002-01-01

    Potential problems concerning waiting list management are often monitored using mean waiting times based on empirical samples. However, the appropriateness of mean waiting time as an indicator of access can be questioned if a waiting list is not managed well, e.g., if the queue discipline is violated. This study was performed to find out about the queue discipline in waiting lists for elective surgery to reveal potential discrepancies in waiting list management. There were 1,774 waiting list patients for hallux valgus or varicose vein surgery or sterilization. The waiting time distributions of patients receiving surgery and of patients still waiting for an operation are presented in column charts. The charts are compared with two model charts. One model chart presents a high queue discipline (first in-first out) and another a poor queue discipline (random) queue. There were significant differences in waiting list management across hospitals and patient categories. Examples of a poor queue discipline were found in queues for hallux valgus and varicose vein operations. A routine waiting list reporting should be used to guarantee the quality of waiting list management and to pinpoint potential problems in access. It is important to monitor not only the number of patients in the waiting list but also the queue discipline and the balance between demand and supply of surgical services. The purpose for this type of reporting is to ensure that the priority setting made at health policy level also works in practise.

  19. Work and family: associations with long-term sick-listing in Swedish women - a case-control study.

    PubMed

    Sandmark, Hélène

    2007-10-11

    The number of Swedish women who are long-term sick-listed is high, and twice as high as for men. Also the periods of sickness absence have on average been longer for women than for men. The objective of this study was to investigate the associations between factors in work- and family life and long-term sick-listing in Swedish women. This case-control study included 283 women on long-term sick-listing > or =90 days, and 250 female referents, randomly chosen, living in five counties in Sweden. Bivariate and multivariate logistic regression analyses with odds ratios were calculated to estimate the associations between long-term sick-listing and factors related to occupational work and family life. Long-term sick-listing in women is associated with self-reported lack of competence for work tasks (OR 2.42 1.23-11.21 log reg), workplace dissatisfaction (OR 1.89 1.14-6.62 log reg), physical workload above capacity (1.78 1.50-5.94), too high mental strain in work tasks (1.61 1.08-5.01 log reg), number of employers during work life (OR 1.39 1.35-4.03 log reg), earlier part-time work (OR 1.39 1.18-4.03 log reg), and lack of influence on working hours (OR 1.35 1.47-3.86 log reg). A younger age at first child, number of children, and main responsibility for own children was also found to be associated with long-term sick-listing. Almost all of the sick-listed women (93%) wanted to return to working life, and 54% reported they could work immediately if adjustments at work or part-time work were possible. Factors in work and in family life could be important to consider to prevent women from being long-term sick-listed and promote their opportunities to remain in working life. Measures ought to be taken to improve their mobility in work life and control over decisions and actions regarding theirs lives.

  20. [Association between productivity, list size, patient and practice characteristics in general practice].

    PubMed

    Olsen, Kim Rose; Sørensen, Torben Højmark; Gyrd-Hansen, Dorte

    2010-04-19

    Due to shortage of general practitioners, it may be necessary to improve productivity. We assess the association between productivity, list size and patient- and practice characteristics. A regression approach is used to perform productivity analysis based on national register data and survey data for 1,758 practices. Practices are divided into four groups according to list size and productivity. Statistical tests are used to assess differences in patient- and practice characteristics. There is a significant, positive correlation between list size and productivity (p < 0.01). Nevertheless, 19% of the practices have a list size below and a productivity above mean sample values. These practices have relatively demanding patients (older, low socioeconomic status, high use of pharmaceuticals) and they are frequently located in areas with limited access to specialized care and have a low use of assisting personnel. 13% of the practices have a list size above and a productivity below mean sample values. These practices have relatively less demanding patients, are located in areas with good access to specialized care, and have a high use of assisting personnel. Lists and practice characteristics have substantial influence on both productivity and list size. Adjusting list size to external factors seems to be an effective tool to increase productivity in general practice.

  1. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  2. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  3. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  4. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  5. Automating Access Control Logics in Simple Type Theory with LEO-II

    NASA Astrophysics Data System (ADS)

    Benzmüller, Christoph

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.

  6. 77 FR 26149 - Access Authorization Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-03

    ... Regulatory Affairs of OMB. List of Subjects 10 CFR Part 11 Hazardous materials--transportation... licensees for work performed under the Material Access Authorization Program (MAAP) and the Information... assigned duties which require access to special nuclear material (plutonium, uranium-233, and uranium...

  7. Wireless-PDA-controlled image workflow from PACS: the next trend in the health care enterprise?

    NASA Astrophysics Data System (ADS)

    Erberich, Stephan G.; Documet, Jorge; Zhou, Michael Z.; Cao, Fei; Liu, Brent J.; Mogel, Greg T.; Huang, H. K.

    2003-05-01

    Image workflow in today's Picture Archiving and Communication Systems (PACS) is controlled from fixed Display Workstations (DW) using proprietary control interfaces. A remote access to the Hospital Information System (HIS) and Radiology Information System (RIS) for urgent patient information retrieval does not exist or gradually become available. The lack for remote access and workflow control for HIS and RIS is especially true when it comes to medical images of a PACS on Department or Hospital level. As images become more complex and data sizes expand rapidly with new image techniques like functional MRI, Mammography or routine spiral CT to name a few, the access and manageability becomes an important issue. Long image downloads or incomplete work lists cannot be tolerated in a busy health care environment. In addition, the domain of the PACS is no longer limited to the imaging department and PACS is also being used in the ER and emergency care units. Thus a prompt and secure access and manageability not only by the radiologist, but also from the physician becomes crucial to optimally utilize the PACS in the health care enterprise of the new millennium. The purpose of this paper is to introduce a concept and its implementation of a remote access and workflow control of the PACS combining wireless, Internet and Internet2 technologies. A wireless device, the Personal Digital Assistant (PDA), is used to communicate to a PACS web server that acts as a gateway controlling the commands for which the user has access to the PACS server. The commands implemented for this test-bed are query/retrieve of the patient list and study list including modality, examination, series and image selection and pushing any list items to a selected DW on the PACS network.

  8. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  9. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  10. 76 FR 39318 - Controlled Substances and List I Chemical Registration and Reregistration Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... to the CSA, controlled substances are classified in one of five schedules based upon their potential.... 21 U.S.C. 812. Likewise, under the CSA, listed chemicals are separately classified based on their... this end, BNDD established a three-tiered fee structure for companies and individuals wishing to...

  11. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  12. Formalization of the Access Control on ARM-Android Platform with the B Method

    NASA Astrophysics Data System (ADS)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  13. 25 CFR 43.7 - Access rights.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Access rights. 43.7 Section 43.7 Indians BUREAU OF INDIAN... § 43.7 Access rights. The right of access specified in § 43.5 shall include: (a) The right to obtain a list of the types of student records which are maintained by the institution. (b) The right to inspect...

  14. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  15. Computerized parts list system coordinates engineering releases, parts control, and manufacturing planning

    NASA Technical Reports Server (NTRS)

    Horton, W.; Kinsey, M.

    1967-01-01

    Computerized parts list system compiles and summarize all pertinent and available information on complex new systems. The parts list system consists of three computer subroutines - list of parts, parts numerical sequence list, and specifications list.

  16. Global Access-controlled Transfer e-frame (GATe)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  17. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  18. Assessment method of accessibility conditions: how to make public buildings accessible?

    PubMed

    Andrade, Isabela Fernandes; Ely, e Vera Helena Moro Bins

    2012-01-01

    The enforcement of accessibility today has faced several difficulties, such as intervention in historic buildings that now house public services and cultural activities, such as town halls, museums and theaters and should allow access, on equal terms to all people. The paper presents the application of a method for evaluating the spatial accessibility conditions and their results. For this, we sought to support the theoretical foundation about the main issue involved and legislation. From the method used--guided walks--it was possible to identify the main barriers to accessibility in historic buildings. From the identified barriers, possible solutions are presented according to the four components of accessibility: spatial orientation, displacement, use and communication. It is hoped also that the knowledge gained in this research contributes to an improvement of accessibility legislation in relation to the listed items.

  19. 31 CFR 596.310 - Terrorism List Government.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  20. 31 CFR 596.310 - Terrorism List Government.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  1. 31 CFR 596.310 - Terrorism List Government.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  2. 31 CFR 596.310 - Terrorism List Government.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  3. 31 CFR 596.310 - Terrorism List Government.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Terrorism List Government. 596.310... OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM LIST GOVERNMENTS SANCTIONS REGULATIONS General Definitions § 596.310 Terrorism List Government. The term Terrorism List Government...

  4. Waiting list randomized controlled trial within a case-finding design: methodological considerations.

    PubMed

    Ronaldson, Sarah; Adamson, Joy; Dyson, Lisa; Torgerson, David

    2014-10-01

    Randomized controlled trials (RCTs) are widely used in health care research to provide high-quality evidence of effectiveness of an intervention. However, sometimes a study does not require an RCT in order to answer its primary objective; a case-finding design may be more appropriate. The aim of this paper was to introduce a new study design that nests a waiting list RCT within a case-finding study. An example of the new study design is the DOC Study, which primarily aims to determine the diagnostic accuracy of lung function tests for chronic obstructive pulmonary disease. It also investigates the impact of lung function tests on smoking behaviour through use of a waiting list design. The first step of the study design is to obtain participants' consent. Individuals are then randomized to one of two groups; either the 'intervention now' group or the 'intervention later' group, that is, participants are placed on a waiting list. All participants receive the same intervention; the only difference between the groups is the timing of the intervention. The design addresses patient preference issues and recruitment issues that can arise in other trial designs. Potential limitations include differential attrition between study groups and potential demoralization for the 'intervention later' group. The 'waiting list case-finding trial' design is a valuable method that could be applied to case-finding studies; the design enables the case-finding component of a study to be maintained while simultaneously exploring additional hypotheses through conducting a trial. © 2014 John Wiley & Sons, Ltd.

  5. Is open access sufficient? A review of the quality of open-access nursing journals.

    PubMed

    Crowe, Marie; Carlyle, Dave

    2015-02-01

    The present study aims to review the quality of open-access nursing journals listed in the Directory of Open Access Journals that published papers in 2013 with a nursing focus, written in English, and were freely accessible. Each journal was reviewed in relation to their publisher, year of commencement, number of papers published in 2013, fee for publication, indexing, impact factor, and evidence of requirements for ethics and disclosure statements. The quality of the journals was assessed by impact factors and the requirements for indexing in PubMed. A total of 552 were published in 2013 in the 19 open-access nursing journals that met the inclusion criteria. No journals had impact factors listed in Web of Knowledge, but three had low Scopus impact factors. Only five journals were indexed with PubMed. The quality of the 19 journals included in the review was evaluated as inferior to most subscription-fee journals. Mental health nursing has some responsibility to the general public, and in particular, consumers of mental health services and their families, for the quality of papers published in open-access journals. The way forward might involve dual-platform publication or a process that enables assessment of how research has improved clinical outcomes. © 2014 Australian College of Mental Health Nurses Inc.

  6. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  7. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  8. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  9. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  10. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. Integrated Advanced Microwave Sounding Unit-A (AMSU-A). As-Designed Parts List: Electrical, Electronic and Electromechanical (EEE) As-Designed Parts List

    NASA Technical Reports Server (NTRS)

    Lorenz, E.

    1999-01-01

    This report comprises the Electrical, Electronic, and Electromechanical (EEE) As Designed Parts List to be used in the Integrated Advanced Microwave Sounding Unit-A (AMSU-A) instrument. The purpose of the EEE As-Designed Parts List is to provide a listing of EEE parts identified for use on the Integrated AMSU-A. All EEE parts used on the AMSU-A must meet the parts control requirements as defined in the Parts Control Plan (POP). All part applications are reviewed by the Parts Control Board (PCB) and granted approval if POP requirements are met. The "As Designed Parts Lists" indicates PCB approval status, and thus also serves as the Program Approved Parts List.

  12. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  13. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  14. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  15. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  16. Working memory capacity and controlled serial memory search.

    PubMed

    Mızrak, Eda; Öztekin, Ilke

    2016-08-01

    The speed-accuracy trade-off (SAT) procedure was used to investigate the relationship between working memory capacity (WMC) and the dynamics of temporal order memory retrieval. High- and low-span participants (HSs, LSs) studied sequentially presented five-item lists, followed by two probes from the study list. Participants indicated the more recent probe. Overall, accuracy was higher for HSs compared to LSs. Crucially, in contrast to previous investigations that observed no impact of WMC on speed of access to item information in memory (e.g., Öztekin & McElree, 2010), recovery of temporal order memory was slower for LSs. While accessing an item's representation in memory can be direct, recovery of relational information such as temporal order information requires a more controlled serial memory search. Collectively, these data indicate that WMC effects are particularly prominent during high demands of cognitive control, such as serial search operations necessary to access temporal order information from memory. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  18. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  19. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  20. 50 CFR 660.320 - Open access fishery-crossover provisions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 13 2014-10-01 2014-10-01 false Open access fishery-crossover provisions... West Coast Groundfish-Open Access Fisheries § 660.320 Open access fishery—crossover provisions. The crossover provisions listed at § 660.60(h)(7), apply to vessels fishing in the open access fishery. [76 FR...

  1. 50 CFR 660.320 - Open access fishery-crossover provisions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 13 2013-10-01 2013-10-01 false Open access fishery-crossover provisions... West Coast Groundfish-Open Access Fisheries § 660.320 Open access fishery—crossover provisions. The crossover provisions listed at § 660.60(h)(7), apply to vessels fishing in the open access fishery. [76 FR...

  2. 50 CFR 660.320 - Open access fishery-crossover provisions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 13 2012-10-01 2012-10-01 false Open access fishery-crossover provisions... West Coast Groundfish-Open Access Fisheries § 660.320 Open access fishery—crossover provisions. The crossover provisions listed at § 660.60(h)(7), apply to vessels fishing in the open access fishery. [76 FR...

  3. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  4. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  5. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  6. Access Control for Home Data Sharing: Attitudes, Needs and Practices

    DTIC Science & Technology

    2009-10-01

    cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for

  7. [Problem list in computer-based patient records].

    PubMed

    Ludwig, C A

    1997-01-14

    Computer-based clinical information systems are capable of effectively processing even large amounts of patient-related data. However, physicians depend on rapid access to summarized, clearly laid out data on the computer screen to inform themselves about a patient's current clinical situation. In introducing a clinical workplace system, we therefore transformed the problem list-which for decades has been successfully used in clinical information management-into an electronic equivalent and integrated it into the medical record. The table contains a concise overview of diagnoses and problems as well as related findings. Graphical information can also be integrated into the table, and an additional space is provided for a summary of planned examinations or interventions. The digital form of the problem list makes it possible to use the entire list or selected text elements for generating medical documents. Diagnostic terms for medical reports are transferred automatically to corresponding documents. Computer technology has an immense potential for the further development of problem list concepts. With multimedia applications sound and images will be included in the problem list. For hyperlink purpose the problem list could become a central information board and table of contents of the medical record, thus serving as the starting point for database searches and supporting the user in navigating through the medical record.

  8. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...

  9. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  10. 36 CFR Appendix E to Part 1191 - List of Figures and Index

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false List of Figures and Index E Appendix E to Part 1191 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS...; ARCHITECTURAL BARRIERS ACT (ABA) ACCESSIBILITY GUIDELINES Pt. 1191, App. E Appendix E to Part 1191—List of...

  11. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  12. Protocol for a randomised controlled trial evaluating the effects of providing essential medicines at no charge: the Carefully seLected and Easily Accessible at No Charge Medicines (CLEAN Meds) trial.

    PubMed

    Persaud, Nav; Lee, Taehoon; Ahmad, Haroon; Li, Winny; Taglione, Michael Sergio; Rajakulasingam, Yathavan; Umali, Norman; Boozary, Andrew; Glazier, Richard H; Gomes, Tara; Hwang, Stephen W; Jüni, Peter; Law, Michael; Mamdani, Muhammad M; Manns, Braden; Martin, Danielle; Morgan, Steve; Oh, Paul; Pinto, Andrew David; Shah, Baiju R; Sullivan, Frank M; Thorpe, Kevin E; Tu, Karen; Laupacis, Andreas

    2017-06-12

    Cost-related non-adherence to medicines is common in low-income, middle-income and high-income countries such as Canada. Medicine non-adherence is associated with poor health outcomes and increased mortality. This randomised trial will test the impact of a carefully selected list of essential medicines at no charge (compared with usual medicine access) in primary care patients reporting cost-related non-adherence. This is an open-label, parallel two-arm, superiority, individually randomised controlled trial conducted in three primary care sites (one urban, two rural) in Ontario, Canada, that was codesigned by a community guidance panel. Adult patients (≥18 years) who report cost-related non-adherence to medicines are eligible to participate in the study. Participants will be randomised to receive free and convenient access to a carefully selected list of 125 essential medicines (based on the WHO's Model List of Essential Medicines) or usual means of medicine access. Care for patients in both groups will otherwise be unchanged. The primary outcome of this trial is adherence to appropriately prescribed medicines. Secondary outcomes include medicine adherence, appropriate prescribing, blood pressure, haemoglobin A1c, low-density lipoprotein cholesterol, patient-oriented outcomes and healthcare costs. All participants will be followed for at least 12 months. Ethics approval was obtained in all three participating sites. Results of the main trial and secondary outcomes will be submitted for publication in a peer-reviewed journal and discussed with members of the public and decision makers. NCT02744963. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  13. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  14. NASA Thesaurus. Volume 2: Access vocabulary

    NASA Technical Reports Server (NTRS)

    1976-01-01

    The NASA Thesaurus -- Volume 2, Access Vocabulary -- contains an alphabetical listing of all Thesaurus terms (postable and nonpostable) and permutations of all multiword and pseudo-multiword terms. Also included are Other Words (non-Thesaurus terms) consisting of abbreviations, chemical symbols, etc. The permutations and Other Words provide 'access' to the appropriate postable entries in the Thesaurus.

  15. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  16. Output order reflects the cognitive accessibility of goals.

    PubMed

    Grimes, Carrie E; Nes, Lise Solberg; Waldman, Andrea; Segerstrom, Suzanne C

    2012-01-01

    Goal accessibility--the ease or speed with which a goal is activated--increases the likelihood that it will be acted on. The present studies validate output order as a measure of goal accessibility that can be applied to goal lists in both laboratory and naturalistic settings. In three studies, output order (the order in which goals are listed in a free-response format) was related to self-reported goal value but was not redundant with it. Furthermore, output order was affected by motivational priming whereas value was not, and order associated with typical student goals (e.g., achievement) compared with atypical goals (e.g., power). Output order is well suited to bring the study of accessibility to naturalistic studies of goals and goal pursuit.

  17. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  18. 30 CFR 773.26 - How to challenge an ownership or control listing or finding.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... authority with jurisdiction over the violation and the AVS Office to obtain additional information. (d) A... investigation by the AVS Office. (e) At any time, you, a person listed in AVS as an owner or controller of a surface coal mining operation, may request an informal explanation from the AVS Office as to the reason...

  19. Wait watchers: the application of a waiting list active management program in ambulatory care.

    PubMed

    de Belvis, Antonio Giulio; Marino, Marta; Avolio, Maria; Pelone, Ferruccio; Basso, Danila; Dei Tos, Gian Antonio; Cinquetti, Sandro; Ricciardi, Walter

    2013-04-01

    This study describes and evaluates the application of a waiting list management program in ambulatory care. Waiting list active management survey (telephone call and further contact); before and after controlled trial. Local Health Trust in Veneto Region (North-East of Italy) in 2008-09. Five hundred and one people on a 554 waiting list for C Class ambulatory care diagnostic and/or clinical investigations (electrocardiography plus cardiology ambulatory consultation, eye ambulatory consultation, carotid vessels Eco-color-Doppler, legs Eco-color-Doppler or colonoscopy, respectively). Active list management program consisting of a telephonic interview on 21 items to evaluate socioeconomic features, self-perceived health status, social support, referral physician, accessibility and patients' satisfaction. A controlled before-and-after study was performed to evaluate anonymously the overall impact on patients' self-perceived quality of care. The rate of patients with deteriorating healthcare conditions; rate of dropout; interviewed degree of satisfaction about the initiative; overall impact on citizens' perceived quality of care. 95.4% patients evaluated the initiative as useful. After the intervention, patients more likely to have been targeted with the program showed a statistically significant increase in self-reported quality of care. Positive impact of the program on some dimensions of ambulatory care quality (health status, satisfaction, willingness to remain in the queue), thus confirming the outstanding value of 'not to leave people alone' and 'not to leave them feeling themselves alone' in healthcare delivery.

  20. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...

  1. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  2. Pediatric access to dermatologists: Medicaid versus private insurance.

    PubMed

    Chaudhry, Sofia B; Armbrecht, Eric S; Shin, Yoon; Matula, Sarah; Caffrey, Charles; Varade, Reena; Jones, Lisa; Siegfried, Elaine

    2013-05-01

    There is disparity in access to outpatient care for Medicaid beneficiaries. This inequity disproportionately impacts children. Access for children with skin disease may be especially limited. We sought to compare access to dermatologists for new pediatric patients insured by Medicaid versus a private plan. We surveyed 13 metropolitan markets by conducting secret-shopper scripted telephone calls to dermatology providers listed by Medicaid health plans. Paired calls, differing by insurance type, were made to each office on the same day, portraying a parent requesting a new appointment for a child with eczema. We called the offices of 723 Medicaid-listed providers. Final analysis included 471 dermatologists practicing general dermatology. Of these, an average of 44% refused a new Medicaid-insured pediatric patient. The average wait time for an appointment did not significantly vary between insurance types. Assuming that dermatologists not listed as Medicaid providers do not see Medicaid-insured children, our data indicate that pediatric Medicaid acceptance rates ranged from 6% to 64% by market, with an overall market size-weighted average acceptance rate of 19%. Relative reimbursement levels for Medicaid-insured patients did not correlate with acceptance rates. Although the most current health plan directories were used to create calling lists, these are dynamic. The sample sizes of confirmed appointments were in part limited by a lack of referral letters and/or health plan identification numbers. Only confirmed appointments were used to calculate average wait times. Access to dermatologists is limited for Medicaid-insured children with eczema. Copyright © 2012 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  3. 22 CFR 123.8 - Special controls on vessels, aircraft and satellites covered by the U.S. Munitions List.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ....8 Special controls on vessels, aircraft and satellites covered by the U.S. Munitions List. (a) Transferring registration or control to a foreign person of any aircraft, vessel, or satellite on the U.S... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Special controls on vessels, aircraft and...

  4. 77 FR 72917 - Editorial Corrections to the Commerce Control List of the Export Administration Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-07

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security 15 CFR Part 774 [Docket No. 120320200-2296-01] RIN 0694-AF62 Editorial Corrections to the Commerce Control List of the Export Administration Regulations AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule. SUMMARY: This final rule...

  5. Active Control Synthesis for Flexible Vehicles. Volume II. KONPACT program Listing

    DTIC Science & Technology

    1976-01-01

    68 Subroutine TPR Program Listing 69 Subroutine HPR Program Listing 70 Subroutine IDPR Program Listing 71 Subroutine MPRS Program Listing 72...to o n c 1 9 - c ■ ■a 1 1 1 1 E E E CM In 01 i 1 i ^ c i 3 1 2 71 ■ E a ■ E 0 ■ i a. 2 g B c i...CO n CO CO ?o CO CO CO CO CO 1 W 71 OT tn t/; W5 7) 7J 73 n 7) CO 75 75 7) 75 CO 75 75 75 75 75 75 T: 75 75 to 20 MM mi I

  6. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  7. The evolution analysis of listed companies co-holding non-listed financial companies based on two-mode heterogeneous networks

    NASA Astrophysics Data System (ADS)

    An, Pengli; Li, Huajiao; Zhou, Jinsheng; Chen, Fan

    2017-10-01

    Complex network theory is a widely used tool in the empirical research of financial markets. Two-mode and multi-mode networks are new trends and represent new directions in that they can more accurately simulate relationships between entities. In this paper, we use data for Chinese listed companies holding non-listed financial companies over a ten-year period to construct two networks: a two-mode primitive network in which listed companies and non-listed financial companies are considered actors and events, respectively, and a one-mode network that is constructed based on the decreasing-mode method in which listed companies are considered nodes. We analyze the evolution of the listed company co-holding network from several perspectives, including that of the whole network, of information control ability, of implicit relationships, of community division and of small-world characteristics. The results of the analysis indicate that (1) China's developing stock market affects the share-holding condition of listed companies holding non-listed financial companies; (2) the information control ability of co-holding networks is focused on a few listed companies and the implicit relationship of investment preference between listed companies is determined by the co-holding behavior; (3) the community division of the co-holding network is increasingly obvious, as determined by the investment preferences among listed companies; and (4) the small-world characteristics of the co-holding network are increasingly obvious, resulting in reduced communication costs. In this paper, we conduct an evolution analysis and develop an understanding of the factors that influence the listed companies co-holding network. This study will help illuminate research on evolution analysis.

  8. A randomized wait-list controlled analysis of the implementation integrity of team-initiated problem solving processes.

    PubMed

    Newton, J Stephen; Horner, Robert H; Algozzine, Bob; Todd, Anne W; Algozzine, Kate

    2012-08-01

    Members of Positive Behavior Interventions and Supports (PBIS) teams from 34 elementary schools participated in a Team-Initiated Problem Solving (TIPS) Workshop and follow-up technical assistance. Within the context of a randomized wait-list controlled trial, team members who were the first recipients of the TIPS intervention demonstrated greater implementation integrity in using the problem-solving processes during their team meetings than did members of PBIS Teams in the Wait-List Control group. The success of TIPS at improving implementation integrity of the problem-solving processes is encouraging and suggests the value of conducting additional research focused on determining whether there is a functional relation between use of these problem-solving processes and actual resolution of targeted student academic and social problems. Copyright © 2012 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  9. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  10. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. TubercuList--10 years after.

    PubMed

    Lew, Jocelyne M; Kapopoulou, Adamandia; Jones, Louis M; Cole, Stewart T

    2011-01-01

    TubercuList (http://tuberculist.epfl.ch/), the relational database that presents genome-derived information about H37Rv, the paradigm strain of Mycobacterium tuberculosis, has been active for ten years and now presents its twentieth release. Here, we describe some of the recent changes that have resulted from manual annotation with information from the scientific literature. Through manual curation, TubercuList strives to provide current gene-based information and is thus distinguished from other online sources of genome sequence data for M. tuberculosis. New, mostly small, genes have been discovered and the coordinates of some existing coding sequences have been changed when bioinformatics or experimental data suggest that this is required. Nucleotides that are polymorphic between different sources of H37Rv are annotated and gene essentiality data have been updated. A host of functional information has been gleaned from the literature and many new activities of proteins and RNAs have been included. To facilitate basic and translational research, TubercuList also provides links to other specialized databases that present diverse datasets such as 3D-structures, expression profiles, drug development criteria and drug resistance information, in addition to direct access to PubMed articles pertinent to particular genes. TubercuList has been and remains a highly valuable tool for the tuberculosis research community with >75,000 visitors per month. Copyright © 2010 Elsevier Ltd. All rights reserved.

  12. Union List Development: Control of the Serial Literature *

    PubMed Central

    Sawyers, Elizabeth J.

    1972-01-01

    The discussion covers the development of a national union list or finding tool for biomedical serial holdings and its integration into the National Serials Data Program, which is being developed under the auspices of the three National Libraries. Specific topics which are covered include: (1) Selection of the Union Catalog of Medical Periodicals (UCMP) as the basis for a biomedical list and the status of that activity; (2) discussion of the various methods of recording holdings; (3) status of the National Serials Data Program and a discussion of its relationship to the UCMP file; and (4) status of the Standard Serial Number and its relationship to other existing coding schemes for serial titles. PMID:5054307

  13. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  14. Designing a system for patients controlling providers' access to their electronic health records: organizational and technical challenges.

    PubMed

    Leventhal, Jeremy C; Cummins, Jonathan A; Schwartz, Peter H; Martin, Douglas K; Tierney, William M

    2015-01-01

    Electronic health records (EHRs) are proliferating, and financial incentives encourage their use. Applying Fair Information Practice principles to EHRs necessitates balancing patients' rights to control their personal information with providers' data needs to deliver safe, high-quality care. We describe the technical and organizational challenges faced in capturing patients' preferences for patient-controlled EHR access and applying those preferences to an existing EHR. We established an online system for capturing patients' preferences for who could view their EHRs (listing all participating clinic providers individually and categorically-physicians, nurses, other staff) and what data to redact (none, all, or by specific categories of sensitive data or patient age). We then modified existing data-viewing software serving a state-wide health information exchange and a large urban health system and its primary care clinics to allow patients' preferences to guide data displays to providers. Patients could allow or restrict data displays to all clinicians and staff in a demonstration primary care clinic, categories of providers (physicians, nurses, others), or individual providers. They could also restrict access to all EHR data or any or all of five categories of sensitive data (mental and reproductive health, sexually transmitted diseases, HIV/AIDS, and substance abuse) and for specific patient ages. The EHR viewer displayed data via reports, data flowsheets, and coded and free text data displayed by Google-like searches. Unless patients recorded restrictions, by default all requested data were displayed to all providers. Data patients wanted restricted were not displayed, with no indication they were redacted. Technical barriers prevented redacting restricted information in free textnotes. The program allowed providers to hit a "Break the Glass" button to override patients' restrictions, recording the date, time, and next screen viewed. Establishing patient-control

  15. Effect of education on racial disparities in access to kidney transplantation.

    PubMed

    Goldfarb-Rumyantzev, Alexander S; Sandhu, Gurprataap S; Baird, Bradley; Barenbaum, Anna; Yoon, Joo Heung; Dimitri, Noelle; Koford, James K; Shihab, Fuad

    2012-01-01

    Higher education level might result in reduced disparities in access to renal transplantation. We analyzed two outcomes: (i) being placed on the waiting list or transplanted without listing and (ii) transplantation in patients who were placed on the waiting list. We identified 3224 adult patients with end-stage renal disease (ESRD) in United States Renal Data System with education information available (mean age of ESRD onset of 57.1 ± 16.2 yr old, 54.3% men, 64.2% white, and 50.4% diabetics). Compared to whites, fewer African Americans graduated from college (10% vs. 16.7%) and a higher percentage never graduated from the high school (38.6% vs. 30.8%). African American race was associated with reduced access to transplantation (hazard ratio [HR] 0.70, p < 0.001 for wait-listing/transplantation without listing; HR 0.58, p < 0.001 for transplantation after listing). African American patients were less likely to be wait-listed/transplanted in the three less-educated groups: HR 0.67 (p = 0.005) for those never completed high school, HR 0.76 (p = 0.02) for high school graduates, and HR 0.65 (p = 0.003) for those with partial college education. However, the difference lost statistical significance in those who completed college education (HR 0.75, p = 0.1). In conclusion, in comparing white and African American candidates, racial disparities in access to kidney transplantation do exist. However, they might be alleviated in highly educated individuals. © 2010 John Wiley & Sons A/S.

  16. Turo (qi dance) Program for Parkinson's Disease Patients: Randomized, Assessor Blind, Waiting-List Control, Partial Crossover Study.

    PubMed

    Lee, Hwa-Jin; Kim, Song-Yi; Chae, Younbyoung; Kim, Mi-Young; Yin, Changshik; Jung, Woo-Sang; Cho, Ki-Ho; Kim, Seung-Nam; Park, Hi-Joon; Lee, Hyejung

    2018-03-01

    Qigong, Tai-chi and dancing have all been proven effective for Parkinson's disease (PD); however, no study has yet assessed the efficacy of Turo, a hybrid qigong dancing program developed to relieve symptoms in PD patients. To determine whether Turo may provide benefit in addressing the symptoms of PD patients. Randomized, assessor blind, waiting-list control, partial crossover study. Kyung Hee University Korean Medicine Hospital, Seoul, Republic of Korea. A total of 32 PD patients (mean age 65.7 ± 6.8). Participants were assigned to the Turo group or the waiting-list control group. The Turo group participated in an 8-week Turo training program (60-minute sessions twice a week). The waiting-list control group received no additional treatment during the same period; then underwent the same 8-week Turo training. The primary outcome was a score on the Unified Parkinson's Disease Rating Scale (UPDRS), and the secondary outcomes included the perceived health status assessed using the Parkinson's disease Quality of Life questionnaire (PDQL), balance function as assessed by the Berg Balance Scale (BBS) and the results of the Beck Depression Inventory (BDI). The Turo group showed statistically significant improvements in the UPDRS (P < 0.01) and PDQL (P < 0.05) as compared to the control group. The changes in BBS scores displayed a tendency toward improvement, but was not statistically significant (P = 0.051). These findings suggest that Turo PD training might improve the symptoms of PD patients. Copyright © 2018. Published by Elsevier Inc.

  17. Enhanced accessibility of ignored neutral and negative items in nonclinical dissociative individuals.

    PubMed

    Chiu, Chui-De

    2018-01-01

    While clinical studies showed paradoxical memory phenomena, including the intrusion and amnesia of stressful experiences that are features of dissociation, the results of laboratory studies on dissociative individuals' forgetting of experimental stimuli through cognitive control varied. Some studies demonstrated ineffective inhibition, and others found that dissociative individuals could remember fewer trauma words in a divided-attention context. Dissociative individuals may utilize superior cognitive disengagement to forget the representations. This hypothesis was tested in nonclinical individuals with high, medium, and low dissociation proneness. In the study phase, the participants learned several lists of experimental words and kept updating working memory by remembering the last four items on a list (target) and ignoring those non-target items. A recognition test was then conducted. The high dissociation group performed better on updating working memory. However, the accessibility of the representations of neutral and negative non-target items was elevated. Dissociative individuals disengaged attention effectively from items they intended to ignore, and the representations of the ignored items were more accessible when cues were available. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  19. Session Types for Access and Information Flow Control

    NASA Astrophysics Data System (ADS)

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.

  20. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  1. Cost-utility of an internet-based intervention with or without therapist support in comparison with a waiting list for individuals with eating disorder symptoms: a randomized controlled trial.

    PubMed

    Aardoom, J J; Dingemans, A E; van Ginkel, J R; Spinhoven, P; Van Furth, E F; Van den Akker-van Marle, M E

    2016-12-01

    To investigate the cost-utility of the internet-based intervention "Featback" provided with different levels of therapist support, in comparison to a waiting list. This economic evaluation was conducted from a societal perspective and was part of a randomized controlled trial in which participants (N = 354) with self-reported ED symptoms were randomized to: (1) 8 weeks of Featback, consisting of psychoeducation and a fully automated monitoring- and feedback system, (2) Featback with low-intensity (weekly) therapist support, (3) Featback with high-intensity (three times a week) therapist support, and (4) a waiting list. Participants were assessed at baseline, postintervention, and 3-month follow-up. Cost-utility acceptability curves were constructed. No significant differences between the study conditions were found regarding quality-adjusted life-years (P = 0.55) and societal costs (P = 0.45), although the mean costs per participant were lowest in the Featback condition with low-intensity therapist support (€1951), followed by Featback with high-intensity therapist support (€2032), Featback without therapist support (€2102), and the waiting list (€2582). Featback seemed to be cost-effective as compared to the waiting list. No clear preference was found for Featback with or without therapist support. A fully automated Internet-based intervention for ED symptoms with no, low-, or high-intensity therapist support represented good value for money when compared to a waiting list. This finding may have important implications for clinical practice, as both the unguided- and guided intervention could allow for more efficient care and widespread dissemination, potentially increasing the accessibility and availability of mental health care services for individuals with ED symptoms. © 2016 Wiley Periodicals, Inc. (Int J Eat Disord 2016; 49:1068-1076). © 2016 Wiley Periodicals, Inc.

  2. NSSDC data listing

    NASA Technical Reports Server (NTRS)

    Horowitz, Richard; King, Joseph H.

    1994-01-01

    This document identifies, in a highly summarized way, all the data held at the National Space Science Data Center (NSSDC). These data cover astrophysics and astronomy, solar and space physics, planetary and lunar, and Earth science disciplines. They are primarily but not exclusively from past and on-going NASA spaceflight missions. We first identify all the data electronically available through NSSDC's principal on-line (magnetic disk-based) and near-line (robotics jukebox-based) systems and then those data available on CD-ROM's. Finally, we identify all NSSDC-held data, the majority of which are still off line on magnetic tape, film, etc., but include the electronically accessible and CD-ROM-resident data of earlier sections. These comprehensive identifications are in the form of two listings, one for the majority of NSSDC-held data sets resulting from individual instruments flown on individual spacecraft and the other for the remainder of NSSDC-held data sets that do not adhere to this spacecraft/experiment/data set hierarchy. The latter listing is presented in two parts, one for the numerous source catalogs of the NSSDC-operated Astronomical Data Center and the other for the remainder.

  3. The Dynamics of Access to Groups in Working Memory

    ERIC Educational Resources Information Center

    Farrell, Simon; Lelievre, Anna

    2012-01-01

    The finding that participants leave a pause between groups when attempting serial recall of temporally grouped lists has been taken to indicate access to a hierarchical representation of the list in working memory. An alternative explanation is that the dynamics of serial recall solely reflect output (rather than memorial) processes, with the…

  4. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  5. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  6. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  7. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  8. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  9. 40 CFR 716.35 - Submission of lists of studies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Submission of lists of studies. 716.35... CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.35 Submission of lists of studies... of studies to EPA for each of the listed substances or listed mixtures (including as a known...

  10. On-line access to geoscience bibliographic citations

    USGS Publications Warehouse

    Wild, Emily C.

    2012-01-01

    On-line geoscience bibliographic citations and access points to citations are exponentially increasing as commercial, non-profit, and government agencies worldwide publish materials electronically. On-line bibliographic tools capture cited works, and open access content allows for freely obtained citations and documents. For this newsletter, citations from the numerous journals and books listed in the "Recent Papers" section of the EXPLORE newsletters from 2008-2011 were used to provide freely-accessible web sites to determine the availability of bibliographic information.

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. 31 CFR 539.304 - Entity owned or controlled by a person listed in appendix I to this part.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Entity owned or controlled by a person listed in appendix I to this part. 539.304 Section 539.304 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY...

  13. 21 CFR 1404.950 - Excluded Parties List System

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Excluded Parties List System 1404.950 Section 1404.950 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 1404.950 Excluded Parties List System Excluded Parties List System (EPLS) means the...

  14. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  15. A review of global access to emergency contraception.

    PubMed

    Westley, Elizabeth; Kapp, Nathalie; Palermo, Tia; Bleck, Jennifer

    2013-10-01

    Emergency contraception has been known for several decades, and dedicated products have been on the market for close to 20 years. Yet it is unclear whether women, particularly in low-resource countries, have access to this important second-chance method of contraception. To review relevant policies, regulations, and other factors related to access to emergency contraception worldwide. A wide range of gray literature was reviewed, several specific studies were commissioned, and a number of online databases were searched. Several positive policies and regulations are in place: emergency contraception products are registered in the majority of countries around the world, listed in many countries' essential medicines lists, included in widely used guidance, and supported by most donors. Yet analysis of demographic data shows that the majority of women in low-income countries have never heard of emergency contraception, and surveys find that many providers have negative attitudes toward providing emergency contraception. Despite more than a decade of concerted international and country-level efforts to ensure that women have access to emergency contraception, accessibility remains limited. © 2013.

  16. Attacking the information access problem with expert systems

    NASA Technical Reports Server (NTRS)

    Ragusa, James M.; Orwig, Gary W.

    1991-01-01

    The results of applications research directed at finding an improved method of storing and accessing information are presented. Twelve microcomputer-based expert systems shells and five laser-optical formats have been studied, and the general and specific methods of interfacing these technologies are being tested in prototype systems. Shell features and interfacing capabilities are discussed, and results from the study of five laser-optical formats are recounted including the video laser, compact, and WORM disks, and laser cards and film. Interfacing, including laser disk device driver interfacing, is discussed and it is pointed out that in order to control the laser device from within the expert systems application, the expert systems shell must be able to access the device driver software. Potential integrated applications are investigated and an initial list is provided including consumer services, travel, law enforcement, human resources, marketing, and education and training.

  17. Using a Grocery List Is Associated With a Healthier Diet and Lower BMI Among Very High-Risk Adults.

    PubMed

    Dubowitz, Tamara; Cohen, Deborah A; Huang, Christina Y; Beckman, Robin A; Collins, Rebecca L

    2015-01-01

    Examine whether use of a grocery list is associated with healthier diet and weight among food desert residents. Cross-sectional analysis of in-person interview data from randomly selected household food shoppers in 2 low-income, primarily African American urban neighborhoods in Pittsburgh, PA with limited access to healthy foods. Multivariate ordinary least-square regressions conducted among 1,372 participants and controlling for sociodemographic factors and other potential confounding variables indicated that although most of the sample (78%) was overweight or obese, consistently using a list was associated with lower body mass index (based on measured height and weight) (adjusted multivariant coefficient = 0.095) and higher dietary quality (based on the Healthy Eating Index-2005) (adjusted multivariant coefficient = 0.103) (P < .05). Shopping with a list may be a useful tool for low-income individuals to improve diet or decrease body mass index. Copyright © 2015 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  18. Listings.

    PubMed

    1990-11-07

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should be sent to us on an official listings form and contain all relevant details. Listings forms can be obtained from Clare Ward at Nursing Standard, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX.

  19. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  20. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    PubMed

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  1. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    PubMed Central

    Huarte, Maider; Romaña, Pedro

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338

  2. Accessibility and quality of online information for pediatric orthopaedic surgery fellowships.

    PubMed

    Davidson, Austin R; Murphy, Robert F; Spence, David D; Kelly, Derek M; Warner, William C; Sawyer, Jeffrey R

    2014-12-01

    Pediatric orthopaedic fellowship applicants commonly use online-based resources for information on potential programs. Two primary sources are the San Francisco Match (SF Match) database and the Pediatric Orthopaedic Society of North America (POSNA) database. We sought to determine the accessibility and quality of information that could be obtained by using these 2 sources. The online databases of the SF Match and POSNA were reviewed to determine the availability of embedded program links or external links for the included programs. If not available in the SF Match or POSNA data, Web sites for listed programs were located with a Google search. All identified Web sites were analyzed for accessibility, content volume, and content quality. At the time of online review, 50 programs, offering 68 positions, were listed in the SF Match database. Although 46 programs had links included with their information, 36 (72%) of them simply listed http://www.sfmatch.org as their unique Web site. Ten programs (20%) had external links listed, but only 2 (4%) linked directly to the fellowship web page. The POSNA database does not list any links to the 47 programs it lists, which offer 70 positions. On the basis of a Google search of the 50 programs listed in the SF Match database, web pages were found for 35. Of programs with independent web pages, all had a description of the program and 26 (74%) described their application process. Twenty-nine (83%) listed research requirements, 22 (63%) described the rotation schedule, and 12 (34%) discussed the on-call expectations. A contact telephone number and/or email address was provided by 97% of programs. Twenty (57%) listed both the coordinator and fellowship director, 9 (26%) listed the coordinator only, 5 (14%) listed the fellowship director only, and 1 (3%) had no contact information given. The SF Match and POSNA databases provide few direct links to fellowship Web sites, and individual program Web sites either do not exist or do not

  3. Memory availability and referential access

    PubMed Central

    Johns, Clinton L.; Gordon, Peter C.; Long, Debra L.; Swaab, Tamara Y.

    2013-01-01

    Most theories of coreference specify linguistic factors that modulate antecedent accessibility in memory; however, whether non-linguistic factors also affect coreferential access is unknown. Here we examined the impact of a non-linguistic generation task (letter transposition) on the repeated-name penalty, a processing difficulty observed when coreferential repeated names refer to syntactically prominent (and thus more accessible) antecedents. In Experiment 1, generation improved online (event-related potentials) and offline (recognition memory) accessibility of names in word lists. In Experiment 2, we manipulated generation and syntactic prominence of antecedent names in sentences; both improved online and offline accessibility, but only syntactic prominence elicited a repeated-name penalty. Our results have three important implications: first, the form of a referential expression interacts with an antecedent’s status in the discourse model during coreference; second, availability in memory and referential accessibility are separable; and finally, theories of coreference must better integrate known properties of the human memory system. PMID:24443621

  4. A Randomized, Wait-List Controlled Effectiveness Trial Assessing School-Wide Positive Behavior Support in Elementary Schools

    ERIC Educational Resources Information Center

    Horner, Robert H.; Sugai, George; Smolkowski, Keith; Eber, Lucille; Nakasato, Jean; Todd, Anne W.; Esperanza, Jody

    2009-01-01

    We report a randomized, wait-list controlled trial assessing the effects of school-wide positive behavior support (SWPBS). An effectiveness analysis was conducted with elementary schools in Hawaii and Illinois where training and technical assistance in SWPBS was provided by regular state personnel over a 3-year period. Results document that the…

  5. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  6. The WebACS - An Accessible Graphical Editor.

    PubMed

    Parker, Stefan; Nussbaum, Gerhard; Pölzer, Stephan

    2017-01-01

    This paper is about the solution to accessibility problems met when implementing a graphical editor, a major challenge being the comprehension of the relationships between graphical components, which needs to be guaranteed for blind and vision impaired users. In the concrete case the HTML5 canvas and Javascript were used. Accessibility was reached by implementing a list view of elements, which also enhances the usability of the editor.

  7. Four Commandments for Writing Policies for Public-Access Wireless Networks

    ERIC Educational Resources Information Center

    Sauers, Michael

    2006-01-01

    In this article, the author describes what components should be included in a comprehensive policy for public wireless usage in a library. He lists four basic steps, which include: (1) Introduce the service; (2) List the technical requirements; (3) Spell out disclaimers on access, assistance, and liability; and (4) Alert users to security concerns.

  8. For 481 biomedical open access journals, articles are not searchable in the Directory of Open Access Journals nor in conventional biomedical databases

    PubMed Central

    Andresen, Kristoffer; Pommergaard, Hans-Christian; Rosenberg, Jacob

    2015-01-01

    Background. Open access (OA) journals allows access to research papers free of charge to the reader. Traditionally, biomedical researchers use databases like MEDLINE and EMBASE to discover new advances. However, biomedical OA journals might not fulfill such databases’ criteria, hindering dissemination. The Directory of Open Access Journals (DOAJ) is a database exclusively listing OA journals. The aim of this study was to investigate DOAJ’s coverage of biomedical OA journals compared with the conventional biomedical databases. Methods. Information on all journals listed in four conventional biomedical databases (MEDLINE, PubMed Central, EMBASE and SCOPUS) and DOAJ were gathered. Journals were included if they were (1) actively publishing, (2) full OA, (3) prospectively indexed in one or more database, and (4) of biomedical subject. Impact factor and journal language were also collected. DOAJ was compared with conventional databases regarding the proportion of journals covered, along with their impact factor and publishing language. The proportion of journals with articles indexed by DOAJ was determined. Results. In total, 3,236 biomedical OA journals were included in the study. Of the included journals, 86.7% were listed in DOAJ. Combined, the conventional biomedical databases listed 75.0% of the journals; 18.7% in MEDLINE; 36.5% in PubMed Central; 51.5% in SCOPUS and 50.6% in EMBASE. Of the journals in DOAJ, 88.7% published in English and 20.6% had received impact factor for 2012 compared with 93.5% and 26.0%, respectively, for journals in the conventional biomedical databases. A subset of 51.1% and 48.5% of the journals in DOAJ had articles indexed from 2012 and 2013, respectively. Of journals exclusively listed in DOAJ, one journal had received an impact factor for 2012, and 59.6% of the journals had no content from 2013 indexed in DOAJ. Conclusions. DOAJ is the most complete registry of biomedical OA journals compared with five conventional biomedical

  9. For 481 biomedical open access journals, articles are not searchable in the Directory of Open Access Journals nor in conventional biomedical databases.

    PubMed

    Liljekvist, Mads Svane; Andresen, Kristoffer; Pommergaard, Hans-Christian; Rosenberg, Jacob

    2015-01-01

    Background. Open access (OA) journals allows access to research papers free of charge to the reader. Traditionally, biomedical researchers use databases like MEDLINE and EMBASE to discover new advances. However, biomedical OA journals might not fulfill such databases' criteria, hindering dissemination. The Directory of Open Access Journals (DOAJ) is a database exclusively listing OA journals. The aim of this study was to investigate DOAJ's coverage of biomedical OA journals compared with the conventional biomedical databases. Methods. Information on all journals listed in four conventional biomedical databases (MEDLINE, PubMed Central, EMBASE and SCOPUS) and DOAJ were gathered. Journals were included if they were (1) actively publishing, (2) full OA, (3) prospectively indexed in one or more database, and (4) of biomedical subject. Impact factor and journal language were also collected. DOAJ was compared with conventional databases regarding the proportion of journals covered, along with their impact factor and publishing language. The proportion of journals with articles indexed by DOAJ was determined. Results. In total, 3,236 biomedical OA journals were included in the study. Of the included journals, 86.7% were listed in DOAJ. Combined, the conventional biomedical databases listed 75.0% of the journals; 18.7% in MEDLINE; 36.5% in PubMed Central; 51.5% in SCOPUS and 50.6% in EMBASE. Of the journals in DOAJ, 88.7% published in English and 20.6% had received impact factor for 2012 compared with 93.5% and 26.0%, respectively, for journals in the conventional biomedical databases. A subset of 51.1% and 48.5% of the journals in DOAJ had articles indexed from 2012 and 2013, respectively. Of journals exclusively listed in DOAJ, one journal had received an impact factor for 2012, and 59.6% of the journals had no content from 2013 indexed in DOAJ. Conclusions. DOAJ is the most complete registry of biomedical OA journals compared with five conventional biomedical databases

  10. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  11. Binary Coded Web Access Pattern Tree in Education Domain

    ERIC Educational Resources Information Center

    Gomathi, C.; Moorthi, M.; Duraiswamy, K.

    2008-01-01

    Web Access Pattern (WAP), which is the sequence of accesses pursued by users frequently, is a kind of interesting and useful knowledge in practice. Sequential Pattern mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of…

  12. Making the World Wide Web Accessible to All Students.

    ERIC Educational Resources Information Center

    Guthrie, Sally A.

    2000-01-01

    Examines the accessibility of Web sites belonging to 80 colleges of communications and schools of journalism by examining the hypertext markup language (HTML) used to format the pages. Suggests ways to revise the markup of pages to make them more accessible to students with vision, hearing, and mobility problems. Lists resources of the latest…

  13. Low-intensity cognitive-behaviour therapy interventions for obsessive-compulsive disorder compared to waiting list for therapist-led cognitive-behaviour therapy: 3-arm randomised controlled trial of clinical effectiveness.

    PubMed

    Lovell, Karina; Bower, Peter; Gellatly, Judith; Byford, Sarah; Bee, Penny; McMillan, Dean; Arundel, Catherine; Gilbody, Simon; Gega, Lina; Hardy, Gillian; Reynolds, Shirley; Barkham, Michael; Mottram, Patricia; Lidbetter, Nicola; Pedley, Rebecca; Molle, Jo; Peckham, Emily; Knopp-Hoffer, Jasmin; Price, Owen; Connell, Janice; Heslin, Margaret; Foley, Christopher; Plummer, Faye; Roberts, Christopher

    2017-06-01

    Obsessive-compulsive disorder (OCD) is prevalent and without adequate treatment usually follows a chronic course. "High-intensity" cognitive-behaviour therapy (CBT) from a specialist therapist is current "best practice." However, access is difficult because of limited numbers of therapists and because of the disabling effects of OCD symptoms. There is a potential role for "low-intensity" interventions as part of a stepped care model. Low-intensity interventions (written or web-based materials with limited therapist support) can be provided remotely, which has the potential to increase access. However, current evidence concerning low-intensity interventions is insufficient. We aimed to determine the clinical effectiveness of 2 forms of low-intensity CBT prior to high-intensity CBT, in adults meeting the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV) criteria for OCD. This study was approved by the National Research Ethics Service Committee North West-Lancaster (reference number 11/NW/0276). All participants provided informed consent to take part in the trial. We conducted a 3-arm, multicentre randomised controlled trial in primary- and secondary-care United Kingdom mental health services. All patients were on a waiting list for therapist-led CBT (treatment as usual). Four hundred and seventy-three eligible patients were recruited and randomised. Patients had a median age of 33 years, and 60% were female. The majority were experiencing severe OCD. Patients received 1 of 2 low-intensity interventions: computerised CBT (cCBT; web-based CBT materials and limited telephone support) through "OCFighter" or guided self-help (written CBT materials with limited telephone or face-to-face support). Primary comparisons concerned OCD symptoms, measured using the Yale-Brown Obsessive Compulsive Scale-Observer-Rated (Y-BOCS-OR) at 3, 6, and 12 months. Secondary outcomes included health-related quality of life, depression, anxiety, and functioning. At

  14. Low-intensity cognitive-behaviour therapy interventions for obsessive-compulsive disorder compared to waiting list for therapist-led cognitive-behaviour therapy: 3-arm randomised controlled trial of clinical effectiveness

    PubMed Central

    Gellatly, Judith; Byford, Sarah; Bee, Penny; McMillan, Dean; Gilbody, Simon; Gega, Lina; Hardy, Gillian; Reynolds, Shirley; Barkham, Michael; Mottram, Patricia; Molle, Jo; Knopp-Hoffer, Jasmin; Connell, Janice; Heslin, Margaret; Foley, Christopher; Plummer, Faye

    2017-01-01

    Background Obsessive-compulsive disorder (OCD) is prevalent and without adequate treatment usually follows a chronic course. “High-intensity” cognitive-behaviour therapy (CBT) from a specialist therapist is current “best practice.” However, access is difficult because of limited numbers of therapists and because of the disabling effects of OCD symptoms. There is a potential role for “low-intensity” interventions as part of a stepped care model. Low-intensity interventions (written or web-based materials with limited therapist support) can be provided remotely, which has the potential to increase access. However, current evidence concerning low-intensity interventions is insufficient. We aimed to determine the clinical effectiveness of 2 forms of low-intensity CBT prior to high-intensity CBT, in adults meeting the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV) criteria for OCD. Methods and findings This study was approved by the National Research Ethics Service Committee North West–Lancaster (reference number 11/NW/0276). All participants provided informed consent to take part in the trial. We conducted a 3-arm, multicentre randomised controlled trial in primary- and secondary-care United Kingdom mental health services. All patients were on a waiting list for therapist-led CBT (treatment as usual). Four hundred and seventy-three eligible patients were recruited and randomised. Patients had a median age of 33 years, and 60% were female. The majority were experiencing severe OCD. Patients received 1 of 2 low-intensity interventions: computerised CBT (cCBT; web-based CBT materials and limited telephone support) through “OCFighter” or guided self-help (written CBT materials with limited telephone or face-to-face support). Primary comparisons concerned OCD symptoms, measured using the Yale-Brown Obsessive Compulsive Scale–Observer-Rated (Y-BOCS-OR) at 3, 6, and 12 months. Secondary outcomes included health

  15. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  16. Intention-based therapy for autism spectrum disorder: promising results of a wait-list control study in children.

    PubMed

    Weiner, Robert H; Greene, Roger L

    2014-01-01

    Autism is a complex neurodevelopmental disability that usually manifests during the first three years of life and typically lasts throughout a person's lifetime. The purpose of this study is to investigate the efficacy of NeuroModulation Technique (NMT), a form of intention-based therapy, in improving functioning in children diagnosed with autism. A total of 18 children who met the study criteria were selected to participate. All children completed baseline measures. The children in the experimental group (n = 9) received two sessions a week of NMT for six weeks. Then, children in the wait-list control group (n = 9) received two sessions a week of NMT for six weeks. Primary efficacy outcome measures included the Pervasive Developmental Disorder Behavioral Inventory Autism Composite Index, the Aberrant Behavior Checklist-Community Total Score, and the Autism Treatment Evaluation Checklist Total Score. Our hypotheses were that children in both groups would show significant improvement over their respective baseline scores following NMT treatment, which would reflect an improvement in adaptive behaviors as well as a decrease in maladaptive behaviors. Statistical analysis indicates a significant improvement in both the experimental and wait-list control group on all primary outcome measures following NMT treatment. The wait-list control group demonstrated no significant improvement on test measures over baseline scores during the wait period. No adverse reactions were reported. These findings suggest that NMT is a promising intervention for autism that has the potential to produce a significant reduction in maladaptive behaviors and a significant increase in adaptive behaviors within a relatively short period of time. © 2013 The Authors. Published by Elsevier Inc. All rights reserved.

  17. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  18. 77 FR 46257 - Access Authorization Fees; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-03

    [email protected] . List of Subjects 10 CFR Part 11 Hazardous materials--transportation, Investigations, Nuclear materials, Reporting and recordkeeping requirements, Security measures, Special nuclear... authorization fees charged to licensees for work performed under the Material Access Authorization Program (MAAP...

  19. Chinese proprietary herbal medicine listed in 'China national essential drug list' for common cold: a systematic literature review.

    PubMed

    Chen, Wei; Lewith, George; Wang, Li-qiong; Ren, Jun; Xiong, Wen-jing; Lu, Fang; Liu, Jian-ping

    2014-01-01

    Chinese proprietary herbal medicines (CPHMs) have long history in China for the treatment of common cold, and lots of them have been listed in the 'China national essential drug list' by the Chinese Ministry of Health. The aim of this review is to provide a well-round clinical evidence assessment on the potential benefits and harms of CPHMs for common cold based on a systematic literature search to justify their clinical use and recommendation. We searched CENTRAL, MEDLINE, EMBASE, SinoMed, CNKI, VIP, China Important Conference Papers Database, China Dissertation Database, and online clinical trial registry websites from their inception to 31 March 2013 for clinical studies of CPHMs listed in the 'China national essential drug list' for common cold. There was no restriction on study design. A total of 33 CPHMs were listed in 'China national essential drug list 2012' for the treatment of common cold but only 7 had supportive clinical evidences. A total of 6 randomised controlled trials (RCTs) and 7 case series (CSs) were included; no other study design was identified. All studies were conducted in China and published in Chinese between 1995 and 2012. All included studies had poor study design and methodological quality, and were graded as very low quality. The use of CPHMs for common cold is not supported by robust evidence. Further rigorous well designed placebo-controlled, randomized trials are needed to substantiate the clinical claims made for CPHMs.

  20. 40 CFR 716.35 - Submission of lists of studies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.35 Submission of lists of studies... this part, a list of ongoing health and safety studies being conducted by or initiated for them, noting... a person becomes subject to this part, a list of unpublished health and safety studies known to them...

  1. 40 CFR 716.35 - Submission of lists of studies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.35 Submission of lists of studies... this part, a list of ongoing health and safety studies being conducted by or initiated for them, noting... a person becomes subject to this part, a list of unpublished health and safety studies known to them...

  2. 40 CFR 716.35 - Submission of lists of studies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.35 Submission of lists of studies... this part, a list of ongoing health and safety studies being conducted by or initiated for them, noting... a person becomes subject to this part, a list of unpublished health and safety studies known to them...

  3. 40 CFR 716.35 - Submission of lists of studies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.35 Submission of lists of studies... this part, a list of ongoing health and safety studies being conducted by or initiated for them, noting... a person becomes subject to this part, a list of unpublished health and safety studies known to them...

  4. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  5. Self-administered acupressure for symptom management among Chinese family caregivers with caregiver stress: a randomized, wait-list controlled trial.

    PubMed

    Tiwari, Agnes; Lao, Lixing; Wang, Amy Xiao-Min; Cheung, Denise Shuk Ting; So, Mike Ka Pui; Yu, Doris Sau Fung; Lum, Terry Yat Sang; Yuk Fung, Helina Yin King; Yeung, Jerry Wing Fai; Zhang, Zhang-Jin

    2016-10-28

    Caregiving can be stressful, potentially creating physical and psychological strain. Substantial evidence has shown that family caregivers suffer from significant health problems arising from the demands of caregiving. Although there are programs supporting caregivers, there is little evidence regarding their effectiveness. Acupressure is an ancient Chinese healing method designed to restore the flow of Qi (vital energy) by applying external pressure to acupoints. A randomized, wait-list controlled trial was developed to evaluate the effectiveness of a self-administered acupressure intervention on caregiver stress (primary objective) and stress-related symptoms of fatigue, insomnia, depression, and health-related quality of life (secondary objectives) in Chinese caregivers of older family members. Two hundred Chinese participants, aged ≥ 21 years, who are the primary caregivers of an older family member and screen positive for caregiver stress and symptoms of fatigue/insomnia/depression will be recruited from a community setting in Hong Kong. Subjects will be randomized to receive either an immediate treatment condition (self-administered acupressure intervention) or a wait-list control condition. The self-administered acupressure intervention will include (i) an individual learning and practice session twice a week for 2 weeks, (ii) a home follow-up visit once a week for 2 weeks, and (iii) 15-min self-practice twice a day for 6 weeks. The wait-list control group will receive the same acupressure training after the intervention group has completed the intervention. We hypothesize that Chinese family caregivers in the intervention group will have lower levels of caregiver stress, fatigue, insomnia, depression, and higher health-related quality of life after completion of the intervention than participants in the wait-list control group. This study will provide evidence for the effectiveness of self-administered acupressure in reducing stress and improving

  6. Cost-effectiveness of a participatory return-to-work intervention for temporary agency workers and unemployed workers sick-listed due to musculoskeletal disorders: design of a randomised controlled trial.

    PubMed

    Vermeulen, Sylvia J; Anema, Johannes R; Schellart, Antonius J M; van Mechelen, Willem; van der Beek, Allard J

    2010-03-28

    Within the working population there is a vulnerable group: workers without an employment contract and workers with a flexible labour market arrangement, e.g. temporary agency workers. In most cases, when sick-listed, these workers have no workplace/employer to return to. Also, for these workers access to occupational health care is limited or even absent in many countries. For this vulnerable working population there is a need for tailor-made occupational health care, including the presence of an actual return-to-work perspective. Therefore, a participatory return-to-work program has been developed based on a successful return-to-work intervention for workers, sick-listed due to low back pain.The objective of this paper is to describe the design of a randomised controlled trial to study the (cost-)effectiveness of this newly developed participatory return-to-work program adapted for temporary agency workers and unemployed workers, sick-listed due to musculoskeletal disorders, compared to usual care. The design of this study is a randomised controlled trial with one year of follow-up. The study population consists of temporary agency workers and unemployed workers sick-listed between 2 and 8 weeks due to musculoskeletal disorders. The new return-to-work program is a stepwise program aimed at making a consensus-based return-to-work implementation plan with the possibility of a (therapeutic) workplace to return-to-work. Outcomes are measured at baseline, 3, 6, 9 and 12 months. The primary outcome measure is duration of the sickness benefit period after the first day of reporting sick. Secondary outcome measures are: time until first return-to-work, total number of days of sickness benefit during follow-up; functional status; intensity of musculoskeletal pain; pain coping; and attitude, social influence and self-efficacy determinants. Cost-benefit is evaluated from an insurer's perspective. A process evaluation is part of this study. For sick-listed workers without an

  7. Cost-effectiveness of a participatory return-to-work intervention for temporary agency workers and unemployed workers sick-listed due to musculoskeletal disorders: design of a randomised controlled trial

    PubMed Central

    2010-01-01

    Background Within the working population there is a vulnerable group: workers without an employment contract and workers with a flexible labour market arrangement, e.g. temporary agency workers. In most cases, when sick-listed, these workers have no workplace/employer to return to. Also, for these workers access to occupational health care is limited or even absent in many countries. For this vulnerable working population there is a need for tailor-made occupational health care, including the presence of an actual return-to-work perspective. Therefore, a participatory return-to-work program has been developed based on a successful return-to-work intervention for workers, sick-listed due to low back pain. The objective of this paper is to describe the design of a randomised controlled trial to study the (cost-)effectiveness of this newly developed participatory return-to-work program adapted for temporary agency workers and unemployed workers, sick-listed due to musculoskeletal disorders, compared to usual care. Methods/Design The design of this study is a randomised controlled trial with one year of follow-up. The study population consists of temporary agency workers and unemployed workers sick-listed between 2 and 8 weeks due to musculoskeletal disorders. The new return-to-work program is a stepwise program aimed at making a consensus-based return-to-work implementation plan with the possibility of a (therapeutic) workplace to return-to-work. Outcomes are measured at baseline, 3, 6, 9 and 12 months. The primary outcome measure is duration of the sickness benefit period after the first day of reporting sick. Secondary outcome measures are: time until first return-to-work, total number of days of sickness benefit during follow-up; functional status; intensity of musculoskeletal pain; pain coping; and attitude, social influence and self-efficacy determinants. Cost-benefit is evaluated from an insurer's perspective. A process evaluation is part of this study

  8. Easy Online Access to Helpful Internet Guides.

    ERIC Educational Resources Information Center

    Tuss, Joan

    1993-01-01

    Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)

  9. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  10. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  11. Arts Accessibility for the Deaf.

    ERIC Educational Resources Information Center

    Bergman, Eugene

    The booklet provides information and resources for cultural organizations and institutions interested in making the arts accessible to deaf citizens. Preliminary information includes a discussion of deafness in America and the deaf in the history of the arts and notes that the era of silent films was the golden age of cinema. Listed are 36…

  12. Delays in Prior Living Kidney Donors Receiving Priority on the Transplant Waiting List

    PubMed Central

    Klassen, David K.; Kucheryavaya, Anna Y.; Stewart, Darren E.

    2016-01-01

    Background and objectives Prior living donors (PLDs) receive very high priority on the Organ Procurement and Transplantation Network (OPTN) kidney waiting list. Program delays in adding PLDs to the waiting list, setting their status to active, and submitting requests for PLD priority can affect timely access to transplantation. Design, setting, participants, & measurements We used the OPTN and the Centers for Medicare and Medicaid Services data to examine timing of (1) listing relative to start of dialysis, (2) activation on the waiting list, and (3) requests for PLD priority relative to listing date. There were 210 PLDs (221 registrations) added to the OPTN kidney waiting list between January 1, 2010 and July 31, 2015. Results As of September 4, 2015, 167 of the 210 PLDs received deceased donor transplants, six received living donor transplants, two died, five were too sick to transplant, and 29 were still waiting. Median waiting time to deceased donor transplant for PLDs was 98 days. Only 40.7% of 221 PLD registrations (n=90) were listed before they began dialysis; 68.3% were in inactive status for <90 days, 17.6% were in inactive status for 90–365 days, 8.6% were in inactive status for 1–2 years, and 5.4% were in inactive status for >2 years. Median time of PLDs waiting in active status before receiving PLD priority was 2 days (range =0–1450); 67.4% of PLDs received PLD priority within 7 days after activation, but 15.4% waited 8–30 days, 8.1% waited 1–3 months, 4.1% waited 3–12 months, and 5.0% waited >1 year in active status for PLD priority. After receiving priority, most were transplanted quickly. Median time in active status with PLD priority before deceased donor transplant was 23 days. Conclusions Fewer than one half of listed PLDs were listed before starting dialysis. Most listed PLDs are immediately set to active status and receive PLD priority quickly, but a substantial number spends time in active status without PLD priority or a large

  13. Adult Age Differences in Production and Monitoring in Dual-List Free Recall

    PubMed Central

    Wahlheim, Christopher N.; Ball, B. Hunter; Richmond, Lauren L.

    2017-01-01

    The present experiment examined adult age differences in the production and monitoring of responses in dual-list free recall. Younger and older adults studied two lists of unrelated words and were instructed to recall from List 1, List 2, or List 1 and List 2. An externalized free recall (EFR) procedure required participants to: 1) report all responses that came to mind while recalling from specific lists, 2) classify responses as correct or incorrect, and 3) provide confidence judgments for their accuracy classifications. Relative to younger adults, older adults showed a monitoring deficit by misclassifying proportionally more responses and discriminating more poorly between correct and incorrect responses in their confidence judgments. This deficit was especially pronounced under conditions of retroactive interference that occurred when participants recalled from List 1 only. A comparison of retrieval dynamics for all responses produced and for those that participants were reasonably confident were correct provided information about age differences in preretrieval context reinstatement and postretrieval monitoring of retrieved context. One noteworthy finding was that total production when recalling from List 1 showed that List 2 responses remained more accessible across the first several retrieval attempts for older than younger adults, which indicated a substantial age difference in the ability to reinstate List 1 context. Overall, the present findings provide a nuanced characterization of age differences in the operation of production and monitoring mechanisms under conditions of proactive and retroactive interference that can inform models of free recall. PMID:28206784

  14. Using the WHO Essential Medicines List to Assess the Appropriateness of Insurance Coverage Decisions: A Case Study of the Croatian National Medicine Reimbursement List

    PubMed Central

    Jeličić Kadić, Antonia; Žanić, Maja; Škaričić, Nataša; Marušić, Ana

    2014-01-01

    Purpose To investigate the use of the WHO EML as a tool with which to evaluate the evidence base for the medicines on the national insurance coverage list of the Croatian Institute of Health Insurance (CIHI). Methods Medicines from 9 ATC categories with highest expenditures from 2012 CIHI Basic List (n = 509) were compared with 2011 WHO EML for adults (n = 359). For medicines with specific indication listed only in CIHI Basic List we assessed whether there was evidence in Cochrane Database of Systematic Reviews questioning their efficacy and safety. Results The two lists shared 188 medicines (52.4% of WHO EML and 32.0% of CIHI list). CIHI Basic List had 254 medicines and 33 combinations of these medicines which were not on the WHO EML, plus 14 medicines rejected and 20 deleted from WHO EML by its Evaluation Committee. For deleted medicines, we could obtain data that showed 2,965,378 prescriptions issued to 617,684 insured patients, and the cost of approximately € 41.2 million for 2012 and the first half of 2013, when the CIHI Basic List was in effect. For CIHI List-only medicines with a specific indication (n = 164 or 57.1% of the analyzed set), fewer benefits or more serious side-effects than other medicines were found for 17 (10.4%) and not enough evidence for recommendations for specific indication for 21 (12.8%) medicines in Cochrane systematic reviews. Conclusions National health care policy should use high-quality evidence in deciding on adding new medicines and reassessing those already present on national medicines lists, in order to rationalize expenditures and ensure wider and better access to medicines. The WHO EML and recommendations from its Evaluation Committee may be useful tools in this quality assurance process. PMID:25337860

  15. Using the WHO essential medicines list to assess the appropriateness of insurance coverage decisions: a case study of the Croatian national medicine reimbursement list.

    PubMed

    Jeličić Kadić, Antonia; Žanić, Maja; Škaričić, Nataša; Marušić, Ana

    2014-01-01

    To investigate the use of the WHO EML as a tool with which to evaluate the evidence base for the medicines on the national insurance coverage list of the Croatian Institute of Health Insurance (CIHI). Medicines from 9 ATC categories with highest expenditures from 2012 CIHI Basic List (n = 509) were compared with 2011 WHO EML for adults (n = 359). For medicines with specific indication listed only in CIHI Basic List we assessed whether there was evidence in Cochrane Database of Systematic Reviews questioning their efficacy and safety. The two lists shared 188 medicines (52.4% of WHO EML and 32.0% of CIHI list). CIHI Basic List had 254 medicines and 33 combinations of these medicines which were not on the WHO EML, plus 14 medicines rejected and 20 deleted from WHO EML by its Evaluation Committee. For deleted medicines, we could obtain data that showed 2,965,378 prescriptions issued to 617,684 insured patients, and the cost of approximately € 41.2 million for 2012 and the first half of 2013, when the CIHI Basic List was in effect. For CIHI List-only medicines with a specific indication (n = 164 or 57.1% of the analyzed set), fewer benefits or more serious side-effects than other medicines were found for 17 (10.4%) and not enough evidence for recommendations for specific indication for 21 (12.8%) medicines in Cochrane systematic reviews. National health care policy should use high-quality evidence in deciding on adding new medicines and reassessing those already present on national medicines lists, in order to rationalize expenditures and ensure wider and better access to medicines. The WHO EML and recommendations from its Evaluation Committee may be useful tools in this quality assurance process.

  16. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  17. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  18. Health Literacy and Access to Kidney Transplantation

    PubMed Central

    Grubbs, Vanessa; Gregorich, Steven E.; Perez-Stable, Eliseo J.; Hsu, Chi-yuan

    2009-01-01

    Background and objectives: Few studies have examined health literacy in patients with end stage kidney disease. We hypothesized that inadequate health literacy in a hemodialysis population is common and is associated with poorer access to kidney transplant wait-lists. Design, setting, participants, & measurements: We enrolled 62 Black and White maintenance hemodialysis patients aged 18 to 75. We measured health literacy using the short form Test of Functional Health Literacy in Adults. Our primary outcomes were (1) time from dialysis start date to referral date for kidney transplant evaluation and (2) time from referral date to date placed on kidney transplant wait-list. We used Cox proportional hazard models to examine the association between health literacy (adequate versus inadequate) and our outcomes after controlling for demographics and co-morbid conditions. Results: Roughly one third (32.3%) of participants had inadequate health literacy. Forty-seven (75.8%) of participants were referred for transplant evaluation. Among those referred, 40 (85.1%) were wait-listed. Participants with inadequate health literacy had 78% lower hazard of referral for transplant evaluation than those with adequate health literacy (adjusted hazard ratio [AHR] 0.22; 95% confidence interval 0.08, 0.60; P = 0.003). The hazard ratio of being wait-listed by health literacy was not statistically different (AHR 0.80, 95% CI, 0.39, 1.61), P = 0.5). Conclusions: Inadequate health literacy is common in our hemodialysis patient population and is associated with a lower hazard of referral for transplant evaluation. Strategies to reduce the impact of health literacy on the kidney transplant process should be explored. PMID:19056617

  19. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  20. Accessibility and content of individualized adult reconstructive hip and knee/musculoskeletal oncology fellowship web sites.

    PubMed

    Young, Bradley L; Cantrell, Colin K; Patt, Joshua C; Ponce, Brent A

    2018-06-01

    Accessible, adequate online information is important to fellowship applicants. Program web sites can affect which programs applicants apply to, subsequently altering interview costs incurred by both parties and ultimately impacting rank lists. Web site analyses have been performed for all orthopaedic subspecialties other than those involved in the combined adult reconstruction and musculoskeletal (MSK) oncology fellowship match. A complete list of active programs was obtained from the official adult reconstruction and MSK oncology society web sites. Web site accessibility was assessed using a structured Google search. Accessible web sites were evaluated based on 21 previously reported content criteria. Seventy-four adult reconstruction programs and 11 MSK oncology programs were listed on the official society web sites. Web sites were identified and accessible for 58 (78%) adult reconstruction and 9 (82%) MSK oncology fellowship programs. No web site contained all content criteria and more than half of both adult reconstruction and MSK oncology web sites failed to include 12 of the 21 criteria. Several programs participating in the combined Adult Reconstructive Hip and Knee/Musculoskeletal Oncology Fellowship Match did not have accessible web sites. Of the web sites that were accessible, none contained comprehensive information and the majority lacked information that has been previously identified as being important to perspective applicants.

  1. List memory in young adults with language learning disability.

    PubMed

    Sheng, Li; Byrd, Courtney T; McGregor, Karla K; Zimmerman, Hannah; Bludau, Kadee

    2015-04-01

    The purpose of this study was to characterize the verbal memory limitations of young adults with language learning disability (LLD). Sixteen young adults with LLD and 34 age- and education-matched controls with typical language participated in a Deese-Roediger-McDermott (DRM; Deese, 1959; Roediger & McDermott, 1995) list recall experiment. Participants listened to 12-item word lists that converged on a nonpresented critical item (e.g., rain) semantically (umbrella, drench, weather, hail), phonologically (train, main, ran, wren), or dually in a hybrid list (umbrella, train, drench, main) and recalled words in no particular order. Group comparisons were made on veridical recall (i.e., words that were presented) and false recall of nonpresented critical items. Recall performance was analyzed by list type and list position to examine potential differences in the quality of memorial processes. The LLD group produced fewer veridical recalls than the controls. Both groups demonstrated list type and list position effects in veridical recall. False recall of the critical items was comparable in the 2 groups and varied by list type in predictable ways. Young adults with LLD have verbal memory limitations characterized by quantitatively low levels of accurate recall. Qualitative patterns of recall are similar to those of unaffected peers. Therefore, the memory problem is characterized by limited capacity; memorial processes appear to be intact.

  2. List Memory in Young Adults With Language Learning Disability

    PubMed Central

    Byrd, Courtney T.; McGregor, Karla K.; Zimmerman, Hannah; Bludau, Kadee

    2015-01-01

    Purpose The purpose of this study was to characterize the verbal memory limitations of young adults with language learning disability (LLD). Method Sixteen young adults with LLD and 34 age- and education-matched controls with typical language participated in a Deese–Roediger–McDermott (DRM; Deese, 1959; Roediger & McDermott, 1995) list recall experiment. Participants listened to 12-item word lists that converged on a nonpresented critical item (e.g., rain) semantically (umbrella, drench, weather, hail), phonologically (train, main, ran, wren), or dually in a hybrid list (umbrella, train, drench, main) and recalled words in no particular order. Group comparisons were made on veridical recall (i.e., words that were presented) and false recall of nonpresented critical items. Recall performance was analyzed by list type and list position to examine potential differences in the quality of memorial processes. Results The LLD group produced fewer veridical recalls than the controls. Both groups demonstrated list type and list position effects in veridical recall. False recall of the critical items was comparable in the 2 groups and varied by list type in predictable ways. Conclusion Young adults with LLD have verbal memory limitations characterized by quantitatively low levels of accurate recall. Qualitative patterns of recall are similar to those of unaffected peers. Therefore, the memory problem is characterized by limited capacity; memorial processes appear to be intact. PMID:25652445

  3. List based prefetch

    DOEpatents

    Boyle, Peter [Edinburgh, GB; Christ, Norman [Irvington, NY; Gara, Alan [Yorktown Heights, NY; Kim,; Changhoan, [San Jose, CA; Mawhinney, Robert [New York, NY; Ohmacht, Martin [Yorktown Heights, NY; Sugavanam, Krishnan [Yorktown Heights, NY

    2012-08-28

    A list prefetch engine improves a performance of a parallel computing system. The list prefetch engine receives a current cache miss address. The list prefetch engine evaluates whether the current cache miss address is valid. If the current cache miss address is valid, the list prefetch engine compares the current cache miss address and a list address. A list address represents an address in a list. A list describes an arbitrary sequence of prior cache miss addresses. The prefetch engine prefetches data according to the list, if there is a match between the current cache miss address and the list address.

  4. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  5. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  6. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  7. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  8. NASA directives: Master list and index

    NASA Technical Reports Server (NTRS)

    1994-01-01

    This Handbook sets forth in two parts the following information for the guidance of users of the NASA Management Directives System. Chapter 1 contains introductory information material on how to use this Handbook. Chapter 2 is a complete master list of Agency-wide management directives, describing each directive by type, number, effective date, expiration date, title, and organization code of the office responsible for the directive. Chapter 3 includes a consolidated numerical list of all delegations of authority and a breakdown of such delegation by the office of Installation to which special authority is assigned. Chapter 4 sets forth a consolidated list of all NASA Handbooks (NHB's) and important footnotes covering the control and ordering of such documents. Chapter 5 is a consolidated list of NASA management directives applicable to the Jet Propulsion Laboratory. Chapter 6 is a consolidated list of NASA management directives published in the code of Federal Regulations. Complementary manuals to the NASA Management Directives System are described in Chapter 7. Part B contains an in-depth alphabetical index to all NASA management directives other than Handbooks.

  9. Kentucky Virtual High School 2004/2005 Prerequisite and Course Materials List.

    ERIC Educational Resources Information Center

    Kentucky Department of Education, 2004

    2004-01-01

    This document is a compilation of Kentucky Virtual High School's (KVHS) 2004/2005 prerequisite and course materials listed by content area and subject and provides access information for KVHS's online professional development programs. After the Material and Textbook Procurement Policy, entries for the following KVHS course subject areas are…

  10. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  11. NASA directives master list and index

    NASA Technical Reports Server (NTRS)

    1995-01-01

    This handbook sets forth in two parts, Master List of Management Directives and Index to NASA Management Directives, the following information for the guidance of users of the NASA Management Directives System. Chapter 1 contains introductory information material on how to use this handbook. Chapter 2 is a complete master list of agencywide management directives, describing each directive by type, number, effective date, expiration date, title, and organization code of the office responsible for the directive. Chapter 3 includes a consolidated numerical list of all delegations of authority and a breakdown of such delegation by the office or center to which special authority is assigned. Chapter 4 sets forth a consolidated list of all NASA handbooks (NHB's) and important footnotes covering the control and ordering of such documents. Chapter 5 is a consolidated list of NASA management directives applicable to the Jet Propulsion Laboratory. Chapter 6 is a consolidated list of NASA regulations published in the Code of Federal Regulations. Chapter 7 is a consolidated list of NASA regulations published in Title 14 of the Code of Federal Regulations. Complementary manuals to the NASA Management Directives System are described in Chapter 8. The second part contains an in depth alphabetical index to all NASA management directives other than handbooks, most of which are indexed by titles only.

  12. Age Differences in the Focus of Retrieval: Evidence from Dual-List Free Recall

    PubMed Central

    Wahlheim, Christopher N.; Huff, Mark J.

    2015-01-01

    In the present experiment, we examined age differences in the focus of retrieval using a dual-list free recall paradigm. Younger and older adults studied two lists of unrelated words and recalled from the first list, the second list, or both lists. Older adults showed impaired use of control processes to recall items correctly from a target list and prevent intrusions. This pattern reflected a deficit in recollection verified using a process dissociation procedure. We examined the consequences of an age-related deficit in control processes on the focus of retrieval using measures of temporal organization. Evidence that older adults engaged a broader focus of retrieval than younger adults was shown clearly when participants were instructed to recall from both lists. First-recalled items originated from more distant positions across lists for older adults. We interpret older adults’ broader retrieval orientation as consistent with their impaired ability to elaborate cues to constrain retrieval. These findings show that age-related deficits in control processes impair context reinstatement and the subsequent focus of retrieval to target episodes. PMID:26322551

  13. Age differences in the focus of retrieval: Evidence from dual-list free recall.

    PubMed

    Wahlheim, Christopher N; Huff, Mark J

    2015-12-01

    In the present experiment, we examined age differences in the focus of retrieval using a dual-list free recall paradigm. Younger and older adults studied 2 lists of unrelated words and recalled from the first list, the second list, or both lists. Older adults showed impaired use of control processes to recall items correctly from a target list and prevent intrusions. This pattern reflected a deficit in recollection verified using a process dissociation procedure. We examined the consequences of an age-related deficit in control processes on the focus of retrieval using measures of temporal organization. Evidence that older adults engaged a broader focus of retrieval than younger adults was shown clearly when participants were instructed to recall from both lists. First-recalled items originated from more distant positions across lists for older adults. We interpret older adults' broader retrieval orientation as consistent with their impaired ability to elaborate cues to constrain retrieval. These findings show that age-related deficits in control processes impair context reinstatement and the subsequent focus of retrieval to target episodes. (c) 2015 APA, all rights reserved).

  14. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  15. DAVID-WS: a stateful web service to facilitate gene/protein list analysis.

    PubMed

    Jiao, Xiaoli; Sherman, Brad T; Huang, Da Wei; Stephens, Robert; Baseler, Michael W; Lane, H Clifford; Lempicki, Richard A

    2012-07-01

    The database for annotation, visualization and integrated discovery (DAVID), which can be freely accessed at http://david.abcc.ncifcrf.gov/, is a web-based online bioinformatics resource that aims to provide tools for the functional interpretation of large lists of genes/proteins. It has been used by researchers from more than 5000 institutes worldwide, with a daily submission rate of ∼1200 gene lists from ∼400 unique researchers, and has been cited by more than 6000 scientific publications. However, the current web interface does not support programmatic access to DAVID, and the uniform resource locator (URL)-based application programming interface (API) has a limit on URL size and is stateless in nature as it uses URL request and response messages to communicate with the server, without keeping any state-related details. DAVID-WS (web service) has been developed to automate user tasks by providing stateful web services to access DAVID programmatically without the need for human interactions. The web service and sample clients (written in Java, Perl, Python and Matlab) are made freely available under the DAVID License at http://david.abcc.ncifcrf.gov/content.jsp?file=WS.html.

  16. Adult age differences in production and monitoring in dual-list free recall.

    PubMed

    Wahlheim, Christopher N; Ball, B Hunter; Richmond, Lauren L

    2017-06-01

    The present experiment examined adult age differences in the production and monitoring of responses in dual-list free recall. Younger and older adults studied 2 lists of unrelated words and were instructed to recall from List 1, List 2, or List 1 and List 2. An externalized free recall procedure required participants to: (a) report all responses that came to mind while recalling from specific lists, (b) classify responses as correct or incorrect, and (c) provide confidence judgments for their accuracy classifications. Relative to younger adults, older adults showed a monitoring deficit by misclassifying proportionally more responses and discriminating more poorly between correct and incorrect responses in their confidence judgments. This deficit was especially pronounced under conditions of retroactive interference that occurred when participants recalled from List 1 only. A comparison of retrieval dynamics for all responses produced and for those that participants were reasonably confident were correct provided information about age differences in preretrieval context reinstatement and postretrieval monitoring of retrieved context. One noteworthy finding was that total production when recalling from List 1 showed that List 2 responses remained more accessible across the first several retrieval attempts for older than younger adults, which indicated a substantial age difference in the ability to reinstate List 1 context. Overall, the present findings provide a nuanced characterization of age differences in the operation of production and monitoring mechanisms under conditions of proactive and retroactive interference that can inform models of free recall. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. List based prefetch

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boyle, Peter; Christ, Norman; Gara, Alan

    A list prefetch engine improves a performance of a parallel computing system. The list prefetch engine receives a current cache miss address. The list prefetch engine evaluates whether the current cache miss address is valid. If the current cache miss address is valid, the list prefetch engine compares the current cache miss address and a list address. A list address represents an address in a list. A list describes an arbitrary sequence of prior cache miss addresses. The prefetch engine prefetches data according to the list, if there is a match between the current cache miss address and the listmore » address.« less

  18. Web-Based Communication Strategies Designed to Improve Intention to Minimize Risk for Colorectal Cancer: Randomized Controlled Trial

    PubMed Central

    Flight, Ingrid; Zajac, Ian T; Turnbull, Deborah; Young, Graeme P; Olver, Ian

    2018-01-01

    Background People seek information on the Web for managing their colorectal cancer (CRC) risk but retrieve much personally irrelevant material. Targeting information pertinent to this cohort via a frequently asked question (FAQ) format could improve outcomes. Objective We identified and prioritized colorectal cancer information for men and women aged 35 to 74 years (study 1) and built a website containing FAQs ordered by age and gender. In study 2, we conducted a randomized controlled trial (RCT) to test whether targeted FAQs were more influential on intention to act on CRC risk than the same information accessed via a generic topic list. Secondary analyses compared preference for information delivery, usability, relevance, and likelihood of recommendation of FAQ and LIST websites. Methods Study 1 determined the colorectal cancer information needs of Australians (N=600) by sex and age group (35-49, 50-59, 60-74) through a Web-based survey. Free-text responses were categorized as FAQs: the top 5 issues within each of the 6 cohorts were identified. Study 2 (N=240) compared the impact of presentation as targeted FAQ links to information with links presented as a generic list (LIST) and a CONTROL (no information) condition. We also tested preference for presentation of access to information as FAQ or LIST by adding a CHOICE condition (a self-selected choice of FAQs or a list of information topics). Results Study 1 showed considerable consistency in information priorities among all 6 cohorts with 2 main concerns: treatment of CRC and risk factors. Some differences included a focus on general risk factors, excluding diet and lifestyle, in the younger cohort, and on the existence of a test for CRC in the older cohorts. Study 2 demonstrated that, although respondents preferred information access ordered by FAQs over a list, presentation in this format had limited impact on readiness to act on colorectal cancer risk compared with the list or a no-information control (P=.06

  19. 22 CFR 123.8 - Special controls on vessels, aircraft and satellites covered by the U.S. Munitions List.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... on vessels, aircraft and satellites covered by the U.S. Munitions List. (a) Transferring registration... located in the United States or abroad. (b) The registration in a foreign country of any aircraft, vessel... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Special controls on vessels, aircraft and...

  20. 22 CFR 123.8 - Special controls on vessels, aircraft and satellites covered by the U.S. Munitions List.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... on vessels, aircraft and satellites covered by the U.S. Munitions List. (a) Transferring registration... located in the United States or abroad. (b) The registration in a foreign country of any aircraft, vessel... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Special controls on vessels, aircraft and...

  1. 22 CFR 123.8 - Special controls on vessels, aircraft and satellites covered by the U.S. Munitions List.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... on vessels, aircraft and satellites covered by the U.S. Munitions List. (a) Transferring registration... located in the United States or abroad. (b) The registration in a foreign country of any aircraft, vessel... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Special controls on vessels, aircraft and...

  2. 22 CFR 123.8 - Special controls on vessels, aircraft and satellites covered by the U.S. Munitions List.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... on vessels, aircraft and satellites covered by the U.S. Munitions List. (a) Transferring registration... located in the United States or abroad. (b) The registration in a foreign country of any aircraft, vessel... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special controls on vessels, aircraft and...

  3. Access Control and Processing Studies for Ground Satellite Mobile Communications/Surveillance Systems

    DOT National Transportation Integrated Search

    1974-06-01

    The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...

  4. Listings.

    PubMed

    1993-04-07

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House. 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  5. Listings.

    PubMed

    1994-07-20

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road. Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  6. Listings.

    PubMed

    1994-11-23

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodivorth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  7. Listings.

    PubMed

    1994-07-27

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard. Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  8. Listings.

    PubMed

    1994-02-16

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road. Harrow. Middlesex HA 1 2AX. Fax: 081-423 3867.

  9. Listings.

    PubMed

    1994-05-18

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Miking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Pax: 081-423 3867.

  10. Listings.

    PubMed

    1994-09-28

    Nursing Standard regrets that it is no longer able to take listings over the telephone became of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  11. Listings.

    PubMed

    1993-06-23

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodivorth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Pax: 081-423 3867.

  12. Listings.

    PubMed

    1994-02-23

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  13. Listings.

    PubMed

    1994-09-07

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  14. 19 CFR Appendix to Part 163 - Interim (a)(1)(A) List

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... for commercial samples, tools, theatrical effects §§ 10.70, 10.71Purebred breeding certificate § 10..., merchandise (commercial product) description, quantities, values, unit price, trade terms, part, model, style... Access Program (9802/GSP/CBI) § 141.89CF 5523 Part 141Corrected Commercial Invoice 141.86 (e)Packing List...

  15. 19 CFR Appendix to Part 163 - Interim (a)(1)(A) List

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... for commercial samples, tools, theatrical effects §§ 10.70, 10.71Purebred breeding certificate § 10..., merchandise (commercial product) description, quantities, values, unit price, trade terms, part, model, style... Access Program (9802/GSP/CBI) § 141.89CF 5523 Part 141Corrected Commercial Invoice 141.86 (e)Packing List...

  16. 19 CFR Appendix to Part 163 - Interim (a)(1)(A) List

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... for commercial samples, tools, theatrical effects §§ 10.70, 10.71Purebred breeding certificate § 10..., merchandise (commercial product) description, quantities, values, unit price, trade terms, part, model, style... Access Program (9802/GSP/CBI) § 141.89CF 5523 Part 141Corrected Commercial Invoice 141.86 (e)Packing List...

  17. 19 CFR Appendix to Part 163 - Interim (a)(1)(A) List

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... for commercial samples, tools, theatrical effects §§ 10.70, 10.71Purebred breeding certificate § 10..., merchandise (commercial product) description, quantities, values, unit price, trade terms, part, model, style... Access Program (9802/GSP/CBI) § 141.89CF 5523 Part 141Corrected Commercial Invoice 141.86 (e)Packing List...

  18. 19 CFR Appendix to Part 163 - Interim (a)(1)(A) List

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... for commercial samples, tools, theatrical effects §§ 10.70, 10.71Purebred breeding certificate § 10..., merchandise (commercial product) description, quantities, values, unit price, trade terms, part, model, style... Access Program (9802/GSP/CBI) § 141.89CF 5523 Part 141Corrected Commercial Invoice 141.86 (e)Packing List...

  19. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  20. Predatory Open Access in Rehabilitation.

    PubMed

    Manca, Andrea; Martinez, Gianluca; Cugusi, Lucia; Dragone, Daniele; Mercuro, Giuseppe; Deriu, Franca

    2017-05-01

    Increasingly scholars and researchers are being solicited by predatory open access journals seeking manuscript submissions and abusing the author-pays model by charging authors with publishing fees without any or proper peer review. Such questionable editorial practices are threatening the reputation and credibility of scholarly publishing. To date, no investigation has been conducted on this phenomenon in the field of rehabilitation. This study attempts to identify specific predatory journals operating in this field to quantify the phenomenon and its geographic distribution. Beall's List has been used to this end which, although not perfect, is a comprehensive and up-to-date report of predatory publishers. Of the 1113 publishers on the list, 59 journals were identified, for a total of 5610 published articles. The median number of articles published by each journal was 21, and the median amount of article processing charges was $499. Only 1 out of 59 journals was included in the Directory of Open Access Journals, whereas 7 (12%) were indexed by PubMed. Most of the publishers were based in India (36%) followed by the United States (25%) and Pakistan (5%), and 25% were without a verifiable address. The data indicate that the threat of predatory publishing in rehabilitation is real. Physiatrists, physiotherapists, researchers, and academics operating in this field are advised to use the tools available to recognize predatory practices before considering publishing in open access journals. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  1. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  2. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  3. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  4. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  5. Listings.

    PubMed

    1991-10-02

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Jo Barr, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  6. Listings.

    PubMed

    1991-09-10

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Jo Barr, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  7. Listings.

    PubMed

    1991-04-24

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Clare Ward, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  8. Listings.

    PubMed

    1991-10-16

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Jo Barr, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  9. Listings.

    PubMed

    1994-06-01

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan B/oodworth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Pax: 081-423 3867.

  10. Listings.

    PubMed

    1991-09-18

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Jo Barr, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  11. Listings.

    PubMed

    1991-02-13

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Clare Ward, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  12. Listings.

    PubMed

    1991-08-28

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Jo Barr, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  13. Listings.

    PubMed

    1991-03-13

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Clare Ward, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA 1 2AX (Fax 081-423 3867).

  14. Listings.

    PubMed

    1991-06-26

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Clare Ward, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  15. Listings.

    PubMed

    1994-12-07

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Blood-worth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrotc. Middlesex HA 1 2AX. Fax: 081-423 3867.

  16. Listings.

    PubMed

    1991-10-23

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Jo Barr, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  17. Listings.

    PubMed

    1991-02-20

    Nursing Standard regrets that owing to unprecedented demand we are no longer able to take listings over the telephone. We would like to remind our readers that the listings section is for use by charitable organisations, unions, professional organisations and health authorities to publicise forthcoming events. Your listings should contain all relevant details and be posted or faxed to Clare Ward, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX (Fax 081-423 3867).

  18. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  19. Revision of Import and Export Requirements for Controlled Substances, Listed Chemicals, and Tableting and Encapsulating Machines, Including Changes To Implement the International Trade Data System (ITDS); Revision of Reporting Requirements for Domestic Transactions in Listed Chemicals and Tableting and Encapsulating Machines; and Technical Amendments. Final rule.

    PubMed

    2016-12-30

    The Drug Enforcement Administration is updating its regulations for the import and export of tableting and encapsulating machines, controlled substances, and listed chemicals, and its regulations relating to reports required for domestic transactions in listed chemicals, gamma-hydroxybutyric acid, and tableting and encapsulating machines. In accordance with Executive Order 13563, the Drug Enforcement Administration has reviewed its import and export regulations and reporting requirements for domestic transactions in listed chemicals (and gamma-hydroxybutyric acid) and tableting and encapsulating machines, and evaluated them for clarity, consistency, continued accuracy, and effectiveness. The amendments clarify certain policies and reflect current procedures and technological advancements. The amendments also allow for the implementation, as applicable to tableting and encapsulating machines, controlled substances, and listed chemicals, of the President's Executive Order 13659 on streamlining the export/import process and requiring the government-wide utilization of the International Trade Data System (ITDS). This rule additionally contains amendments that implement recent changes to the Controlled Substances Import and Export Act (CSIEA) for reexportation of controlled substances among members of the European Economic Area made by the Improving Regulatory Transparency for New Medical Therapies Act. The rule also includes additional substantive and technical and stylistic amendments.

  20. Improving Health Care Accessibility: Strategies and Recommendations.

    PubMed

    Almorsy, Lamia; Khalifa, Mohamed

    2016-01-01

    Access time refers to the interval between requesting and actual outpatient appointment. It reflects healthcare accessibility and has a great influence on patient treatment and satisfaction. King Faisal Specialist Hospital and Research Center, Jeddah, Saudi Arabia studied the accessibility to outpatient services in order to develop useful strategies and recommendations for improvement. Utilized, unutilized and no-show appointments were analyzed. It is crucial to manage no-shows and short notice appointment cancellations by preparing a waiting list for those patients who can be called in to an appointment on the same day using an open access policy. An overlapping appointment scheduling model can be useful to minimize patient waiting time and doctor idle time in addition to the sensible use of appointment overbooking that can significantly improve productivity.

  1. Access to Cancer Therapeutics in Low- and Middle-Income Countries.

    PubMed

    Ruff, Paul; Al-Sukhun, Sana; Blanchard, Charmaine; Shulman, Lawrence N

    2016-01-01

    Cancer is rapidly becoming a major health care problem, especially in developing countries, where 60% of the world's total new cases are diagnosed. The success of new antineoplastic medicines and modern radiation devices to cure a good proportion of patients with cancer and to alleviate the suffering of many more has been achieved at a dramatic cost. Therefore, it has become mandatory for health care authorities and pharmaceutical companies to cooperate to use and develop resources in an efficient manner to improve health care delivery to patients with cancer worldwide. Regulatory harmonization is an important key to overcome delays in the approval process, whether for antineoplastic and pain control medicines or for essential medical devices. More emphasis on the significant role of opiates in pain control among patients with cancer is needed to overcome the ingrained belief in their potential for addiction. The World Health Organization (WHO) serves an important role in guiding priorities for health care and efficiently allocating resources by providing essential medicine lists (EMLs) and device lists. However, the financial challenge for access to health care is multi-tiered and requires collaboration between key stakeholders including pharmaceutical industry, local national health authorities, WHO, and other nonprofit, patient-oriented organizations.

  2. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  3. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  4. Selected list of books and journals for the small medical library.

    PubMed

    Brandon, A N; Hill, D R

    1995-04-01

    The complementary informational access roles of the traditional hospital library book and journal collection and the high-tech Internet are viewed from a 1995 perspective. Predecessors of this list have been intended as selection guides for a small or medium-size library in a hospital or comparable medical facility. As the prices of books and journals continue on an upward spiral, the secondary purpose as a core collection for a consortium of small hospital libraries or a network sharing library resources is fast becoming its primary use. Books (610) and journals (141) are categorized by subject; the book list is followed by an author/editor index and the subject list of journals by an alphabetical title listing. Due to requests from librarians, a "minimal core" book collection consisting of 82 titles has been pulled out from the 200 asterisked initial-purchase books. To purchase the entire collection of books and to pay for 1995 subscriptions would require $93,300. The cost of only the asterisked items totals $39,000. The "minimal core" book collection costs $12,700.

  5. Selected list of books and journals for the small medical library.

    PubMed Central

    Brandon, A N; Hill, D R

    1995-01-01

    The complementary informational access roles of the traditional hospital library book and journal collection and the high-tech Internet are viewed from a 1995 perspective. Predecessors of this list have been intended as selection guides for a small or medium-size library in a hospital or comparable medical facility. As the prices of books and journals continue on an upward spiral, the secondary purpose as a core collection for a consortium of small hospital libraries or a network sharing library resources is fast becoming its primary use. Books (610) and journals (141) are categorized by subject; the book list is followed by an author/editor index and the subject list of journals by an alphabetical title listing. Due to requests from librarians, a "minimal core" book collection consisting of 82 titles has been pulled out from the 200 asterisked initial-purchase books. To purchase the entire collection of books and to pay for 1995 subscriptions would require $93,300. The cost of only the asterisked items totals $39,000. The "minimal core" book collection costs $12,700. PMID:7599581

  6. Expanding medicines for neurologic disorders on the WHO Model List.

    PubMed

    Rimmer, Kathryn; Shah, Hiral; Thakur, Kiran

    2017-03-07

    The WHO Model List of Essential Medicines is a recommended formulary for high-priority diseases based on public health trends and epidemiology patterns. The biennial publication serves as a guide for countries, particularly low- and lower-middle-income countries, to develop their own national essential medicines list (EML), and many nongovernmental organizations base their medication supplies on the WHO EML. Over the last 40 years, WHO has expanded the EML in response to treatment gaps for infectious diseases, pediatrics, palliative care, and cancer. In contrast, neurotherapeutics are poorly represented on the Model List despite the global burden of neurologic disorders, which have continued to increase in the last decade. It is imperative that the neurology community advocate for more evidence-based neurologic medicines on the WHO EML. Equitable access to essential neurologic medicines is a crucial step toward reducing the treatment gap for high-burden neurologic disorders worldwide. © 2017 American Academy of Neurology.

  7. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  8. The effects of bedtime writing on difficulty falling asleep: A polysomnographic study comparing to-do lists and completed activity lists.

    PubMed

    Scullin, Michael K; Krueger, Madison L; Ballard, Hannah K; Pruett, Natalya; Bliwise, Donald L

    2018-01-01

    Bedtime worry, including worrying about incomplete future tasks, is a significant contributor to difficulty falling asleep. Previous research showed that writing about one's worries can help individuals fall asleep. We investigated whether the temporal focus of bedtime writing-writing a to-do list versus journaling about completed activities-affected sleep onset latency. Fifty-seven healthy young adults (18-30) completed a writing assignment for 5 min prior to overnight polysomnography recording in a controlled sleep laboratory. They were randomly assigned to write about tasks that they needed to remember to complete the next few days (to-do list) or about tasks they had completed the previous few days (completed list). Participants in the to-do list condition fell asleep significantly faster than those in the completed-list condition. The more specifically participants wrote their to-do list, the faster they subsequently fell asleep, whereas the opposite trend was observed when participants wrote about completed activities. Therefore, to facilitate falling asleep, individuals may derive benefit from writing a very specific to-do list for 5 min at bedtime rather than journaling about completed activities. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  9. The Mission Accessibility of Near-Earth Asteroids

    NASA Technical Reports Server (NTRS)

    Barbee, Brent W.; Abell, P. A.; Adamo, D. R.; Mazanek, D. D.; Johnson, L. N.; Yeomans, D. K.; Chodas, P. W.; Chamberlin, A. B.; Benner, L. A. M.; Taylor, P.; hide

    2015-01-01

    The population of near-Earth asteroids (NEAs) that may be accessible for human space flight missions is defined by the Near-Earth Object Human Space Flight Accessible Targets Study (NHATS). The NHATS is an automated system designed to monitor the accessibility of, and particular mission opportunities offered by, the NEA population. This is analogous to systems that automatically monitor the impact risk posed to Earth by the NEA population. The NHATS system identifies NEAs that are potentially accessible for future round-trip human space flight missions and provides rapid notification to asteroid observers so that crucial follow-up observations can be obtained following discovery of accessible NEAs. The NHATS was developed in 2010 and was automated by early 2012. NHATS data are provided via an interactive web-site, and daily NHATS notification emails are transmitted to a mailing list; both resources are available to the public.

  10. Applying human rights to improve access to reproductive health services.

    PubMed

    Shaw, Dorothy; Cook, Rebecca J

    2012-10-01

    Universal access to reproductive health is a target of Millennium Development Goal (MDG) 5B, and along with MDG 5A to reduce maternal mortality by three-quarters, progress is currently too slow for most countries to achieve these targets by 2015. Critical to success are increased and sustainable numbers of skilled healthcare workers and financing of essential medicines by governments, who have made political commitments in United Nations forums to renew their efforts to reduce maternal mortality. National essential medicine lists are not reflective of medicines available free or at cost in facilities or in the community. The WHO Essential Medicines List indicates medicines required for maternal and newborn health including the full range of contraceptives and emergency contraception, but there is no consistent monitoring of implementation of national lists through procurement and supply even for basic essential drugs. Health advocates are using human rights mechanisms to ensure governments honor their legal commitments to ensure access to services essential for reproductive health. Maternal mortality is recognized as a human rights violation by the United Nations and constitutional and human rights are being used, and could be used more effectively, to improve maternity services and to ensure access to drugs essential for reproductive health. Copyright © 2012 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  11. The List Experiment for Measuring Abortion: What We Know and What We Need.

    PubMed

    Moseson, Heidi; Treleaven, Emily; Gerdts, Caitlin; Diamond-Smith, Nadia

    2017-12-01

    Measuring abortion incidence and prevalence is often difficult because of under-reporting and other biases, complicated research designs, and other issues. Recently, family planning researchers have introduced a new method called the list experiment, adopted from political science and economics, to measure abortion. Three completed studies and at least four studies currently underway use this method to measure abortion in several countries. We discuss the lessons learned from completed studies, when the list experiment may and may not be appropriate, and open questions regarding the use of the list experiment for abortion research. This method has the potential to improve measures of abortion prevalence and incidence, which could translate to better-informed interventions to increase abortion access and reduce unmet need for family planning. Future research should further clarify the advantages and limitations of the list experiment for measuring abortion. © 2017 The Population Council, Inc.

  12. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  13. Driving performance in adults with ADHD: results from a randomized, waiting list controlled trial with atomoxetine.

    PubMed

    Sobanski, E; Sabljic, D; Alm, B; Dittmann, R W; Wehmeier, P M; Skopp, G; Strohbeck-Kühner, P

    2013-08-01

    To investigate effects of a 12-week treatment with atomoxetine (ATX) on driving performance in real traffic, driving-related neuropsychological performance tests and self-evaluation of driving in adult patients with ADHD compared to an untreated control group with ADHD. Parallel group design with an ATX and a waiting list group. At baseline and endpoint patients were evaluated with a standardized on-road driving test (SDBO), a driving-related neuropsychological test battery (Act and React Test System [ART2020]), and subjective measures of driving performance (one-week driving diary, Driver Coping Questionnaire). Forty-three of the 64 included patients completed the study (n=22 ATX, n=21 controls). Mean intervention period was 11.9±3.0 weeks, mean daily ATX dosage was 71.6±14.9mg. At endpoint, 60.1% of patients treated with ATX and 0% of waiting list group had reduced ADHD symptoms by greater or equal to 30%. In SDBO, ATX group reduced driving errors in three of four driving performance categories (attention, P<0.05; risk-related self-control, P<0.005; driver skills, P<0.001), number of driving errors remained stable in control group. At endpoint, 47.6% of control group and 18.2% of ATX group (P<0.05) did not fulfil the driving fitness criteria according to German Guidelines (percentile rank less or equal to 16 in one or more subtests in ART2020). Total number of self-reported critical traffic situations decreased from 12.0 to 6.8 per week in ATX group (P<0.05) and remained stable in controls by 9.3 and 9.9 at baseline and endpoint (ns). Coping strategies with stressful traffic situations did not change within both groups. Our study provides first evidence that treatment with ATX improves driving performance in real traffic in adults with ADHD. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  14. Why build limited access highways?.

    DOT National Transportation Integrated Search

    1991-01-01

    This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...

  15. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    PubMed

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  16. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

    PubMed Central

    Yang, Yixian; Shi, Yuxiang

    2018-01-01

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269

  17. Aeropropulsion facilities configuration control: Procedures manual

    NASA Technical Reports Server (NTRS)

    Lavelle, James J.

    1990-01-01

    Lewis Research Center senior management directed that the aeropropulsion facilities be put under configuration control. A Configuration Management (CM) program was established by the Facilities Management Branch of the Aeropropulsion Facilities and Experiments Division. Under the CM program, a support service contractor was engaged to staff and implement the program. The Aeronautics Directorate has over 30 facilities at Lewis of various sizes and complexities. Under the program, a Facility Baseline List (FBL) was established for each facility, listing which systems and their documents were to be placed under configuration control. A Change Control System (CCS) was established requiring that any proposed changes to FBL systems or their documents were to be processed as per the CCS. Limited access control of the FBL master drawings was implemented and an audit system established to ensure all facility changes are properly processed. This procedures manual sets forth the policy and responsibilities to ensure all key documents constituting a facilities configuration are kept current, modified as needed, and verified to reflect any proposed change. This is the essence of the CM program.

  18. The assessment of exploitation process of power for access control system

    NASA Astrophysics Data System (ADS)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  19. Online Public Access Catalogs. ERIC Fact Sheet.

    ERIC Educational Resources Information Center

    Cochrane, Pauline A.

    A listing is presented of 17 documents in the ERIC database concerning the Online Catalog (sometimes referred to as OPAC or Online Public Access Catalog), a computer-based and supported library catalog designed for patron use. The database usually represents recent acquisitions and often contains information about books on order and items in…

  20. DAVID-WS: a stateful web service to facilitate gene/protein list analysis

    PubMed Central

    Jiao, Xiaoli; Sherman, Brad T.; Huang, Da Wei; Stephens, Robert; Baseler, Michael W.; Lane, H. Clifford; Lempicki, Richard A.

    2012-01-01

    Summary: The database for annotation, visualization and integrated discovery (DAVID), which can be freely accessed at http://david.abcc.ncifcrf.gov/, is a web-based online bioinformatics resource that aims to provide tools for the functional interpretation of large lists of genes/proteins. It has been used by researchers from more than 5000 institutes worldwide, with a daily submission rate of ∼1200 gene lists from ∼400 unique researchers, and has been cited by more than 6000 scientific publications. However, the current web interface does not support programmatic access to DAVID, and the uniform resource locator (URL)-based application programming interface (API) has a limit on URL size and is stateless in nature as it uses URL request and response messages to communicate with the server, without keeping any state-related details. DAVID-WS (web service) has been developed to automate user tasks by providing stateful web services to access DAVID programmatically without the need for human interactions. Availability: The web service and sample clients (written in Java, Perl, Python and Matlab) are made freely available under the DAVID License at http://david.abcc.ncifcrf.gov/content.jsp?file=WS.html. Contact: xiaoli.jiao@nih.gov; rlempicki@nih.gov PMID:22543366

  1. 8 CFR 207.5 - Waiting lists and priority handling.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... REFUGEES § 207.5 Waiting lists and priority handling. Waiting lists are maintained for each designated refugee group of special humanitarian concern. Each applicant whose application is accepted for filing by... filing is the priority date for purposes of case control. Refugees or groups of refugees may be selected...

  2. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  3. Directory of Electronic Journals, Newsletters and Academic Discussion Lists. 5th Edition.

    ERIC Educational Resources Information Center

    King, Lisabeth A., Comp.; And Others

    This directory is a compilation of entries for nearly 2,500 scholarly discussion lists and 675 electronic journals, newsletters, and related titles such as newsletter-digests, available on the Internet. Instructions are provided for accessing each publication. Part 1 is an introduction to electronic scholarly publications, followed by the articles…

  4. Cost-effectiveness of a workplace intervention for sick-listed employees with common mental disorders: design of a randomized controlled trial

    PubMed Central

    van Oostrom, Sandra H; Anema, Johannes R; Terluin, Berend; de Vet, Henrica CW; Knol, Dirk L; van Mechelen, Willem

    2008-01-01

    Background Considering the high costs of sick leave and the consequences of sick leave for employees, an early return-to-work of employees with mental disorders is very important. Therefore, a workplace intervention is developed based on a successful return-to-work intervention for employees with low back pain. The objective of this paper is to present the design of a randomized controlled trial evaluating the cost-effectiveness of the workplace intervention compared with usual care for sick-listed employees with common mental disorders. Methods The study is designed as a randomized controlled trial with a follow-up of one year. Employees eligible for this study are on sick leave for 2 to 8 weeks with common mental disorders. The workplace intervention will be compared with usual care. The workplace intervention is a stepwise approach that aims to reach consensus about a return-to-work plan by active participation and strong commitment of both the sick-listed employee and the supervisor. Outcomes will be assessed at baseline, 3, 6, 9 and 12 months. The primary outcome of this study is lasting return-to-work, which will be acquired from continuous registration systems of the companies after the follow-up. Secondary outcomes are total number of days of sick leave during the follow-up, severity of common mental disorders, coping style, job content, and attitude, social influence, and self-efficacy determinants. Cost-effectiveness will be evaluated from the societal perspective. A process evaluation will also be conducted. Discussion Return-to-work is difficult to discuss in the workplace for sick-listed employees with mental disorders and their supervisors. Therefore, this intervention offers a unique opportunity for the sick-listed employee and the supervisor to discuss barriers for return-to-work. Results of this study will possibly contribute to improvement of disability management for sick-listed employees with common mental disorders. Results will become

  5. National reimbursement listing determinants of new cancer drugs: a retrospective analysis of 58 cancer treatment appraisals in 2007-2016 in South Korea.

    PubMed

    Kim, Eun-Sook; Kim, Jung-Ae; Lee, Eui-Kyung

    2017-08-01

    Since the positive-list system was introduced, concerns have been raised over restricting access to new cancer drugs in Korea. Policy changes in the decision-making process, such as risk-sharing agreement and the waiver of pharmacoeconomic data submission, were implemented to improve access to oncology medicines, and other factors are also involved in the reimbursement for cancer drugs. The aim of this study is to investigate the reimbursement listing determinants of new cancer drugs in Korea. All cancer treatment appraisals of Health Insurance Review and Assessment during 2007-2016 were analyzed based on 13 independent variables (comparative effectiveness, cost-effectiveness, drug-price comparison, oncology-specific policy, and innovation such as new mode of action). Univariate and multivariate logistic analyses were conducted. Of 58 analyzed submissions, 40% were listed in the national reimbursement formulary. In univariate analysis, four variables were related to listing: comparative effectiveness, drug-price comparison, new mode of action, and risk-sharing agreement. In multivariate logistic analysis, three variables significantly increased the likelihood of listing: clinical improvement, below alternative's price, and risk-sharing arrangement. Cancer drug's listing increased from 17% to 47% after risk-sharing agreement implementation. Clinical improvement, cost-effectiveness, and RSA application are critical to successful national reimbursement listing.

  6. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  7. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  8. Extreme Access & Lunar Ice Mining in Permanently Shadowed Craters Project

    NASA Technical Reports Server (NTRS)

    Mueller, Robert P.

    2014-01-01

    Results from the recent LCROSS mission in 2010, indicate that H2O ice and other useful volatiles such as CO, He, and N are present in the permanently shadowed craters at the poles of the moon. However, the extreme topography and steep slopes of the crater walls make access a significant challenge. In addition temperatures have been measured at 40K (-233 C) so quick access and exit is desirable before the mining robot cold soaks. The Global Exploration Roadmap lists extreme access as a necessary technology for Lunar Exploration.

  9. A brief mindfulness-based cognitive behavioral intervention improves sexual functioning versus wait-list control in women treated for gynecologic cancer

    PubMed Central

    Brotto, Lori A.; Erskine, Yvonne; Carey, Mark; Ehlen, Tom; Finlayson, Sarah; Heywood, Mark; Kwon, Janice; McAlpine, Jessica; Stuart, Gavin; Thomson, Sydney; Miller, Dianne

    2012-01-01

    Goal The goal of this study was to evaluate a mindfulness-based cognitive behavioral intervention for sexual dysfunction in gynecologic cancer survivors compared to a wait-list control group. Methods Thirty-one survivors of endometrial or cervical cancer (mean age 54.0, range 31–64) who self-reported significant and distressing sexual desire and/or sexual arousal concerns were assigned either to three, 90-minute mindfulness-based cognitive behavior therapy sessions or two months of wait-list control prior to entering the treatment arm. Validated measures of sexual response, sexual distress, and mood, as well as laboratory-evoked physiological and subjective sexual arousal were assessed at pre-, one month post-, and 6-months following treatment. Results There were no significant effects of the wait-list condition on any measure. Treatment led to significant improvements in all domains of sexual response, and a trend towards significance for reducing sexual distress. Perception of genital arousal during an erotic film was also significantly increased following the intervention despite no change in physiologically-measured sexual arousal. Conclusions A brief mindfulness-based intervention was effective for improving sexual functioning. Geographic restrictions permitted only a select sample of survivors to participate, thus, the generalizability of the findings is limited. Future studies should aim to develop online modalities for treatment administration to overcome this limitation. PMID:22293042

  10. A brief mindfulness-based cognitive behavioral intervention improves sexual functioning versus wait-list control in women treated for gynecologic cancer.

    PubMed

    Brotto, Lori A; Erskine, Yvonne; Carey, Mark; Ehlen, Tom; Finlayson, Sarah; Heywood, Mark; Kwon, Janice; McAlpine, Jessica; Stuart, Gavin; Thomson, Sydney; Miller, Dianne

    2012-05-01

    The goal of this study was to evaluate a mindfulness-based cognitive behavioral intervention for sexual dysfunction in gynecologic cancer survivors compared to a wait-list control group. Thirty-one survivors of endometrial or cervical cancer (mean age 54.0, range 31-64) who self-reported significant and distressing sexual desire and/or sexual arousal concerns were assigned either to three, 90-minute mindfulness-based cognitive behavior therapy sessions or two months of wait-list control prior to entering the treatment arm. Validated measures of sexual response, sexual distress, and mood, as well as laboratory-evoked physiological and subjective sexual arousal were assessed at pre-, one month post-, and 6-months following treatment. There were no significant effects of the wait-list condition on any measure. Treatment led to significant improvements in all domains of sexual response, and a trend towards significance for reducing sexual distress. Perception of genital arousal during an erotic film was also significantly increased following the intervention despite no change in physiologically-measured sexual arousal. A brief mindfulness-based intervention was effective for improving sexual functioning. Geographic restrictions permitted only a select sample of survivors to participate, thus, the generalizability of the findings is limited. Future studies should aim to develop online modalities for treatment administration to overcome this limitation. Copyright © 2012 Elsevier B.V. All rights reserved.

  11. Making drugs accessible.

    PubMed

    1999-01-01

    Making drugs accessible for common HIV-associated illnesses in West Africa is discussed. HIV-positive people in Ouagadougou, Burkina Faso, could not afford drugs for treating their illnesses; thus, volunteers from La Bergerie-FUC, a Christian organization, have established a day care center for HIV-positive people. A French church supplies the drugs; oral rehydration salts are provided through the Ministry of Health. Since the organization did not have enough drugs to meet the needs of all its patients, two strategies were developed to improve its drug supply. The first strategy was to raise money to buy drugs through the support of a local NGO, the Initiative Privee et Communautaire de lutte contre le SIDA (IPC). IPC initially refused to support them, but, eventually agreed to fund drug purchasing as a pilot project. The second strategy was to look at ways of reducing the cost of drugs, which resulted in a list of essential drugs for HIV-associated infections. The list was approved by Care and Support Committee of the national AIDS program for use by other organizations. The organizations have created a national network to improve the delivery of community-based care and support services in Burkina Faso. Recently, the national AIDS program has asked this network to help them change the national essential drugs list to include essential drugs for treating common HIV-associated infections.

  12. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  13. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The individual...

  14. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  15. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    PubMed Central

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  16. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  17. A Japanese logographic character frequency list for cognitive science research.

    PubMed

    Chikamatsu, N; Yokoyama, S; Nozaki, H; Long, E; Fukuda, S

    2000-08-01

    This paper describes a Japanese logographic character (kanji) frequency list, which is based on an analysis of the largest recently available corpus of Japanese words and characters. This corpus comprised a full year of morning and evening editions of a major newspaper, containing more than 23 million kanji characters and more than 4,000 different kanji characters. This paper lists the 3,000 most frequent kanji characters, as well as an analysis of kanji usage and correlations between the present list and previous Japanese frequency lists. The authors believe that the present list will help researchers more accurately and efficiently control the selection of kanji characters in cognitive science research and interpret related psycholinguistic data.

  18. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  19. List-Based Simulated Annealing Algorithm for Traveling Salesman Problem

    PubMed Central

    Zhan, Shi-hua; Lin, Juan; Zhang, Ze-jun

    2016-01-01

    Simulated annealing (SA) algorithm is a popular intelligent optimization algorithm which has been successfully applied in many fields. Parameters' setting is a key factor for its performance, but it is also a tedious work. To simplify parameters setting, we present a list-based simulated annealing (LBSA) algorithm to solve traveling salesman problem (TSP). LBSA algorithm uses a novel list-based cooling schedule to control the decrease of temperature. Specifically, a list of temperatures is created first, and then the maximum temperature in list is used by Metropolis acceptance criterion to decide whether to accept a candidate solution. The temperature list is adapted iteratively according to the topology of the solution space of the problem. The effectiveness and the parameter sensitivity of the list-based cooling schedule are illustrated through benchmark TSP problems. The LBSA algorithm, whose performance is robust on a wide range of parameter values, shows competitive performance compared with some other state-of-the-art algorithms. PMID:27034650

  20. List-Based Simulated Annealing Algorithm for Traveling Salesman Problem.

    PubMed

    Zhan, Shi-hua; Lin, Juan; Zhang, Ze-jun; Zhong, Yi-wen

    2016-01-01

    Simulated annealing (SA) algorithm is a popular intelligent optimization algorithm which has been successfully applied in many fields. Parameters' setting is a key factor for its performance, but it is also a tedious work. To simplify parameters setting, we present a list-based simulated annealing (LBSA) algorithm to solve traveling salesman problem (TSP). LBSA algorithm uses a novel list-based cooling schedule to control the decrease of temperature. Specifically, a list of temperatures is created first, and then the maximum temperature in list is used by Metropolis acceptance criterion to decide whether to accept a candidate solution. The temperature list is adapted iteratively according to the topology of the solution space of the problem. The effectiveness and the parameter sensitivity of the list-based cooling schedule are illustrated through benchmark TSP problems. The LBSA algorithm, whose performance is robust on a wide range of parameter values, shows competitive performance compared with some other state-of-the-art algorithms.

  1. Using medication list--problem list mismatches as markers of potential error.

    PubMed Central

    Carpenter, James D.; Gorman, Paul N.

    2002-01-01

    The goal of this project was to specify and develop an algorithm that will check for drug and problem list mismatches in an electronic medical record (EMR). The algorithm is based on the premise that a patient's problem list and medication list should agree, and a mismatch may indicate medication error. Successful development of this algorithm could mean detection of some errors, such as medication orders entered into a wrong patient record, or drug therapy omissions, that are not otherwise detected via automated means. Additionally, mismatches may identify opportunities to improve problem list integrity. To assess the concept's feasibility, this study compared medications listed in a pharmacy information system with findings in an online nursing adult admission assessment, serving as a proxy for the problem list. Where drug and problem list mismatches were discovered, examination of the patient record confirmed the mismatch, and identified any potential causes. Evaluation of the algorithm in diabetes treatment indicates that it successfully detects both potential medication error and opportunities to improve problem list completeness. This algorithm, once fully developed and deployed, could prove a valuable way to improve the patient problem list, and could decrease the risk of medication error. PMID:12463796

  2. The Words-in-Noise Test (WIN), list 3: a practice list.

    PubMed

    Wilson, Richard H; Watts, Kelly L

    2012-02-01

    The Words-in-Noise Test (WIN) was developed as an instrument to quantify the ability of listeners to understand monosyllabic words in background noise using multitalker babble (Wilson, 2003). The 50% point, which is calculated with the Spearman-Kärber equation (Finney, 1952), is used as the evaluative metric with the WIN materials. Initially, the WIN was designed as a 70-word instrument that presented ten unique words at each of seven signal-to-noise ratios from 24 to 0 dB in 4 dB decrements. Subsequently, the 70-word list was parsed into two 35-word lists that achieved equivalent recognition performances (Wilson and Burks, 2005). This report involves the development of a third list (WIN List 3) that was developed to serve as a practice list to familiarize the participant with listening to words presented in background babble. To determine-on young listeners with normal hearing and on older listeners with sensorineural hearing loss-the psychometric properties of the WIN List 3 materials. A quasi-experimental, repeated-measures design was used. Twenty-four young adult listeners (M = 21.6 yr) with normal pure-tone thresholds (≤ 20 dB HL at 250 to 8000 Hz) and 24 older listeners (M = 65.9 yr) with sensorineural hearing loss participated. The level of the babble was fixed at 80 dB SPL with the level of the words varied from 104 to 80 dB SPL in 4 dB decrements. For listeners with normal hearing, the 50% points for Lists 1 and 2 were similar (4.3 and 5.1 dB S/N, respectively), both of which were lower than the 50% point for List 3 (7.4 dB S/N). A similar relation was observed with the listeners with hearing loss, 50% points for Lists 1 and 2 of 12.2 and 12.4 dB S/N, respectively, compared to 15.8 dB S/N for List 3. The differences between Lists 1 and 2 and List 3 were significant. The relations among the psychometric functions and the relations among the individual data both reflected these differences. The significant ∼3 dB difference between performances

  3. Corporate Characteristics and Internal Control Information Disclosure- Evidence from Annual Reports in 2009 of Listed Companies in Shenzhen Stock Exchange

    NASA Astrophysics Data System (ADS)

    Xiaowen, Song

    Under the research framework of internal control disclosure and combined the current economic situation, the paper empirically analyzes the relationship between corporate characteristics and internal control information disclosure. The paper selects 647 A share companies listed in Shenzhen Stock Exchanges in 2009 as a sample. The results show: (1) the companies with excellent performance and high liquidity tend to disclose more internal control information; (2) the companies with the high leverage and also issued B shares are not willing to disclosure internal control information; (3) the companies sizes and companies which have hired Four-big accounting firms have no significant effects on internal control disclosure.

  4. The Near-Earth Object Human Space Flight Accessible Targets Study (NHATS) List of Near-Earth Asteroids: Identifying Potential Targets for Future Exploration

    NASA Technical Reports Server (NTRS)

    Abell, Paul A.; Barbee, B. W.; Mink, R. G.; Alberding, C. M.; Adamo, D. R.; Mazanek, D. D.; Johnson, L. N.; Yeomans, D. K.; Chodas, P. W.; Chamberlin, A. B.; hide

    2012-01-01

    Over the past several years, much attention has been focused on the human exploration of near-Earth asteroids (NEAs). Two independent NASA studies examined the feasibility of sending piloted missions to NEAs [1, 2], and in 2009, the Augustine Commission identified NEAs as high profile destinations for human exploration missions beyond the Earth-Moon system [3]. More recently the current U.S. presidential administration directed NASA to include NEAs as destinations for future human exploration with the goal of sending astronauts to a NEA in the mid to late 2020s. This directive became part of the official National Space Policy of the United States of America as of June 28, 2010 [4]. Detailed planning for such deep space exploration missions and identifying potential NEAs as targets for human spaceflight requires selecting objects from the ever growing list of newly discovered NEAs. Hence NASA developed and implemented the Near-Earth Object (NEO) Human Space Flight (HSF) Accessible Target Study (NHATS), which identifies potential candidate objects on the basis of defined dynamical trajectory performance constraints.

  5. Exploring the Interface between Christian Faith and Education: An Annotated List of Current Journals

    ERIC Educational Resources Information Center

    Harkness, Allan G.

    2013-01-01

    Seventeen academic journals which explore aspects of the interface between the Christian faith and educational concerns, and which are currently available internationally and in English, are listed. Annotations for each journal include publication and editorial details, website access, sponsoring institution, stated focus, educational content…

  6. Non-Selective Lexical Access in Late Arabic-English Bilinguals: Evidence from Gating.

    PubMed

    Boudelaa, Sami

    2018-02-07

    Previous research suggests that late bilinguals who speak typologically distant languages are the least likely to show evidence of non-selective lexical access processes. This study puts this claim to test by using the gating task to determine whether words beginning with speech sounds that are phonetically similar in Arabic and English (e.g., [b,d,m,n]) give rise to selective or non-selective lexical access processes in late Arabic-English bilinguals. The results show that an acoustic-phonetic input (e.g., [bæ]) that is consistent with words in Arabic (e.g., [bædrun] "moon") and English (e.g., [bæd] "bad") activates lexical representations in both languages of the bilingual. This non-selective activation holds equally well for mixed lists with words from both Arabic and English and blocked lists consisting only of Arabic or English words. These results suggest that non-selective lexical access processes are the default mechanism even in late bilinguals of typologically distant languages.

  7. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  8. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  9. NASA directives master list and index

    NASA Technical Reports Server (NTRS)

    1993-01-01

    This Handbook sets forth in two parts the following information for the guidance of users of the NASA Management Directives System. Part A is a master list of management directives in force as of March 31, 1993. Chapter 1 contains introductory informative material on how to use this Handbook. Chapter 2 is a complete master list of Agencywide management directives, describing each directive by type, number, effective date, expiration date, title, and organization code of the office responsible for the directive. Chapter 3 includes a consolidated numerical list of all delegations of authority and a breakdown of such delegation by the office or installation to which special authority is assigned. Chapter 4 sets forth a consolidated list of all NASA Handbooks (NHB's) and important footnotes covering the control and ordering of such documents. Chapter 5 is a consolidated list of NASA management directives applicable to the Jet Propulsion Laboratory. Chapter 6 is a consolidated list of NASA management directives published in the Code of Federal Regulations. Complementary manuals to the NASA Management Directives System are described in Chapter 7. Part B is the index to NASA management directives in force as of March 31, 1993. This part contains an in-depth alphabetical index to all NASA management directives other than Handbooks. NHB's 1610.6, 'NASA Personnel Security Handbook,' 1620.3, 'NASA Physical Security Handbook,' 1640.4, 'NASA Information Security Program,' 1900.1, 'Standards of Conduct for NASA Employees,' 5103.6, 'Source Evaluation Board Handbook,' and 7400.1, 'Budget Administration Manual,' are indexed in-depth. All other NHB's are indexed by titles only.

  10. Accession Bulletin, Volume 1 Number 1, January 1970.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Solid Waste Management Office.

    The purpose of this Bulletin is to list both what is being published in the world literature pertaining to solid waste management and being abstracted for input into the Solid Waste Information Retrieval System (SWIRS). SWIRS accessions cannot be all-inclusive; the holdings represent only that portion of the massive literature rapidly being…

  11. 24 CFR 200.222 - Certification of previous record on basis of a master list.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... basis of a master list. 200.222 Section 200.222 Housing and Urban Development Regulations Relating to... Certification of previous record on basis of a master list. A principal may avoid repetitious listings by providing HUD with a complete master list, acceptable to the Participation Control Officer, of all projects...

  12. 24 CFR 200.222 - Certification of previous record on basis of a master list.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... basis of a master list. 200.222 Section 200.222 Housing and Urban Development Regulations Relating to... Certification of previous record on basis of a master list. A principal may avoid repetitious listings by providing HUD with a complete master list, acceptable to the Participation Control Officer, of all projects...

  13. 24 CFR 200.222 - Certification of previous record on basis of a master list.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... basis of a master list. 200.222 Section 200.222 Housing and Urban Development Regulations Relating to... Certification of previous record on basis of a master list. A principal may avoid repetitious listings by providing HUD with a complete master list, acceptable to the Participation Control Officer, of all projects...

  14. 24 CFR 200.222 - Certification of previous record on basis of a master list.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... basis of a master list. 200.222 Section 200.222 Housing and Urban Development Regulations Relating to... Certification of previous record on basis of a master list. A principal may avoid repetitious listings by providing HUD with a complete master list, acceptable to the Participation Control Officer, of all projects...

  15. 24 CFR 200.222 - Certification of previous record on basis of a master list.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... basis of a master list. 200.222 Section 200.222 Housing and Urban Development Regulations Relating to... Certification of previous record on basis of a master list. A principal may avoid repetitious listings by providing HUD with a complete master list, acceptable to the Participation Control Officer, of all projects...

  16. The influence of patriarchal behavior on birth control access and use among recent Hispanic immigrants.

    PubMed

    Gonzalez, Eleazar U; Sable, Marjorie R; Campbell, James D; Dannerbeck, Anne

    2010-08-01

    It is commonly assumed that Hispanic immigrants in the United States subscribe to a patriarchal ideology that keeps women subordinated to men, often through violence and exploitative reproductive behaviors. If this assumption is true, we might expect to find that in the Hispanic culture patriarchal males control decision-making about access to and use of birth control. Structured interviews of 100 Hispanic men and 100 Hispanic women who were recent immigrants to a Midwest community were conducted to examine this assumption. Results did not support this assumption among this study population. We found no patriarchal ideology supporting women's subordination to men, violence as a mechanism of control, reproduction as a way of exploitation, or cultural influences discouraging access to and use of birth control in the Hispanic community. Rather, these immigrants revealed adequate knowledge of birth control use and positive perceptions of gender equality. Gaining a better understanding of the limited influence of patriarchal ideology on the use of birth control and family planning services among this Hispanic community may inform the development of family planning services tailored for new Hispanic immigrants.

  17. Accountability for end-stage organ care: implications of geographic variation in access to kidney transplantation.

    PubMed

    Axelrod, David A; Lentine, Krista L; Xiao, Huiling; Bubolz, Thomas; Goodman, David; Freeman, Richard; Tuttle-Newhall, Janet E; Schnitzler, Mark A

    2014-05-01

    The provision of effective surgical care for end-stage renal disease (ESRD) requires efficient evaluation and transplantation. Prior assessments of transplant access have focused primarily on waitlisted patients rather than the overall populations served by "accountable" providers of transplant services. Novel transplant referral regions (TRRs) were defined using United Network for Organ Sharing registry data for 301,092 kidney transplant listings to assign zip codes to "accountable" transplant programs. Subsequently, risk-adjusted observed to expected (O:E) rates of listing and transplant procedures were calculated for each TRR. Finally, the impact of variation in TRR listing and transplant rates on mortality was assessed for ESRD patients <60 years old diagnosed between 2000 and 2008. In total, 113 TRRs were defined, 51% of which included >1 transplant center. The likelihood of being evaluated and listed for transplant varied significantly between TRRs (risk-adjusted O:E, 0.58-1.95). Variation was greater for the overall transplant rate (0.62-2.19), living donor transplantation (0.36-3.08), and donation after cardiac death transplant (0-15.4) than for standard criteria donors (0.64-2.86). Mortality was decreased for ESRD patients living in TRRs in the highest tertile of listings (hazard ratio, 0.89; P < .0001) and transplantation (0.90; P < .0001). Residence in a TRR with care delivery systems that increase access to transplant services is associated with significant, risk-adjusted decreases in ESRD-related mortality. Transplant centers should continue to focus on improving access to care within the communities they serve. Copyright © 2014 Mosby, Inc. All rights reserved.

  18. Career listings.

    PubMed

    1993-03-17

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  19. CAREER listings.

    PubMed

    1993-03-10

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road, Hatrow, Middlesex HA 1 2AX. Pax: 081-423 3867.

  20. Career listings.

    PubMed

    1993-04-28

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain all relevant details and be posted or faxed to Susan Bloodworth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  1. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  2. Web based listing of agents associated with new onset work-related asthma.

    PubMed

    Rosenman, K D; Beckett, W S

    2015-05-01

    Work-related asthma is common and yet remains a challenge to diagnose. Access to a listing of agents associated with work-related asthma has been suggested as useful in assisting in the diagnosis. The Association of Occupational and Environmental Clinics (AOEC) developed criteria that were used to review the peer-reviewed medical literature published in English. Based on this review, substances were designated either as a sensitizing agent or an irritant. The reviews were conducted by a board certified internist/pulmonologist/occupational medicine specialist from 2002 to 2007 and a board certified internist/occupational medicine physician from 2008- date. All reviews were then reviewed by the nine member AOEC board of directors. The original list of agents associated with new onset work-related asthma was derived from the tables of a text book on work-related asthma. After 13 years of review, there are 327 substances designated as asthma agents on the AOEC list; 173 (52.9%) coded as sensitizers, 35 (10.7%) as generally recognized as an asthma causing agent, four (1.2%) as irritants, two (0.6%) as both a sensitizer and an irritant and 113(34.6%) agents that still need to be reviewed. The AOEC has developed a readily available web based listing of agents associated with new onset work-related asthma in adults. The listing is based on peer-reviewed criteria. The listing is updated twice a year. Regular review of the peer-reviewed medical literature is conducted to determine whether new substances should be added to the list. Clinicians should find the list useful when considering the diagnosis of work-related asthma. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Artificial intelligence applications of fast optical memory access

    NASA Astrophysics Data System (ADS)

    Henshaw, P. D.; Todtenkopf, A. B.

    The operating principles and performance of rapid laser beam-steering (LBS) techniques are reviewed and illustrated with diagrams; their applicability to fast optical-memory (disk) access is evaluated; and the implications of fast access for the design of expert systems are discussed. LBS methods examined include analog deflection (source motion, wavefront tilt, and phased arrays), digital deflection (polarization modulation, reflectivity modulation, interferometric switching, and waveguide deflection), and photorefractive LBS. The disk-access problem is considered, and typical LBS requirements are listed as 38,000 beam positions, rotational latency 25 ms, one-sector rotation time 1.5 ms, and intersector space 87 microsec. The value of rapid access for increasing the power of expert systems (by permitting better organization of blocks of information) is illustrated by summarizing the learning process of the MVP-FORTH system (Park, 1983).

  4. CINAHL list of subject headings: a nursing thesaurus revised.

    PubMed

    Fishel, C C; Graham, K E; Greer, D M; Gupta, A D; Lockwood, D K; Prime, E E

    1985-04-01

    The rationale and methods for revising the thesaurus of one of the major health sciences indexing tools are discussed. Computer production of the Cumulative Index to Nursing & Allied Health Literature and the possibility of online access mandated a revision of the list of subject headings. CINAHL has maintained a policy of responding to user needs and to changes in the nursing and allied health literature, and user input was encouraged during revision of the thesaurus. The methods of structural revision are described, and major changes in the thesaurus are detailed. Modification of the thesaurus is expected to have a far-reaching impact on the retrieval of information in nursing and allied health. Nursing and Allied Health (CINAHL) is now available online through DIALOG (file 218) and BRS (access code NAHL).

  5. CINAHL list of subject headings: a nursing thesaurus revised.

    PubMed Central

    Fishel, C C; Graham, K E; Greer, D M; Gupta, A D; Lockwood, D K; Prime, E E

    1985-01-01

    The rationale and methods for revising the thesaurus of one of the major health sciences indexing tools are discussed. Computer production of the Cumulative Index to Nursing & Allied Health Literature and the possibility of online access mandated a revision of the list of subject headings. CINAHL has maintained a policy of responding to user needs and to changes in the nursing and allied health literature, and user input was encouraged during revision of the thesaurus. The methods of structural revision are described, and major changes in the thesaurus are detailed. Modification of the thesaurus is expected to have a far-reaching impact on the retrieval of information in nursing and allied health. Nursing and Allied Health (CINAHL) is now available online through DIALOG (file 218) and BRS (access code NAHL). PMID:3995203

  6. Employee Relations Bibliography: Public, Non-Profit and Professional Employment. Essay, Annotated Listing, Indexes.

    ERIC Educational Resources Information Center

    Tice, Terrence N.

    This comprehensive listing of 2,724 bibliographic items from 1967 through early 1977 includes significant English-language material on the contractual relationship between public employers and employees in the United States and Canada. (There are a few items in French.) Although access is given to the broader areas of public management and…

  7. [Access to medicines prescribed for acute health conditions in adults in South and Northeast Brazil].

    PubMed

    Paniz, Vera Maria Vieira; Cechin, Isabel Carolina Coelho Flores; Fassa, Anaclaudia Gastal; Piccini, Roberto Xavier; Tomasi, Elaine; Thumé, Elaine; Silveira, Denise Silva da; Facchini, Luiz Augusto

    2016-01-01

    This was a cross-sectional study within Brazil's Project for the Expansion and Consolidation of Family Health, 2005, with the objective of universal and free access to the medication prescribed in the last medical appointment for acute health problems and to estimate the degree to which access may have improved with inclusion of the medicines in prevailing policies and programs. The sample included 4,060 adults living in the area of primary health care units in 41 municipalities in South and Northeast Brazil. Access was greater in the South (83.2%) than in the Northeast (71%), and free access was similar (37%), with a greater share by the Family Health Program (FHP) when compared to the traditional model, especially in the Northeast. Some 60% of prescribed medicines and 50% of those on the National List of Essential Medicines (RENAME) were paid for. No variation was observed in the proportion of medicines present on the prevailing RENAME list and access. However, 40% of the medicines that were paid for can currently be obtained through the Popular Pharmacy Program. The latter program appears to emerge as a new way to guarantee access to medicines prescribed in the health system.

  8. Career listings.

    PubMed

    1993-02-10

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events. Listings should contain alt relevant details and be posted or faxed to Susan B/oodu'orth, Nursing Standard, Viking House, 17-19 Peterborough Road, Harrow, Middlesex HA1 2AX. Fax: 081-423 3867.

  9. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  10. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  11. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  12. 40 CFR Appendix F to Subpart A of... - Listing of Ozone-Depleting Chemicals

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 18 2014-07-01 2014-07-01 false Listing of Ozone-Depleting Chemicals F...) AIR PROGRAMS (CONTINUED) PROTECTION OF STRATOSPHERIC OZONE Production and Consumption Controls Pt. 82, Subpt. A, App. F Appendix F to Subpart A of Part 82—Listing of Ozone-Depleting Chemicals Controlled...

  13. 40 CFR Appendix F to Subpart A of... - Listing of Ozone-Depleting Chemicals

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 18 2012-07-01 2012-07-01 false Listing of Ozone-Depleting Chemicals F...) AIR PROGRAMS (CONTINUED) PROTECTION OF STRATOSPHERIC OZONE Production and Consumption Controls Pt. 82, Subpt. A, App. F Appendix F to Subpart A of Part 82—Listing of Ozone-Depleting Chemicals Controlled...

  14. 40 CFR Appendix F to Subpart A of... - Listing of Ozone-Depleting Chemicals

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 18 2013-07-01 2013-07-01 false Listing of Ozone-Depleting Chemicals F...) AIR PROGRAMS (CONTINUED) PROTECTION OF STRATOSPHERIC OZONE Production and Consumption Controls Pt. 82, Subpt. A, App. F Appendix F to Subpart A of Part 82—Listing of Ozone-Depleting Chemicals Controlled...

  15. Food Exchange List and Dietary Management of Non-Communicable Diseases in Cultural Perspective.

    PubMed

    Khan, Mahnaz Nasir; Kalsoom, Samia; Khan, Ayyaz Ali

    2017-01-01

    This review focuses at highlighting the importance of Food Exchange List in cultural perspective, as an effective dietary tool to help individuals' manage their dietary modifications in relation to non communicable diseases whilst specifying measures that can help improve the quality of Food Exchange Lists for combating various non communicable diseases and addressing adherence related issues to specialized diets. A search was done using PubMed & Google Scholar till June 2016. Search terms used were food exchange list AND disease, diet AND non-communicable diseases. We included only studies that discussed Food Exchange List (FEL) in relation to non-communicable diseases; in addition to factors like cultural relevance and adherence. Out of the 837 papers accessed 57 were identified as relevant to the Food Exchange List, out of which 39 papers were focused to the concept and development of the Food Exchange List. Only 18 discussed FEL in relation to non communicable diseases and were thus included in the review. Food exchange list is a user friendly tool for dietary modification due to disease. This tool may help to customize meals for people as it provides information regarding various food items in different groups. This tool is helpful in reducing blood & plasma glucose levels, maintaining lipid profile & effectively combating other diet related diseases & those ailments in which diet plays a significant role in maintenance & prevention from reoccurrences. However, better management and adherence to modified diets for non communicable diseases can be ensured by keeping cultural relevance under consideration before using Food Exchange Lists for such diseases.

  16. Access control violation prevention by low-cost infrared detection

    NASA Astrophysics Data System (ADS)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  17. RTO Technical Publications: A Quarterly Listing

    NASA Technical Reports Server (NTRS)

    2002-01-01

    This is a listing of recent unclassified RTO technical publications processed by the NASA Center for AeroSpace Information from Jan 1, 2002 through Mar 31, 2002. Topics covered included information management, ice accretion, digital flight control systems, supercavitation flows, and tactical decision aids.

  18. Aggregating Queries Against Large Inventories of Remotely Accessible Data

    NASA Astrophysics Data System (ADS)

    Gallagher, J. H. R.; Fulker, D. W.

    2016-12-01

    Those seeking to discover data for a specific purpose often encounter search results that are so large as to be useless without computing assistance. This situation arises, with increasing frequency, in part because repositories contain ever greater numbers of granules, and their granularities may well be poorly aligned or even orthogonal to the data-selection needs of the user. This presentation describes a recently developed service for simultaneously querying large lists of OPeNDAP-accessible granules to extract specified data. The specifications include a richly expressive set of data-selection criteria—applicable to content as well as metadata—and the service has been tested successfully against lists naming hundreds of thousands of granules. Querying such numbers of local files (i.e., granules) on a desktop or laptop computer is practical (by using a scripting language, e.g.), but this practicality is diminished when the data are remote and thus best accessed through a Web-services interface. In these cases, which are increasingly common, scripted queries can take many hours because of inherent network latencies. Furthermore, communication dropouts can add fragility to such scripts, yielding gaps in the acquired results. In contrast, OPeNDAP's new aggregated-query services enable data discovery in the context of very large inventory sizes. These capabilities have been developed for use with OPeNDAP's Hyrax server, which is an open-source realization of DAP (for "Data Access Protocol," a specification widely used in NASA, NOAA and other data-intensive contexts). These aggregated-query services exhibit good response times (on the order of seconds, not hours) even for inventories that list hundreds of thousands of source granules.

  19. AccessMRS: integrating OpenMRS with smart forms on Android.

    PubMed

    Fazen, Louis E; Chemwolo, Benjamin T; Songok, Julia J; Ruhl, Laura J; Kipkoech, Carolyne; Green, James M; Ikemeri, Justus E; Christoffersen-Deb, Astrid

    2013-01-01

    We present a new open-source Android application, AccessMRS, for interfacing with an electronic medical record system (OpenMRS) and loading 'Smart Forms' on a mobile device. AccessMRS functions as a patient-centered interface for viewing OpenMRS data; managing patient information in reminders, task lists, and previous encounters; and launching patient-specific 'Smart Forms' for electronic data collection and dissemination of health information. We present AccessMRS in the context of related software applications we developed to serve Community Health Workers, including AccessInfo, AccessAdmin, AccessMaps, and AccessForms. The specific features and design of AccessMRS are detailed in relationship to the requirements that drove development: the workflows of the Kenyan Ministry of Health Community Health Volunteers (CHVs) supported by the AMPATH Primary Health Care Program. Specifically, AccessMRS was designed to improve the quality of community-based Maternal and Child Health services delivered by CHVs in Kosirai Division. AccessMRS is currently in use by more than 80 CHVs in Kenya and undergoing formal assessment of acceptability, effectiveness, and cost.

  20. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... lists the following information: Title of Proposal: Enterprise Income Verification (EIV) System User Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  1. SITE COMPREHENSIVE LISTING (CERCLIS) (Superfund)

    EPA Pesticide Factsheets

    The Comprehensive Environmental Response, Compensation and Liability Information System (CERCLIS) (Superfund) Public Access Database contains a selected set of non-enforcement confidential information and is updated by the regions every 90 days. The data describes what has happened at Superfund sites prior to this quarter (updated quarterly). This database includes lists of involved parties (other Federal Agencies, states, and tribes), Human Exposure and Ground Water Migration, and Site Wide Ready for Reuse, Construction Completion, and Final Assessment Decision (GPRA-like measures) for fund lead sites. Other information that is included has been included only as a service to allow public evaluations utilizing this data. EPA does not have specific Data Quality Objectives for use of the data. Independent Quality Assessments may be made of this data by reviewing the Quality Assurance Action Plan (QAPP).

  2. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  3. Internet-accessed sexually transmitted infection (e-STI) testing and results service: A randomised, single-blind, controlled trial.

    PubMed

    Wilson, Emma; Free, Caroline; Morris, Tim P; Syred, Jonathan; Ahamed, Irrfan; Menon-Johansson, Anatole S; Palmer, Melissa J; Barnard, Sharmani; Rezel, Emma; Baraitser, Paula

    2017-12-01

    Internet-accessed sexually transmitted infection testing (e-STI testing) is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app), collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS) or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis) on STI testing uptake and STI cases diagnosed. The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group) or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group). Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We completed all

  4. Mindfulness and reduced cognitive reactivity to sad mood: evidence from a correlational study and a non-randomized waiting list controlled study.

    PubMed

    Raes, Filip; Dewulf, David; Van Heeringen, Cees; Williams, J Mark G

    2009-07-01

    Cognitive Reactivity (CR) refers to the degree to which a mild dysphoric state reactivates negative thinking patterns, and it has been found to play a key causal role in depressive relapse. Although Mindfulness-Based Cognitive Therapy (MBCT) directly aims to address this mechanism of CR, the relationship between mindfulness and CR has not been tested to date. Using a cross-sectional design (Study 1; n = 164) and a non-randomized waiting list controlled design (Study 2; MBCT [n = 18] vs. waiting list [n = 21]), the authors examined the relationship between naturally occurring levels of mindfulness (Study 1) and MBCT (Study 2) on the one hand, and CR on the other hand. In line with predictions, it was found that (a) trait mindfulness is significantly negatively correlated with CR, even when controlled for current depressive symptoms and prior history of depression (Study 1), and that (b) MBCT, compared to a matched control group, significantly reduces CR, and that this effect of MBCT on reduction of CR is mediated by a positive change in mindfulness skills (Study 2). Results provide first evidence for the claim that mindfulness practices in MBCT are designed to address the process of CR.

  5. 76 FR 57662 - National Oil and Hazardous Substances Pollution Contingency Plan; National Priorities List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ... and Hazardous Substances Pollution Contingency Plan; National Priorities List AGENCY: Environmental...: List of Subjects in 40 CFR Part 300 Environmental protection, Air pollution control, Chemicals... requirements, Superfund, Water pollution control, Water supply. Authority: 33 U.S.C. 1321(c)(2); 42 U.S.C. 9601...

  6. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  7. Impact of Doximity Residency Rankings on Emergency Medicine Applicant Rank Lists.

    PubMed

    Peterson, William J; Hopson, Laura R; Khandelwal, Sorabh; White, Melissa; Gallahue, Fiona E; Burkhardt, John; Rolston, Aimee M; Santen, Sally A

    2016-05-01

    This study investigates the impact of the Doximity rankings on the rank list choices made by residency applicants in emergency medicine (EM). We sent an 11-item survey by email to all students who applied to EM residency programs at four different institutions representing diverse geographical regions. Students were asked questions about their perception of Doximity rankings and how it may have impacted their rank list decisions. Response rate was 58% of 1,372 opened electronic surveys. This study found that a majority of medical students applying to residency in EM were aware of the Doximity rankings prior to submitting rank lists (67%). One-quarter of these applicants changed the number of programs and ranks of those programs when completing their rank list based on the Doximity rankings (26%). Though the absolute number of programs changed on the rank lists was small, the results demonstrate that the EM Doximity rankings impact applicant decision-making in ranking residency programs. While applicants do not find the Doximity rankings to be important compared to other factors in the application process, the Doximity rankings result in a small change in residency applicant ranking behavior. This unvalidated ranking, based principally on reputational data rather than objective outcome criteria, thus has the potential to be detrimental to students, programs, and the public. We feel it important for specialties to develop consensus around measurable training outcomes and provide freely accessible metrics for candidate education.

  8. 76 FR 57702 - National Oil and Hazardous Substances Pollution Contingency Plan National Priorities List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ... and Hazardous Substances Pollution Contingency Plan National Priorities List AGENCY: Environmental... INFORMATION: List of Subjects in 40 CFR Part 300 Environmental protection, Air pollution control, Chemicals... requirements, Superfund, Water pollution control, Water supply. Authority: 33 U.S.C. 1321(c)(2); 42 U.S.C. 9601...

  9. 76 FR 57701 - National Oil and Hazardous Substances Pollution Contingency Plan; National Priorities List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ... and Hazardous Substances Pollution Contingency Plan; National Priorities List AGENCY: Environmental... INFORMATION: List of Subjects in 40 CFR Part 300 Environmental protection, Air pollution control, Chemicals... requirements, Superfund, Water pollution control, Water supply. Authority: 33 U.S.C. 1321(c)(2); 42 U.S.C. 9601...

  10. 76 FR 57661 - National Oil and Hazardous Substances Pollution Contingency Plan; National Priorities List

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ... and Hazardous Substances Pollution Contingency Plan; National Priorities List AGENCY: Environmental... INFORMATION: List of Subjects in 40 CFR Part 300 Environmental protection, Air pollution control, Chemicals... requirements, Superfund, Water pollution control, Water supply. Authority: 33 U.S.C. 1321(c)(2); 42 U.S.C. 9601...

  11. Consolidated List of Lists

    EPA Pesticide Factsheets

    List of chemicals subject to reporting requirements under the Emergency Planning and Community Right- To-Know Act (EPCRA), Comprehensive Environmental Response, Compensation and Liability Act (CERCLA), and Section 112(r) of the Clean Air Act.

  12. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  13. Software List.

    ERIC Educational Resources Information Center

    Computers in Chemical Education Newsletter, 1984

    1984-01-01

    Lists and briefly describes computer programs recently added to those currently available from Project SERAPHIM. Program name, subject, hardware, author, supplier, and current cost are provided in separate listings for Apple, Atari, Pet, VIC-20, TRS-80, and IBM-PC. (JN)

  14. 19 CFR 19.46 - Employee lists.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN Container Stations § 19.46... container station, if the operator, within 30 calendar days after the date of receipt of a written demand by the port director, does not furnish a written list of names, addresses, social security numbers, and...

  15. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  16. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  17. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  18. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  19. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...

  20. Career listings.

    PubMed

    1994-01-12

    Nursing Standard regrets that it is no longer able to take listings over the telephone because of unprecedented demand. Readers are reminded that the listings section is for the use of charitable and professional organisations, unions and health authorities to publicise forthcoming events.