Identifying and Analyzing Federal Government Market Opportunities for OpalSoft
2004-09-01
OPPORTUNITIES, AND THREATS ( SWOT ) ANALYSIS......................................................................................13 1. Strengths...xiii LIST OF TABLES Table 1. SWOT Analysis...of industries to include Fortune 500 companies. Current key clients are Amkor, Symantec, Unisys Corporation, Apple Computers, Palm, Inc., and
Transparently Interposing User Code at the System Interface
1992-09-01
trademarks of Symantec Corporation. AFS is a trademark of Transarc Corporation. PC-cillin is a trademark of Trend Micro Devices, Incorporated. Scribe is a...communication. Finally, both the Norton AntiVirus [Symantec 91b] and PC-cillin [ Trend 90] anti-virus applications intercept destructive file operations made... Trend Micro Devices, Incorporated, 1990. [Tygar & Yee 91] J. D. Tygar, Bennet Yee. Dyad: A System for Using Physically Secure Coprocessors
Unintentional Insider Threats: A Review of Phishing and Malware Incidents by Economic Sector
2014-07-01
the conclusions in the Verizon Data Breach Report 2013 that 47% of malware was downloaded through e-mail at- tachments, 48% of hacking took place...the attackers pivoted onto other systems and databases and exfiltrated approximately 8.2 GB of data . BREACH : Accessing an employee account via a...Symantec. “Internet Security Threat Report 2014.” 2013 Trends 19 (April 2014). Symantec Cor- poration. [Verizon 2013] Verizon. 2013 Data Breach Investigations
Three Essays on Information Security Policies
ERIC Educational Resources Information Center
Yang, Yubao
2011-01-01
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
CSIRT Requirements for Situational Awareness
2014-01-25
deepsight-products http://www.symantec.com/security_response/publications/threatreport.jsp Verizon Verizon produces an annual data breach report...impact studies to the differences between malicious versus non-malicious data breaches . Ponemon also offers con- sulting services. Ponemon also
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-20
... rebates to market participants that add or remove liquidity from the Exchange (``maker/taker fees and.... (``ESI''), E*Trade Financial Corp. (``ETFC''), iShares MSCI Mexico Investable Market (``EWW''), F5...''), Southwestern Energy Co. (``SWN''), Symantec Corp. (``SYMC''), Target Corp. (``TGT''), Tiffany & Co. (``TIF...
Keeping PCs up to Date Can Be Fun
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
The "joy" of computer maintenance takes many forms. These days, automation is the byword. Operating systems such as Microsoft Windows and utility suites such as Symantec's Norton Internet Security let you automatically keep crucial parts of your computer system up to date. It's fun to watch the technology keep tabs on itself. This document offers…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-05
...,810B] Amended Certification Regarding Eligibility To Apply for Worker Adjustment Assistance; SYMANTEC Corporation, the Enterprise Product and Services Group, SSQ Engineering, VCS and VCS-One Division, Austin, TX; SYMANTEC Corporation, the Enterprise Product and Services Group, SQA Engineering, VCS and VCS-One Division...
2016-06-10
DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
.... 75,003 Velsicol Chemical, LLC, Memphis, TN December 15, 2009. True Specialties Corp., Quarles..., TX November 1, 2009. SQA Engineering, VCS and VCS-One Group. 74,810A Symantec Corporation, Mountain View, CA..... November 1, 2009. SQA Engineering, VCS and VCS-One Group. 74,810B Symantec Corporation...
ERIC Educational Resources Information Center
Primich, Tracy
1992-01-01
Discusses computer viruses that attack the Macintosh and describes Symantec AntiVirus for Macintosh (SAM), a commercial program designed to detect and eliminate viruses; sample screen displays are included. SAM is recommended for use in library settings as well as two public domain virus protection programs. (four references) (MES)
17 CFR 275.206(4)-2 - Custody of funds or securities of clients by investment advisers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of clients by investment advisers. 275.206(4)-2 Section 275.206(4)-2 Commodity and Securities... 1940 § 275.206(4)-2 Custody of funds or securities of clients by investment advisers. (a) Safekeeping... client funds or securities unless: (1) Qualified custodian. A qualified custodian maintains those funds...
ERIC Educational Resources Information Center
Romano, Vera; Fitzpatrick, Marilyn; Janzen, Jennifer
2008-01-01
This study explored J. Bowlby's (1988) secure-base hypothesis, which predicts that a client's secure attachment to the therapist, as well as the client's and the therapist's global attachment security, will facilitate in-session exploration. Volunteer clients (N = 59) and trainee counselors (N = 59) in short-term therapy completed the Experiences…
17 CFR 275.206(4)-2 - Custody of funds or securities of clients by investment advisers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of clients by investment advisers. 275.206(4)-2 Section 275.206(4)-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.206(4)-2 Custody of funds or securities of clients by investment advisers. (a) Safekeeping...
17 CFR 275.206(3)-2 - Agency cross transactions for advisory clients.
Code of Federal Regulations, 2010 CFR
2010-04-01
... advisory clients. 275.206(3)-2 Section 275.206(3)-2 Commodity and Securities Exchanges SECURITIES AND... Agency cross transactions for advisory clients. (a) An investment adviser, or a person registered as a... advisory client, if: (1) The advisory client has executed a written consent prospectively authorizing the...
17 CFR 275.206(3)-3T - Temporary rule for principal trades with certain advisory clients.
Code of Federal Regulations, 2010 CFR
2010-04-01
... trades with certain advisory clients. 275.206(3)-3T Section 275.206(3)-3T Commodity and Securities... 1940 § 275.206(3)-3T Temporary rule for principal trades with certain advisory clients. (a) An..., sells to or purchases from an advisory client any security if: (1) The investment adviser exercises no...
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
Location-assured, multifactor authentication on smartphones via LTE communication
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham
2013-05-01
With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.
Protecting clinical data on Web client computers: the PCASSO approach.
Masys, D. R.; Baker, D. B.
1998-01-01
The ubiquity and ease of use of the Web have made it an increasingly popular medium for communication of health-related information. Web interfaces to commercially available clinical information systems are now available or under development by most major vendors. To the extent that such interfaces involve the use of unprotected operating systems, they are vulnerable to security limitations of Web client software environments. The Patient Centered Access to Secure Systems Online (PCASSO) project extends the protections for person-identifiable health data on Web client computers. PCASSO uses several approaches, including physical protection of authentication information, execution containment, graphical displays, and monitoring the client system for intrusions and co-existing programs that may compromise security. PMID:9929243
WriteShield: A Pseudo Thin Client for Prevention of Information Leakage
NASA Astrophysics Data System (ADS)
Kirihata, Yasuhiro; Sameshima, Yoshiki; Onoyama, Takashi; Komoda, Norihisa
While thin-client systems are diffusing as an effective security method in enterprises and organizations, there is a new approach called pseudo thin-client system. In this system, local disks of clients are write-protected and user data is forced to save on the central file server to realize the same security effect of conventional thin-client systems. Since it takes purely the software-based simple approach, it does not require the hardware enhancement of network and servers to reduce the installation cost. However there are several problems such as no write control to external media, memory depletion possibility, and lower security because of the exceptional write permission to the system processes. In this paper, we propose WriteShield, a pseudo thin-client system which solves these issues. In this system, the local disks are write-protected with volume filter driver and it has a virtual cache mechanism to extend the memory cache size for the write protection. This paper presents design and implementation details of WriteShield. Besides we describe the security analysis and simulation evaluation of paging algorithms for virtual cache mechanism and measure the disk I/O performance to verify its feasibility in the actual environment.
Cryptonite: A Secure and Performant Data Repository on Public Clouds
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor
2012-06-29
Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using amore » StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.« less
Secure entanglement distillation for double-server blind quantum computation.
Morimae, Tomoyuki; Fujii, Keisuke
2013-07-12
Blind quantum computation is a new secure quantum computing protocol where a client, who does not have enough quantum technologies at her disposal, can delegate her quantum computation to a server, who has a fully fledged quantum computer, in such a way that the server cannot learn anything about the client's input, output, and program. If the client interacts with only a single server, the client has to have some minimum quantum power, such as the ability of emitting randomly rotated single-qubit states or the ability of measuring states. If the client interacts with two servers who share Bell pairs but cannot communicate with each other, the client can be completely classical. For such a double-server scheme, two servers have to share clean Bell pairs, and therefore the entanglement distillation is necessary in a realistic noisy environment. In this Letter, we show that it is possible to perform entanglement distillation in the double-server scheme without degrading the security of blind quantum computing.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... Workers From Sun Microsystems, Inc., Dell Computer Corp., EMC Corp., EMC Corp. Total, Cisco Systems Capital Corporation, Microsoft Corp., Symantec Corp., Xerox Corp., Vmware, Inc., Sun Microsystems Federal... known as Electronic Data Systems, including on- site leased workers from Sun Microsystems, Inc., Dell...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-15
... Workers From Sun Microsystems, Inc., Dell Computer Corp., EMC Corp., EMC Corp. Total, Cisco Systems Capital Corporation, Microsoft Corp., Symantec Corp., Xerox Corp., VMWare, Inc., Sun Microsystems Federal...-- Services, formerly known as Electronic Data Systems, including on- site leased workers from Sun...
ERIC Educational Resources Information Center
Harder, Annemiek T.; Knorth, Erik J.; Kalverboer, Margrite E.
2012-01-01
Background: Although secure residential care has the potential of reducing young people's behavioral problems, it is often difficult to achieve positive outcomes. Research suggests that there are several common success factors of treatment, of which the client's motivation for treatment and the quality of the therapeutic relationship between…
Self-efficacy is associated with increased food security in novel food pantry program.
Martin, Katie S; Colantonio, Angela G; Picho, Katherine; Boyle, Katie E
2016-12-01
We examined the effect of a novel food pantry intervention (Freshplace) that includes client-choice and motivational interviewing on self-efficacy and food security in food pantry clients. The study was designed as a randomized control trial. Participants were recruited over one year from traditional food pantries in Hartford, CT. Participants were randomized to Freshplace or traditional food pantries (controls) and data collection occurred at baseline with quarterly follow-ups for 18 months. Food security was measured using the USDA 18-item Food Security Module. A newly developed scale was utilized to measure self-efficacy. Scale reliability was measured using a Cronbach alpha test; validity was measured via correlating with a related variable. Analyses included chi-square tests for bivariate analyses and hierarchical linear modeling for longitudinal analyses. A total of 227 adults were randomized to the Freshplace intervention ( n =112) or control group ( n =115). The overall group was 60% female, 73% Black, mean age=51. The new self-efficacy scale showed good reliability and validity. Self-efficacy was significantly inversely associated with very low food security ( p <.05). Being in the Freshplace intervention ( p =.01) and higher self-efficacy ( p =.04) were independently associated with decreased very low food security. The traditional food pantry model fails to recognize the influence of self-efficacy on a person's food security. A food pantry model with client-choice, motivational interviewing and targeted referral services can increase self-efficacy of clients. Prioritizing the self-efficacy of clients over the efficiency of pantry operations is required to increase food security among disadvantaged populations.
Security Analysis of Yeh-Tsai Security Mechanism
NASA Astrophysics Data System (ADS)
Yum, Dae Hyun; Shin, Jong Hoon; Lee, Pil Joong
Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack.
Development of protected endorsement for online banking using mobile phones
NASA Astrophysics Data System (ADS)
Narayana, Galla; Venkateswarlu, Tammineni; Kumar, G. S. P.; Padmavathamma, Mokkala; Sreekanth, G.; Delhibabu, K.; Prasad, A. R.
2013-03-01
Securing Online Banking transactions for customer is the primary goal of financial institutions that provides Internet banking facility. Mobile phones play an important role in our society as more and more functions having been integrated within mobile phones, such as Internet browsing, mobile banking, and shopping. Mobiles phones can be used to secure ATM card pins by sending to the customer directly rather than in emails or by other means which has a possibility of hacking. In this paper we have proposed method of generating a Private Key Security Token by bank authentication servers which uses IMSI registers and IMEI number of client's mobile registered. The key is generated by implementing RIPE MD160 and Hex Encode Algorithm. Token received is valid only for that client mobile only and can be generated upon request by customer dynamically. The client is given a PIN and a Master Key when registered to the Online Banking Services. If in case a client's mobile is lost, authentication is done using Unique Master Key, else the Private Key Token is used there by making transactions secured and simple without the need of carrying any USB Tokens. The additional functionality provides the client more security on their transactions. Due to this Phishing attacks by the hackers is avoided.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-15
...; Symantec Corporation. 20120376 G Project Barbour Holdings Corporation; Blue Coat Systems, Inc.; Project....; Marathon Fund Limited Partnership V; RTI International Metals, Inc. 20120422 G Sigma-Aldrich Corporation; Avista Capital Partners, L.P.; Sigma-Aldrich Corporation. 01/24/2012 20120151 G Oracle Corporation; Right...
Hacker tracking Security system for HMI
NASA Astrophysics Data System (ADS)
Chauhan, Rajeev Kumar
2011-12-01
Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.
Client Personality Variables Associated with Counselor Perceptions.
ERIC Educational Resources Information Center
Livneh, Hanoch
1979-01-01
Studies the relationship between clients' personality variables and rehabilitation counselors' perception of these variables. Four client groups were created along two dimensions of personality variables: emotional security need and sexual problems. A significant relationship was found between the client's group membership and his evaluation with…
Demonstration of measurement-only blind quantum computing
NASA Astrophysics Data System (ADS)
Greganti, Chiara; Roehsner, Marie-Christine; Barz, Stefanie; Morimae, Tomoyuki; Walther, Philip
2016-01-01
Blind quantum computing allows for secure cloud networks of quasi-classical clients and a fully fledged quantum server. Recently, a new protocol has been proposed, which requires a client to perform only measurements. We demonstrate a proof-of-principle implementation of this measurement-only blind quantum computing, exploiting a photonic setup to generate four-qubit cluster states for computation and verification. Feasible technological requirements for the client and the device-independent blindness make this scheme very applicable for future secure quantum networks.
75 FR 82236 - Principal Trades with Certain Advisory Clients
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-30
... 3235-AJ96 Principal Trades with Certain Advisory Clients AGENCY: Securities and Exchange Commission... certain of their advisory clients. The amendment extends the date on which rule 206(3)- 3T will sunset... a principal capacity in transactions with certain of their advisory clients.\\1\\ In December 2009, we...
17 CFR 205.3 - Issuer as client.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Issuer as client. 205.3... ISSUER § 205.3 Issuer as client. (a) Representing an issuer. An attorney appearing and practicing before...'s clients. (b) Duty to report evidence of a material violation. (1) If an attorney, appearing and...
Security and Interdependency in a Public Cloud: A Game Theoretic Approach
2014-08-29
maximum utility can be reached (i.e., Pareto efficiency). However, the examples of perverse incentives and information inequality (where this feedback...interdependent structure. Cloud computing gives way to two types of interdependent relationships: cloud host-to- client and cloud client -to- client ... Client -to- client interdependency is much less studied than to the above-mentioned cloud host-to- client relationship. Although, it can still carry the
When nightclub security agents assault clients.
Romain-Glassey, Nathalie; Gut, Melody; Feiner, Adam-Scott; Cathieni, Federico; Hofner, Marie-Claude; Mangin, Patrice
2012-08-01
In 2006, a medico-legal consultation service devoted to adult victims of interpersonal violence was set up at the Lausanne University Hospital Centre, Switzerland: the Violence Medical Unit. Most patients are referred to the consultation by the Emergency Department. They are received by forensic nurses for support, forensic examination (in order to establish medical report) and community orientation. Between 2007 and 2009, among community violence, aggressions by security agents of nightclubs on clients have increased from 6% to 10%. Most of the victims are young men who had drunk alcohol before the assault. 25.7% presented one or several fractures, all of them in the head area. These findings raise questions about the ability of security agents of nightclubs to deal adequately with obviously risky situations and ensure client security. Copyright © 2012 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Tools for Administration of a UNIX-Based Network
NASA Technical Reports Server (NTRS)
LeClaire, Stephen; Farrar, Edward
2004-01-01
Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Privacy preserving, real-time and location secured biometrics for mCommerce authentication
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.
2011-06-01
Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.
17 CFR 275.206(4)-3 - Cash payments for client solicitations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Cash payments for client... for client solicitations. (a) It shall be unlawful for any investment adviser required to be... client at the time of the solicitation or referral; or (iii) Other than a solicitor specified in...
77 FR 76854 - Temporary Rule Regarding Principal Trades With Certain Advisory Clients
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-31
... 3235-AL28 Temporary Rule Regarding Principal Trades With Certain Advisory Clients AGENCY: Securities... transactions with certain of their advisory clients. The amendment extends the date on which rule 206(3)- 3T... releases used RIN 3235-AJ96. (See Temporary Rule Regarding Principal Trades with Certain Advisory Clients...
17 CFR 4.31 - Required delivery of Disclosure Document to prospective clients.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Disclosure Document to prospective clients. 4.31 Section 4.31 Commodity and Securities Exchanges COMMODITY... Advisors § 4.31 Required delivery of Disclosure Document to prospective clients. (a) Each commodity trading... prospective client a Disclosure Document containing the information set forth in §§ 4.34 and 4.35 for the...
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.
2012-06-01
This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.
Information-Flow-Based Access Control for Web Browsers
NASA Astrophysics Data System (ADS)
Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu
The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.
17 CFR 275.203(b)(3)-2 - Methods for counting clients in certain private funds.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Methods for counting clients....203(b)(3)-2 Methods for counting clients in certain private funds. (a) For purposes of section 203(b)(3) of the Act (15 U.S.C. 80b-3(b)(3)), you must count as clients the shareholders, limited partners...
LISA, the next generation: from a web-based application to a fat client.
Pierlet, Noëlla; Aerts, Werner; Vanautgaerden, Mark; Van den Bosch, Bart; De Deurwaerder, André; Schils, Erik; Noppe, Thomas
2008-01-01
The LISA application, developed by the University Hospitals Leuven, permits referring physicians to consult the electronic medical records of their patients over the internet in a highly secure way. We decided to completely change the way we secured the application, discard the existing web application and build a completely new application, based on the in-house developed hospital information system, used in the University Hospitals Leuven. The result is a fat Java client, running on a Windows Terminal Server, secured by a commercial SSL-VPN solution.
Mobile Assisted Security in Wireless Sensor Networks
2015-08-03
server from Google’s DNS, Chromecast and the content server does the 3-way TCP Handshake which is followed by Client Hello and Server Hello TLS messages...utilized TLS v1.2, except NTP servers and google’s DNS server. In the TLS v1.2, after handshake, client and server sends Client Hello and Server Hello ...Messages in order. In Client Hello messages, client offers a list of Cipher Suites that it supports. Each Cipher Suite defines the key exchange algorithm
How to securely replicate services
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth
1992-01-01
A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by n servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter k, at least k servers are correct and fewer than k servers are corrupt. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires fewer than k servers to be corrupt and that is live if at least k+b servers are correct, where b is the assumed maximum total number of corrupt servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service. The practicality of these schemes is illustrated through a discussion of several issues pertinent to their implementation and use, and their intended role in a secure version of the Isis system is also described.
2009-09-01
DIFFIE-HELLMAN KEY EXCHANGE .......................14 III. GHOSTNET SETUP .........................................15 A. INSTALLATION OF OPENVPN FOR...16 3. Verifying the Secure Connection ..............16 B. RUNNING OPENVPN AS A SERVER ON WINDOWS ............17 1. Creating...Generating Server and Client Keys ............20 5. Keys to Transfer to the Client ...............21 6. Configuring OpenVPN to Use Certificates
Security Risks of Cloud Computing and Its Emergence as 5th Utility Service
NASA Astrophysics Data System (ADS)
Ahmad, Mushtaq
Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.
A Low-Cost and Secure Solution for e-Commerce
NASA Astrophysics Data System (ADS)
Pasquet, Marc; Vacquez, Delphine; Rosenberger, Christophe
We present in this paper a new architecture for remote banking and e-commerce applications. The proposed solution is designed to be low cost and provides some good guarantees of security for a client and his bank issuer. Indeed, the main problem for an issuer is to identify and authenticate one client (a cardholder) using his personal computer through the web when this client wants to access to remote banking services or when he wants to pay on a e-commerce site equipped with 3D-secure payment solution. The proposed solution described in this paper is MasterCard Chip Authentication Program compliant and was experimented in the project called SOPAS. The main contribution of this system consists in the use of a smartcard with a I2C bus that pilots a terminal only equipped with a screen and a keyboard. During the use of services, the user types his PIN code on the keyboard and all the security part of the transaction is performed by the chip of the smartcard. None information of security stays on the personal computer and a dynamic token created by the card is sent to the bank and verified by the front end. We present first the defined methodology and we analyze the main security aspects of the proposed solution.
When nightclub security agents assault clients more insight through a qualitative approach.
Romain-Glassey, Nathalie; Gut, Melody; De Puy, Jacqueline; Mangin, Patrice
2014-08-01
Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff. Copyright © 2014 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.
ERIC Educational Resources Information Center
Lee, M. C.; Fung, Chun-Kan
2003-01-01
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
Diet Quality Is Low among Female Food Pantry Clients in Eastern Alabama
ERIC Educational Resources Information Center
Duffy, Patricia; Zizza, Claire; Jacoby, Jocelynn; Tayie, Francis A.
2009-01-01
Objective: Examine diet quality, food security, and obesity among female food pantry clients. Design: Cross-sectional study. Setting: A food pantry in Lee County, Alabama. Participants: Fifty-five female food pantry clients between 19 and 50 years of age. Main Outcome Measure(s): Diet quality using United States (US) Department of Agriculture…
Experimental Blind Quantum Computing for a Classical Client.
Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C; Lu, Chao-Yang; Pan, Jian-Wei
2017-08-04
To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.
Experimental Blind Quantum Computing for a Classical Client
NASA Astrophysics Data System (ADS)
Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C.; Lu, Chao-Yang; Pan, Jian-Wei
2017-08-01
To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.
VIGOR: Interactive Visual Exploration of Graph Query Results.
Pienta, Robert; Hohman, Fred; Endert, Alex; Tamersoy, Acar; Roundy, Kevin; Gates, Chris; Navathe, Shamkant; Chau, Duen Horng
2018-01-01
Finding patterns in graphs has become a vital challenge in many domains from biological systems, network security, to finance (e.g., finding money laundering rings of bankers and business owners). While there is significant interest in graph databases and querying techniques, less research has focused on helping analysts make sense of underlying patterns within a group of subgraph results. Visualizing graph query results is challenging, requiring effective summarization of a large number of subgraphs, each having potentially shared node-values, rich node features, and flexible structure across queries. We present VIGOR, a novel interactive visual analytics system, for exploring and making sense of query results. VIGOR uses multiple coordinated views, leveraging different data representations and organizations to streamline analysts sensemaking process. VIGOR contributes: (1) an exemplar-based interaction technique, where an analyst starts with a specific result and relaxes constraints to find other similar results or starts with only the structure (i.e., without node value constraints), and adds constraints to narrow in on specific results; and (2) a novel feature-aware subgraph result summarization. Through a collaboration with Symantec, we demonstrate how VIGOR helps tackle real-world problems through the discovery of security blindspots in a cybersecurity dataset with over 11,000 incidents. We also evaluate VIGOR with a within-subjects study, demonstrating VIGOR's ease of use over a leading graph database management system, and its ability to help analysts understand their results at higher speed and make fewer errors.
2014-04-01
For its efforts in data protection, the German federal government has been awarded the Cyber Award International by Symantec [Croft 2011]. Germany...about an alleged communication-monitoring partnership among the U.S. NSA, the German government —specifically the Federal Intelligence Service (BND... German corporate law does not require a whistle-blower program, it does require certain measures that, when taken with other considerations, have led to
Masys, D. R.; Baker, D. B.
1997-01-01
The Internet's World-Wide Web (WWW) provides an appealing medium for the communication of health related information due to its ease of use and growing popularity. But current technologies for communicating data between WWW clients and servers are systematically vulnerable to certain types of security threats. Prominent among these threats are "Trojan horse" programs running on client workstations, which perform some useful and known function for a user, while breaching security via background functions that are not apparent to the user. The Patient-Centered Access to Secure Systems Online (PCASSO) project of SAIC and UCSD is a research, development and evaluation project to exploit state-of-the-art security and WWW technology for health care. PCASSO is designed to provide secure access to clinical data for healthcare providers and their patients using the Internet. PCASSO will be evaluated for both safety and effectiveness, and may provide a model for secure communications via public data networks. PMID:9357644
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
Deterministic entanglement distillation for secure double-server blind quantum computation.
Sheng, Yu-Bo; Zhou, Lan
2015-01-15
Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.
Deterministic entanglement distillation for secure double-server blind quantum computation
Sheng, Yu-Bo; Zhou, Lan
2015-01-01
Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
NASA Astrophysics Data System (ADS)
Papamanthou, Charalampos; Tamassia, Roberto
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in database outsourcing, a client's database is stored and maintained by an untrusted server. Also, in simple storage systems, clients can store very large amounts of data but at the same time, they want to assure their integrity when they retrieve them. In this paper, we present a model and protocol for two-party authentication of data structures. Namely, a client outsources its data structure and verifies that the answers to the queries have not been tampered with. We provide efficient algorithms to securely outsource a skip list with logarithmic time overhead at the server and client and logarithmic communication cost, thus providing an efficient authentication primitive for outsourced data, both structured (e.g., relational databases) and semi-structured (e.g., XML documents). In our technique, the client stores only a constant amount of space, which is optimal. Our two-party authentication framework can be deployed on top of existing storage applications, thus providing an efficient authentication service. Finally, we present experimental results that demonstrate the practical efficiency and scalability of our scheme.
Campbell, Kikuko; Bond, Gary R; Drake, Robert E; McHugo, Gregory J; Xie, Haiyi
2010-08-01
Research on vocational rehabilitation for clients with severe mental illness over the past 2 decades has yielded inconsistent findings regarding client factors statistically related to employment. The present study aimed to elucidate the relationship between baseline client characteristics and competitive employment outcomes-job acquisition and total weeks worked during an 18-month follow-up-in Individual Placement and Support (IPS). Data from 4 recent randomized controlled trials of IPS were aggregated for within-group regression analyses. In the IPS sample (N = 307), work history was the only significant predictor for job acquisition, but receiving Supplemental Security Income-with or without Social Security Disability Insurance-was associated with fewer total weeks worked (2.0%-2.8% of the variance). In the comparison sample (N = 374), clients with a diagnosis of mood disorder or with less severe thought disorder symptoms were more likely to obtain competitive employment. The findings confirm that clients with severe mental illness interested in competitive work best benefit from high-fidelity supported employment regardless of their work history and sociodemographic and clinical background, and highlight the needs for changes in federal policies for disability income support and insurance regulations.
Client Attachment Status and Changes in Therapeutic Alliance Early in Treatment.
Siefert, Caleb J; Hilsenroth, Mark J
2015-01-01
Several studies have examined associations between client attachment status and therapeutic alliance. Most, however, measure alliance at a single time point only. This study is among the first to examine how client attachment relates to changes in the therapeutic alliance early in treatment. Forty-six outpatients from a university-based community clinic participated. Attachment status was assessed with the Relationship Questionnaire (Bartholomew & Horowitz, 1991) prior to beginning treatment. Participants rated therapeutic alliance after an evaluation feedback session and again early in psychotherapy. Fearful insecurity was associated with declines in therapeutic alliance, while attachment security was associated with increasing client-therapist bonds. Although unrelated to global alliance, preoccupied insecurity was associated with greater confident collaboration at both time points and declines in idealized relationship from the evaluation to the early therapy time point. Results are discussed in light of prior theoretical formulations and previous research. Limitations of the study are reviewed, implications for clinical practice are noted, and suggestions for future research are made. Assessing client attachment status can provide clinicians with information that helps them identify clients at risk for difficulties establishing a therapeutic alliance. Clients high in attachment security are more likely to develop strong bonds with therapists during the early portion of treatment. Clients high in fearful insecurity are at risk for developing weaker alliances early in treatment. Such clients appear more likely to experience declines in client-therapist bond, goal-task agreement and overall alliance early in the treatment process. Clients high in preoccupied insecurity may enter therapy with great confidence in the therapist and willing to engage in therapy but report more conflicts with therapists in the early phase of treatment. Copyright © 2014 John Wiley & Sons, Ltd.
Security Behavior Observatory: Infrastructure for Long-term Monitoring of Client Machines
2014-07-14
desired data. In Wmdows, this is most often a .NET language (e.g., C#, PowerShell), a command-line batch script, or Java . 3) Least privilege: To ensure...modules are written in Java , and thus should be easily-portable to any OS. B. Deployment There are several high-level requirements the SBO must meet...practically feasible with such solutions. Instead, one researcher with access to all the clients’ keys (stored in an isolated and secured MySQL database
Verifying the secure setup of Unix client/servers and detection of network intrusion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feingold, R.; Bruestle, H.R.; Bartoletti, T.
1995-07-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less
Thin Client Architecture: The Promise and the Problems.
ERIC Educational Resources Information Center
Machovec, George S.
1997-01-01
Describes thin clients, a networking technology that allows organizations to provide software applications over networked workstations connected to a central server. Topics include corporate settings; major advantages, including cost effectiveness and increased computer security; problems; and possible applications for large public and academic…
32 CFR Appendix B to Part 14 - Affidavit and Agreement by Civilian Defense Counsel
Code of Federal Regulations, 2010 CFR
2010-07-01
... security and intelligence purposes. I understand that any such monitoring will only take place in limited... other rights for me as counsel or for my client(s). /s/ Print Name: Address: Date: State of) County of...
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
How do Student Clients of a University-based Food Bank Cope with Food Insecurity?
Farahbakhsh, Jasmine; Ball, Geoff D C; Farmer, Anna P; Maximova, Katerina; Hanbazaza, Mahitab; Willows, Noreen D
2015-12-01
To describe the food security status, food insecurity coping strategies, characteristics, and experiences of student clients of the Campus Food Bank (CFB) at the University of Alberta in Edmonton, Alberta, Canada. A convenience sample of 58 students completed a survey from April 2013 to April 2014. Food security status was determined using the "Adult Food Security Survey Module". Ninety percent of CFB student clients who participated in this study were food insecure, which included both moderately and severely food insecure groups. The most prevalent coping strategies for food insecurity included applying for a loan or bursary (86.2%), seeking employment or working more hours (84.5%), and purchasing food using a credit card (77.6%). Participants were a diverse mix of students, including graduate students (50.0%), international students (46.6%), and caregivers of children (24.1%). The most common primary sources of income were government student loans (29.3%) and research assistantships (20.7%). Most participants (82.8%) liked the food they received from the food bank. Food insecurity is highly prevalent among student clients of this university-based food bank. Students used a variety of coping strategies to increase their disposable income, highlighting the need for additional strategies to alleviate food insecurity among vulnerable students.
2010-01-01
Symantec Server Antivirus 1 1 1 1 2 7 8 8 Service Passwords 0 10 4 4 4 10 5 5 Banner Needs 0 0 0 0 0 0 0 0 Unauthorized Software 0 1 0 1 4 1 4 1... software needed to manage and operate systems in the testing rooms. Systems in the testing rooms were made to resemble shipboard Navy systems as closely...i.e., work- station and server software , routing and switching, operating systems, and so forth). This training was also designed to provide
How to securely replicate services (preliminary version)
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth
1992-01-01
A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by 'n' servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter, k, at least k servers are correct and fewer than k servers are correct. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k is less than or = n - 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service.
Wireless Security Within Hastily Formed Networks
2006-09-01
WLAN DEVICES (STEP ONE) ............34 1. Personal Firewalls..............................................................................34 2. Anti ...includes client devices , access points, network infrastructure, network management, and delivery of mobility services to maintain network security and...Technology Special Publication 800-48, Wireless Network Security, 802.11, Bluetooth , and Handheld Devices . Available at http://csrc.nist.gov
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan
2016-11-01
Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.
Analyzing Cyber-Physical Threats on Robotic Platforms.
Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J
2018-05-21
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.
Analyzing Cyber-Physical Threats on Robotic Platforms †
2018-01-01
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-02
..., Including Workers Whose Wages Are Reported Through May and Spey Information Security Team, Chicago, IL..., applicable to workers of Acxiom Corporation, Information Security Team, Downers Grove, Illinois. The notice... clients. New information shows that the correct location of the Information Security Team was located at...
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Measurement-only verifiable blind quantum computing with quantum input verification
NASA Astrophysics Data System (ADS)
Morimae, Tomoyuki
2016-10-01
Verifiable blind quantum computing is a secure delegated quantum computing where a client with a limited quantum technology delegates her quantum computing to a server who has a universal quantum computer. The client's privacy is protected (blindness), and the correctness of the computation is verifiable by the client despite her limited quantum technology (verifiability). There are mainly two types of protocols for verifiable blind quantum computing: the protocol where the client has only to generate single-qubit states and the protocol where the client needs only the ability of single-qubit measurements. The latter is called the measurement-only verifiable blind quantum computing. If the input of the client's quantum computing is a quantum state, whose classical efficient description is not known to the client, there was no way for the measurement-only client to verify the correctness of the input. Here we introduce a protocol of measurement-only verifiable blind quantum computing where the correctness of the quantum input is also verifiable.
Secure electronic commerce communication system based on CA
NASA Astrophysics Data System (ADS)
Chen, Deyun; Zhang, Junfeng; Pei, Shujun
2001-07-01
In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.
Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine
2010-01-01
Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.
Continuous-variable quantum computing on encrypted data.
Marshall, Kevin; Jacobsen, Christian S; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L
2016-12-14
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks.
Continuous-variable quantum computing on encrypted data
Marshall, Kevin; Jacobsen, Christian S.; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L.
2016-01-01
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks. PMID:27966528
Blind Quantum Signature with Blind Quantum Computation
NASA Astrophysics Data System (ADS)
Li, Wei; Shi, Ronghua; Guo, Ying
2017-04-01
Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.
Continuous-variable quantum computing on encrypted data
NASA Astrophysics Data System (ADS)
Marshall, Kevin; Jacobsen, Christian S.; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L.
2016-12-01
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks.
NASA Technical Reports Server (NTRS)
Stanfill, D. F.
1994-01-01
Pixel Pusher is a Macintosh application used for viewing and performing minor enhancements on imagery. It will read image files in JPL's two primary image formats- VICAR and PDS - as well as the Macintosh PICT format. VICAR (NPO-18076) handles an array of image processing capabilities which may be used for a variety of applications including biomedical image processing, cartography, earth resources, and geological exploration. Pixel Pusher can also import VICAR format color lookup tables for viewing images in pseudocolor (256 colors). This program currently supports only eight bit images but will work on monitors with any number of colors. Arbitrarily large image files may be viewed in a normal Macintosh window. Color and contrast enhancement can be performed with a graphical "stretch" editor (as in contrast stretch). In addition, VICAR images may be saved as Macintosh PICT files for exporting into other Macintosh programs, and individual pixels can be queried to determine their locations and actual data values. Pixel Pusher is written in Symantec's Think C and was developed for use on a Macintosh SE30, LC, or II series computer running System Software 6.0.3 or later and 32 bit QuickDraw. Pixel Pusher will only run on a Macintosh which supports color (whether a color monitor is being used or not). The standard distribution medium for this program is a set of three 3.5 inch Macintosh format diskettes. The program price includes documentation. Pixel Pusher was developed in 1991 and is a copyrighted work with all copyright vested in NASA. Think C is a trademark of Symantec Corporation. Macintosh is a registered trademark of Apple Computer, Inc.
Multi-server blind quantum computation over collective-noise channels
NASA Astrophysics Data System (ADS)
Xiao, Min; Liu, Lin; Song, Xiuli
2018-03-01
Blind quantum computation (BQC) enables ordinary clients to securely outsource their computation task to costly quantum servers. Besides two essential properties, namely correctness and blindness, practical BQC protocols also should make clients as classical as possible and tolerate faults from nonideal quantum channel. In this paper, using logical Bell states as quantum resource, we propose multi-server BQC protocols over collective-dephasing noise channel and collective-rotation noise channel, respectively. The proposed protocols permit completely or almost classical client, meet the correctness and blindness requirements of BQC protocol, and are typically practical BQC protocols.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Narrative and attachment in the process of recovery from substance misuse.
Waters, Kathryn; Holttum, Sue; Perrin, Ines
2014-06-01
The aim of this study was to illustrate the individual accounts of a small group of substance misusers who had found psychological therapy helpful in their recovery from substance misuse. The study also aimed to highlight the roles that the psychologists played within these narratives. Narrative analysis, a qualitative design, was used to capture the unique recovery narratives of substance users who had received psychological therapy. Seven participants (three males and four females, age range 40-54 years, six White British, one White European) were recruited via clinical psychologists from an addictions psychology department and participated in 60-90 min interviews. Analysis of the recovery narratives resulted in an overarching theme; role of the psychologists as a secure attachment figure leading to the development of surrogate internal working models, and the following subthemes which developed and maintained the attachments: closeness and proximity leading to positive expectations about the relationship, safe haven leading to increasing capacities for affect regulation, secure base leading to the experience of being able to mentalize regarding ones mental states and associated actions, and separation distress leading to internalizing the psychologists. The study analysed the personal accounts of seven substance misusers regarding their use of psychological therapy in their recovery. The relationship between the therapists and the clients developed as a result of the psychologists serving as secure attachment figures, and providing closeness and proximity, a safe haven and a secure base to the clients. Clients' separation distress also led to the internalizing of the psychologists. Future studies are needed to tease out which substance user clients would most be suited to the above approach. Measures of newer more adaptive internal working models could then be applied to relationships outside of therapy to see in what way the newer, more flexible, and transferable IWMs were truly internalized and influential in the recovering minds of substance misusers. Clinical Psychologists can play a vital role in the recovery of substance misusers who are ready to work through their psychological recovery. Forming a positive therapeutic relationship is dependent on the psychologists fulfilling the role of positive attachment figures for the clients. © 2013 The British Psychological Society.
Blind quantum computing with weak coherent pulses.
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-18
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ϵ blindness for UBQC, in analogy to the concept of ϵ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ϵ-blind UBQC for any ϵ>0, even if the channel between the client and the server is arbitrarily lossy.
Blind Quantum Computing with Weak Coherent Pulses
NASA Astrophysics Data System (ADS)
Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony
2012-05-01
The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ɛ blindness for UBQC, in analogy to the concept of ɛ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ɛ-blind UBQC for any ɛ>0, even if the channel between the client and the server is arbitrarily lossy.
Case study: adapting the IAHSS curriculum in Thailand.
Goss, Richard J
2009-01-01
In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.
Attribute based encryption for secure sharing of E-health data
NASA Astrophysics Data System (ADS)
Charanya, R.; Nithya, S.; Manikandan, N.
2017-11-01
Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.
Secure Web-Site Access with Tickets and Message-Dependent Digests
Donato, David I.
2008-01-01
Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.
Nanjappa, S; Chambers, S; Marcenes, W; Richards, D; Freeman, R
2014-10-01
A theory-led narrative approach was used to unpack the complexities of the factors that enable successful client adherence following one-to-one health interventions. Understanding this could prepare the provider to anticipate different adherence behaviours by clients, allowing them to tailor their interventions to increase the likelihood of adherence. The review was done in two stages. A theoretical formulation was proposed to explore factors which influence the effectiveness of one-to-one interventions to result in client adherence. The second stage tested this theory using a narrative synthesis approach. Eleven studies across the health care arena were included in the synthesis and explored the interplay between client attachment style, client-provider interaction and client adherence with health interventions. It emerged that adherence results substantially because of the relationship that the client has with the provider, which is amplified or diminished by the client's own attachment style. This occurs because the client's attachment style shapes how they perceive and behave in relationships with the health-care providers, who become the 'secure base' from which the client accepts, assimilates and adheres with the recommended health intervention. The pathway from one-to-one interventions to adherence is explained using moderated mediation and mediated moderation models. © The Author 2014. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.
Remote monitoring and security alert based on motion detection using mobile
NASA Astrophysics Data System (ADS)
Suganya Devi, K.; Srinivasan, P.
2016-03-01
Background model does not have any robust solution and constitutes one of the main problems in surveillance systems. The aim of the paper is to provide a mobile based security to a remote monitoring system through a WAP using GSM modem. It is most designed to provide durability and versatility for a wide variety of indoor and outdoor applications. It is compatible with both narrow and band networks and provides simultaneous image detection. The communicator provides remote control, event driven recording, including pre-alarm and post-alarm and image motion detection. The web cam allowing them to be mounted either to a ceiling or wall without requiring bracket, with the use of web cam. We could continuously monitoring status in the client system through the web. If any intruder arrives in the client system, server will provide an alert to the mobile (what we are set in the message that message send to the authorized person) and the client can view the image using WAP.
NASA Technical Reports Server (NTRS)
Moore, Judith G.
1992-01-01
NMSB Movie computer program displays large sets of data (more than million individual values). Presentation dynamic, rapidly displaying sequential image "frames" in main "movie" window. Any sequence of two-dimensional sets of data scaled between 0 and 255 (1-byte resolution) displayed as movie. Time- or slice-wise progression of data illustrated. Originally written to present data from three-dimensional ultrasonic scans of damaged aerospace composite materials, illustrates data acquired by thermal-analysis systems measuring rates of heating and cooling of various materials. Developed on Macintosh IIx computer with 8-bit color display adapter and 8 megabytes of memory using Symantec Corporation's Think C, version 4.0.
Client-side Skype forensics: an overview
NASA Astrophysics Data System (ADS)
Meißner, Tina; Kröger, Knut; Creutzburg, Reiner
2013-03-01
IT security and computer forensics are important components in the information technology. In the present study, a client-side Skype forensics is performed. It is designed to explain which kind of user data are stored on a computer and which tools allow the extraction of those data for a forensic investigation. There are described both methods - a manual analysis and an analysis with (mainly) open source tools, respectively.
A Comprehensive Toolset for General-Purpose Private Computing and Outsourcing
2016-12-08
project and scientific advances made towards each of the research thrusts throughout the project duration. 1 Project Objectives Cloud computing enables...possibilities that the cloud enables is computation outsourcing, when the client can utilize any necessary computing resources for its computational task...Security considerations, however, stand on the way of harnessing the full benefits of cloud computing to the fullest extent and prevent clients from
SSO - Single-Sign-On Profile: Authentication Mechanisms Version 2.0
NASA Astrophysics Data System (ADS)
Taffoni, Giuliano; Schaaf, André; Rixon, Guy; Major, Brian; Taffoni, Giuliano
2017-05-01
Approved client-server authentication mechanisms are described for the IVOA single-sign-on profile: No Authentication; HTTP Basic Authentication; TLS with passwords; TLS with client certificates; Cookies; Open Authentication; Security Assertion Markup Language; OpenID. Normative rules are given for the implementation of these mechanisms, mainly by reference to pre-existing standards. The Authorization mechanisms are out of the scope of this document.
Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M. Barry; Lee, Brian; Stinn, John; Worthen, Katherine
2010-01-01
Objectives Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. Methods As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Results Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. Discussion This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Conclusion Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance. PMID:23569581
Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri
2014-02-01
In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.
Reliable Video Analysis Helps Security Company Grow
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meurer, Dave; Furgal, Dave; Hobson, Rick
Armed Response Team (ART) has grown to become the largest locally owned security company in New Mexico. With technical assistance from Sandia National Laboratories through the New Mexico Small Business Assistance (NMSBA) Program, ART got help so they could quickly bring workable video security solutions to market. By offering a reliable video analytic camera system, they’ve been able to reduce theft, add hundreds of clients, and increase their number of employees.
Greenberger-Horne-Zeilinger states-based blind quantum computation with entanglement concentration.
Zhang, Xiaoqian; Weng, Jian; Lu, Wei; Li, Xiaochun; Luo, Weiqi; Tan, Xiaoqing
2017-09-11
In blind quantum computation (BQC) protocol, the quantum computability of servers are complicated and powerful, while the clients are not. It is still a challenge for clients to delegate quantum computation to servers and keep the clients' inputs, outputs and algorithms private. Unfortunately, quantum channel noise is unavoidable in the practical transmission. In this paper, a novel BQC protocol based on maximally entangled Greenberger-Horne-Zeilinger (GHZ) states is proposed which doesn't need a trusted center. The protocol includes a client and two servers, where the client only needs to own quantum channels with two servers who have full-advantage quantum computers. Two servers perform entanglement concentration used to remove the noise, where the success probability can almost reach 100% in theory. But they learn nothing in the process of concentration because of the no-signaling principle, so this BQC protocol is secure and feasible.
Food insecurity and diabetes self-management among food pantry clients.
Ippolito, Matthew M; Lyles, Courtney R; Prendergast, Kimberly; Marshall, Michelle Berger; Waxman, Elaine; Seligman, Hilary Kessler
2017-01-01
To examine the association between level of food security and diabetes self-management among food pantry clients, which is largely not possible using clinic-based sampling methods. Cross-sectional descriptive study. Community-based food pantries in California, Ohio and Texas, USA, from March 2012 through March 2014. Convenience sample of adults with diabetes queuing at pantries (n 1237; 83 % response). Sampled adults were stratified as food secure, low food secure or very low food secure. We used point-of-care glycated Hb (HbA1c) testing to determine glycaemic control and captured diabetes self-management using validated survey items. The sample was 70 % female, 55 % Latino/Hispanic, 25 % white and 10 % black/African American, with a mean age of 56 years. Eighty-four per cent were food insecure, one-half of whom had very low food security. Mean HbA1c was 8·1 % and did not vary significantly by food security status. In adjusted models, very-low-food-secure participants, compared with both low-food-secure and food-secure participants, had poorer diabetes self-efficacy, greater diabetes distress, greater medication non-adherence, higher prevalence of severe hypoglycaemic episodes, higher prevalence of depressive symptoms, more medication affordability challenges, and more food and medicine or health supply trade-offs. Few studies of the health impact of food security have been able to examine very low food security. In a food pantry sample with high rates of food insecurity, we found that diabetes self-management becomes increasingly difficult as food security worsens. The efficacy of interventions to improve diabetes self-management may increase if food security is simultaneously addressed.
Daniel, Sarah Ingrid Franksdatter; Poulsen, Stig; Lunn, Susanne
2016-06-01
In the context of a randomized clinical trial of psychoanalytic psychotherapy (PPT) versus cognitive behavior therapy (CBT) for bulimia nervosa (BN), this study performed secondary analyses of (a) the relation between attachment and pretreatment symptom levels, (b) whether client pretreatment attachment moderated treatment outcome, (c) whether change in client attachment was associated with symptomatic change, and (d) whether client attachment changed differently in the 2 treatments. Sixty-nine women and 1 man of a mean age of 25.8 years diagnosed with BN were randomly assigned to either 2 years of weekly PPT or 5 months of CBT. Assessments at intake, after 5 months, and after 2 years included the Eating Disorder Examination to assess eating disorder symptoms, the Adult Attachment Interview to assess client attachment, and the Symptom Checklist 90-R to assess general psychiatric distress. Repeated measures were analyzed using multilevel analysis. Higher scores on attachment insecurity and attachment preoccupation were associated with more frequent binging pretreatment. Pretreatment attachment did not predict treatment outcome. In PPT, but not in CBT, reduction of binging was associated with an increase in attachment security. The 2 treatment types were not associated with significantly different patterns of attachment-related change. Degree and type of attachment insecurity is related to the frequency of binging in BN. Increase in attachment security may be a treatment-specific mechanism of change in PPT for BN. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Internet Roadside Cafe #6. [Videotape.
ERIC Educational Resources Information Center
American Library Association Video/Library Video Network, Towson, MD.
This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…
Efficient Cryptography for the Next Generation Secure Cloud
ERIC Educational Resources Information Center
Kupcu, Alptekin
2010-01-01
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
75 FR 1455 - Custody of Funds or Securities of Clients by Investment Advisers
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
... the internal controls relating to the custody of those assets from an independent public accountant... must obtain or receive an internal control report within six months of the effective date. Section III... securities (SIFMA(AMG) Letter), requiring an internal control report only instead of both the report and a...
DIRAC distributed secure framework
NASA Astrophysics Data System (ADS)
Casajus, A.; Graciani, R.; LHCb DIRAC Team
2010-04-01
DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.
2009-10-01
Unprivileged Client Process The unprivileged client is responsible for handling the authentication of the user’s request. Be- cause it is not yet known if...define USER_UID 1000 // The location of the empty directory to use as the root directory // for the untrusted child process . #define EMPTY_ROOT_DIR...complex object should be independent of the parts that make up the object and how they are assembled. − The construction process must allow for
Daniels, Rachael Anne; Holdsworth, Emma; Tramontano, Carlo
2017-07-29
Client engagement in substance misuse treatment programs is directly associated with positive treatment outcomes. The nature of these programs means there are often difficulties engaging and retaining clients, but authors have consistently found a strong therapeutic alliance is associated with client engagement. While research has focused on the association between the alliance and engagement, the factors that influence the therapeutic alliance have received less attention. To examine therapists' characteristics, namely therapists' stress and empathy levels, as potential predictors of client engagement and the therapeutic alliance, within an adolescent substance misuse group treatment program. The sample included 84 adolescent clients and 14 therapists from a Secure Training Centre in England. Client engagement in the treatment program was observed, while self-reporting measures assessed the therapeutic alliance (client and therapist-rated), and therapists' stress and empathy levels. Multiple regression analysis revealed that therapists' stress levels negatively influenced the therapeutic alliance and had a curvilinear relationship with client engagement, indicating that stress is not exclusively negatively related to engagement. Although stress was found to negatively impact both cognitive and affective empathy, neither cognitive nor affective empathy were significantly related to client engagement or the therapeutic alliance. This study demonstrates the importance of therapist characteristics on client engagement and the therapeutic alliance. Within practice stress can have a positive impact on clients' engagement. Nevertheless, therapists may need additional support to deal with stress effectively. Therapists' empathy may too be fundamental to client engagement, but only it if is perceived by clients.
An empirical examination of client attitudes towards online counseling.
Young, Kimberly S
2005-04-01
Trends over the past decade have shown that online counseling has grown in terms of popularity among consumers and clinicians alike; however, little, if any empirical evidence exists that examines client attitudes towards online counseling as alternative to traditional face-to-face therapy. Therefore, this study investigated client attitudes towards online counseling. Data was collected from 48 e-clients who received online counseling at the Center for Online Addiction. Variables such as client perceptions and concerns about using online counseling, clients' reasons for seeking online counseling over in-office treatment, and demographic profiles of e-clients were assessed. Results suggested that Caucasian, middle-aged males, with at least a four-year bachelors degree were most likely to use online counseling and anonymity, convenience, and counselor credentials were the most cited reasons they sought online counseling over in-office treatment. The lack of perceived privacy and security during online chat sessions and the fear of being caught while conducting online sessions were the main concerns reported by e-clients. A better understanding of client motives and perceptions towards online counseling helps to guide treatment in using the Internet as a clinical tool, especially as the Internet becomes increasingly more available in previously remote markets and the field of online counseling continues to grow.
Holmes, Jeremy
2009-09-01
This short article is a commentary on a research study investigating therapist and client attachment styles and their relationship to alliance development in a 12-week psychodynamic psychotherapy program for nonpsychotic inpatients. The relationship is complex; unsurprisingly, securely attached therapists with less distressed clients formed the strongest alliances. A significant proportion of therapists were insecure, almost entirely in the preoccupied or hyperactivating mode. It is argued that collusive relationships between such therapists and similarly overaroused clients may be common. Therapists need both to accommodate to their client's attachment style and to confound it if positive change is to result. Therapist self-scrutiny is likely to be a precondition for such positive outcomes. (PsycINFO Database Record (c) 2010 APA, all rights reserved).
Reliable Video Analysis Helps Security Company Grow
Meurer, Dave; Furgal, Dave; Hobson, Rick
2018-05-11
Armed Response Team (ART) has grown to become the largest locally owned security company in New Mexico. With technical assistance from Sandia National Laboratories through the New Mexico Small Business Assistance (NMSBA) Program, ART got help so they could quickly bring workable video security solutions to market. By offering a reliable video analytic camera system, theyâve been able to reduce theft, add hundreds of clients, and increase their number of employees.
Multi-client quantum key distribution using wavelength division multiplexing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grice, Warren P; Bennink, Ryan S; Earl, Dennis Duncan
Quantum Key Distribution (QKD) exploits the rules of quantum mechanics to generate and securely distribute a random sequence of bits to two spatially separated clients. Typically a QKD system can support only a single pair of clients at a time, and so a separate quantum link is required for every pair of users. We overcome this limitation with the design and characterization of a multi-client entangled-photon QKD system with the capacity for up to 100 clients simultaneously. The time-bin entangled QKD system includes a broadband down-conversion source with two unique features that enable the multi-user capability. First, the photons aremore » emitted across a very large portion of the telecom spectrum. Second, and more importantly, the photons are strongly correlated in their energy degree of freedom. Using standard wavelength division multiplexing (WDM) hardware, the photons can be routed to different parties on a quantum communication network, while the strong spectral correlations ensure that each client is linked only to the client receiving the conjugate wavelength. In this way, a single down-conversion source can support dozens of channels simultaneously--and to the extent that the WDM hardware can send different spectral channels to different clients, the system can support multiple client pairings. We will describe the design and characterization of the down-conversion source, as well as the client stations, which must be tunable across the emission spectrum.« less
Marmarosh, Cheri L; Kivlighan, Dennis M; Bieri, Kathryn; LaFauci Schutt, Jean M; Barone, Carrie; Choi, Jaehwa
2014-09-01
The purpose of this study was to test the notion that complementary attachments are best for achieving a secure base in psychotherapy. Specifically, we predicted third to fifth session alliance from client- and therapist-rated attachment style interactions. Using a combined sample of 46 therapy dyads from a community mental health clinic and university counseling center, the client- and therapist-perceived therapy alliance, attachment anxiety, and attachment avoidance were examined at the beginning of therapy. The results of an Actor-Partner Interdependence Model (APIM; Kenny & Cook, 1999, Partner effects in relationship research: Conceptual issues, analytic difficulties, and illustrations. Personal Relationships, 6, 433-448.) indicated that there was no direct effect of either client or therapist attachment style on therapist or client early ratings of the alliance. One significant interaction emerged and indicated that client-perceived alliance was influenced by therapist and client attachment anxiety. The client-perceived early alliance was higher when more anxious therapists worked with clients with decreasing anxiety. The client early alliance was higher when less anxious therapists worked with clients with increasing anxiety. The findings partially support the notion that different attachment configurations between the therapist and client facilitate greater alliance, but this was the case only when assessing client-perceived early alliance and only with regards to the dimension of attachment anxiety. There were no significant main effects or interactions when exploring therapist-perceived alliance. Implications of the findings are discussed along with recommendations for future study and clinical training. PsycINFO Database Record (c) 2014 APA, all rights reserved.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.
Microcredit participation and child health: results from a cross-sectional study in Peru.
Moseson, H; Hamad, R; Fernald, L
2014-12-01
Childhood malnutrition is a major consequence of poverty worldwide. Microcredit programmes-which offer small loans, financial literacy and social support to low-income individuals-are increasingly promoted as a way to improve the health of clients and their families. This study evaluates the hypothesis that longer participation in a microcredit programme is associated with improvements in the health of children of microcredit clients. Cross-sectional data were collected in February 2007 from 511 clients of a microcredit organisation in Peru and 596 of their children under 5 years of age. The primary predictor variable was length of participation in the microcredit programme. Outcome variables included height, weight, anaemia, household food security and parent-reported indicators of child health. Multivariate linear and logistic regressions assessed the association between the number of loan cycles and child health outcomes. Pathways through which microcredit may have influenced health outcomes were also explored via mediation analyses. Longer participation in microcredit was associated with greater household food security and reduced likelihood of childhood anaemia. No significant associations were observed between microcredit participation and incidence of childhood illnesses or anthropometric indicators. Increased consumption of red meat may mediate the association between the number of loan cycles and food security, but not the association with anaemia. The effects of microcredit on the health of clients' children are understudied. Exploratory findings from this analysis suggest that microcredit may positively influence child health, and that diet may play a causal role. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Secure UNIX socket-based controlling system for high-throughput protein crystallography experiments.
Gaponov, Yurii; Igarashi, Noriyuki; Hiraki, Masahiko; Sasajima, Kumiko; Matsugaki, Naohiro; Suzuki, Mamoru; Kosuge, Takashi; Wakatsuki, Soichi
2004-01-01
A control system for high-throughput protein crystallography experiments has been developed based on a multilevel secure (SSL v2/v3) UNIX socket under the Linux operating system. Main features of protein crystallography experiments (purification, crystallization, loop preparation, data collecting, data processing) are dealt with by the software. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data, that are stored in Network File Server) in a relational database (MySQL). The system consists of several servers and clients. TCP/IP secure UNIX sockets with four predefined behaviors [(a) listening to a request followed by a reply, (b) sending a request and waiting for a reply, (c) listening to a broadcast message, and (d) sending a broadcast message] support communications between all servers and clients allowing one to control experiments, view data, edit experimental conditions and perform data processing remotely. The usage of the interface software is well suited for developing well organized control software with a hierarchical structure of different software units (Gaponov et al., 1998), which will pass and receive different types of information. All communication is divided into two parts: low and top levels. Large and complicated control tasks are split into several smaller ones, which can be processed by control clients independently. For communicating with experimental equipment (beamline optical elements, robots, and specialized experimental equipment etc.), the STARS server, developed at the Photon Factory, is used (Kosuge et al., 2002). The STARS server allows any application with an open socket to be connected with any other clients that control experimental equipment. Majority of the source code is written in C/C++. GUI modules of the system were built mainly using Glade user interface builder for GTK+ and Gnome under Red Hat Linux 7.1 operating system.
Verification for measurement-only blind quantum computing
NASA Astrophysics Data System (ADS)
Morimae, Tomoyuki
2014-06-01
Blind quantum computing is a new secure quantum computing protocol where a client who does not have any sophisticated quantum technology can delegate her quantum computing to a server without leaking any privacy. It is known that a client who has only a measurement device can perform blind quantum computing [T. Morimae and K. Fujii, Phys. Rev. A 87, 050301(R) (2013), 10.1103/PhysRevA.87.050301]. It has been an open problem whether the protocol can enjoy the verification, i.e., the ability of the client to check the correctness of the computing. In this paper, we propose a protocol of verification for the measurement-only blind quantum computing.
ERIC Educational Resources Information Center
Francis, Denille M.; Kaiser, Donna; Deaver, Sarah P.
2003-01-01
Presents results of a study of the graphic indicators in drawings by patients with substance abuse disorders. The Bird's Nest Drawing, an assessment task previously devised to elicit pictorial representations of attachment security, was used to examine attachment patterns of volunteers. Results showed that those with substance abuse diagnoses were…
Security Quality Requirements Engineering (SQUARE): Case Study Phase III
2006-05-01
Security Quality Requirements Engineering (SQUARE): Case Study Phase III Lydia Chung Frank Hung Eric Hough Don Ojoko-Adams Advisor...Engineering (SQUARE): Case Study Phase III CMU/SEI-2006-SR-003 Lydia Chung Frank Hung Eric Hough Don Ojoko-Adams Advisor Nancy R. Mead...1 1.1 The SQUARE Process ............................................................................... 1 1.2 Case Study Clients
Food Insecurity, Poor Diet Quality, and Obesity among Food Pantry Participants in Hartford, CT
ERIC Educational Resources Information Center
Robaina, Kate A.; Martin, Katie S.
2013-01-01
Objective: Examine relationships between food security, diet quality, and body mass index (BMI) among food pantry users. Methods: Convenience sample of 212 food pantry clients in Hartford, CT from June, 2010 to May, 2011. Main outcomes included food security (United States Department of Agriculture module), fruit and vegetable consumption (Block…
Program Helps Decompose Complex Design Systems
NASA Technical Reports Server (NTRS)
Rogers, James L., Jr.; Hall, Laura E.
1995-01-01
DeMAID (Design Manager's Aid for Intelligent Decomposition) computer program is knowledge-based software system for ordering sequence of modules and identifying possible multilevel structure for design problems such as large platforms in outer space. Groups modular subsystems on basis of interactions among them. Saves considerable amount of money and time in total design process, particularly in new design problem in which order of modules has not been defined. Originally written for design problems, also applicable to problems containing modules (processes) that take inputs and generate outputs. Available in three machine versions: Macintosh written in Symantec's Think C 3.01, Sun, and SGI IRIS in C language.
Fehrenbacher, Anne E; Chowdhury, Debasish; Ghose, Toorjo; Swendeman, Dallas
2016-10-01
Consistent condom use (CCU) is the primary HIV/STI prevention option available to sex workers globally but may be undermined by economic insecurity, life-course vulnerabilities, behavioral factors, disempowerment, or lack of effective interventions. This study examines predictors of CCU in a random household survey of brothel-based female sex workers (n = 200) in two neighborhoods served by Durbar (the Sonagachi Project) in Kolkata, India. Multivariate logistic regression analyses indicated that CCU was significantly associated with perceived HIV risk, community mobilization participation, working more days in sex work, and higher proportion of occasional clients to regular clients. Exploratory analyses stratifying by economic insecurity indicators (i.e., debt, savings, income, housing security) indicate that perceived HIV risk and community mobilization were only associated with CCU for economically secure FSW. Interventions with FSW must prioritize economic security and access to social protections as economic insecurity may undermine the efficacy of more direct condom use intervention strategies.
Access to Network Login by Three-Factor Authentication for Effective Information Security.
Vaithyasubramanian, S; Christy, A; Saravanan, D
2016-01-01
Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.
Access to Network Login by Three-Factor Authentication for Effective Information Security
Vaithyasubramanian, S.; Christy, A.; Saravanan, D.
2016-01-01
Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security. PMID:27006976
NASA Astrophysics Data System (ADS)
Reddy, K. Rasool; Rao, Ch. Madhava
2018-04-01
Currently safety is one of the primary concerns in the transmission of images due to increasing the use of images within the industrial applications. So it's necessary to secure the image facts from unauthorized individuals. There are various strategies are investigated to secure the facts. In that encryption is certainly one of maximum distinguished method. This paper gives a sophisticated Rijndael (AES) algorithm to shield the facts from unauthorized humans. Here Exponential Key Change (EKE) concept is also introduced to exchange the key between client and server. The things are exchange in a network among client and server through a simple protocol is known as Trivial File Transfer Protocol (TFTP). This protocol is used mainly in embedded servers to transfer the data and also provide protection to the data if protection capabilities are integrated. In this paper, implementing a GUI environment for image encryption and decryption. All these experiments carried out on Linux environment the usage of Open CV-Python script.
A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools
2015-07-14
computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network
NASA Astrophysics Data System (ADS)
Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming
2017-02-01
With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.
Predicting the early therapeutic alliance in the treatment of drug misuse.
Meier, Petra S; Donmall, Michael C; Barrowclough, Christine; McElduff, Patrick; Heller, Richard F
2005-04-01
To predict the early therapeutic alliance from a range of potentially relevant factors, including clients' social relationships, motivation and psychological resources, and counsellors' professional experience and ex-user status. The study recruited 187 clients starting residential rehabilitation treatment for drug misuse in three UK services. Counsellor and client information was assessed at intake, and client and counsellor ratings of the alliance were obtained during weeks 1, 2 and 3. The intake assessment battery included scales on psychological wellbeing, treatment motivation, coping strategies and attachment style. Client and counsellor versions of the Working Alliance Inventory (WAI-S) were used for weekly alliance measurement. Hierarchical linear models were used to examine the relationship between alliance and predictor variables. Clients who had better motivation, coping strategies, social support and a secure attachment style were more likely to develop good alliances. Findings with regard to counsellor characteristics were not clear cut: clients rated their relationships with ex-user counsellors, experienced counsellors and male counsellors as better, but more experienced counsellors rated their alliances as worse. The findings offer important leads as to what interventions might improve the therapeutic alliance. Further work will need to establish whether the therapeutic alliance and ultimately treatment outcomes can be enhanced by working on improving clients' motivation and psychosocial resources.
44 CFR 7.9 - Assurances from institutions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF HOMELAND SECURITY GENERAL NONDISCRIMINATION IN FEDERALLY-ASSISTED PROGRAMS (FEMA REG. 5... admission or other treatment of individuals as students, patients, or clients of the institutions or to the...
For the sake of whom: conversation analysis of advice giving in offender counseling.
Jing-ying, Guo
2013-08-01
Regarded as beneficial and preferable to the clients, advice delivery has been an integral part of counseling; however, there are controversies over the suitability of giving advice in counseling services, including counseling conducted in the context of prisons. Based on conversation analysis, this article tries to explore when and how police counselors in two Chinese prisons give advice and how inmate clients respond to and seek advice in offender counseling. It is found that advice delivery, supposed to be for the inmate clients' sake, only serves a phatic function in the context of prisons in which security is a priority, and transforming inmates into law-abiding citizen is the overall goal of prison rehabilitation and correction. Hence, offender counselors, intending to alleviate depression and anxiety in inmate clients, are caught in a dilemma.
A Flexible Component based Access Control Architecture for OPeNDAP Services
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank
2010-05-01
Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC. These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.
Classical multiparty computation using quantum resources
NASA Astrophysics Data System (ADS)
Clementi, Marco; Pappa, Anna; Eckstein, Andreas; Walmsley, Ian A.; Kashefi, Elham; Barz, Stefanie
2017-12-01
In this work, we demonstrate a way to perform classical multiparty computing among parties with limited computational resources. Our method harnesses quantum resources to increase the computational power of the individual parties. We show how a set of clients restricted to linear classical processing are able to jointly compute a nonlinear multivariable function that lies beyond their individual capabilities. The clients are only allowed to perform classical xor gates and single-qubit gates on quantum states. We also examine the type of security that can be achieved in this limited setting. Finally, we provide a proof-of-concept implementation using photonic qubits that allows four clients to compute a specific example of a multiparty function, the pairwise and.
Zhang, P; Aungskunsiri, K; Martín-López, E; Wabnig, J; Lobino, M; Nock, R W; Munns, J; Bonneau, D; Jiang, P; Li, H W; Laing, A; Rarity, J G; Niskanen, A O; Thompson, M G; O'Brien, J L
2014-04-04
We demonstrate a client-server quantum key distribution (QKD) scheme. Large resources such as laser and detectors are situated at the server side, which is accessible via telecom fiber to a client requiring only an on-chip polarization rotator, which may be integrated into a handheld device. The detrimental effects of unstable fiber birefringence are overcome by employing the reference-frame-independent QKD protocol for polarization qubits in polarization maintaining fiber, where standard QKD protocols fail, as we show for comparison. This opens the way for quantum enhanced secure communications between companies and members of the general public equipped with handheld mobile devices, via telecom-fiber tethering.
An innovative middle tier design for protecting federal privacy act data
NASA Astrophysics Data System (ADS)
Allen, Thomas G. L.
2008-03-01
This paper identifies an innovative middle tier technique and design that provides a solid layer of network security for a single source of human resources (HR) data that falls under the Federal Privacy Act. The paper also discusses functionality for both retrieving data and updating data in a secure way. It will be shown that access to this information is limited by a security mechanism that authorizes all connections based on both application (client) and user information.
A protect solution for data security in mobile cloud storage
NASA Astrophysics Data System (ADS)
Yu, Xiaojun; Wen, Qiaoyan
2013-03-01
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.
Proof of cipher text ownership based on convergence encryption
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.
Prototype system of secure VOD
NASA Astrophysics Data System (ADS)
Minemura, Harumi; Yamaguchi, Tomohisa
1997-12-01
Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.
Role-based access control permissions
Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander
2017-04-25
Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.
Predicting Employment in the Mental Health Treatment Study: Do Client Factors Matter?
Metcalfe, Justin D; Drake, Robert E; Bond, Gary R
2017-05-01
For people with psychiatric disabilities, demographic characteristics and measures of clinical status are often used to allocate scarce employment services. This study examined a battery of potential client predictors of competitive employment, testing the hypothesis that evidence-based supported employment would mitigate the negative effects of poor work history, uncontrolled symptoms, substance abuse, and other client factors. In a secondary analysis of 2055 unemployed Social Security Disability Insurance beneficiaries with schizophrenia or affective disorders, we examined 20 baseline client factors as predictors of competitive employment. The analysis used logistic regression to identify significant client predictors and then examined interactions between significant predictors and receipt of evidence-based supported employment. Work history was a strong predictor of employment, and other client measures (fewer years on disability rolls, Hispanic ethnicity, and fewer physical health problems) were modestly predictive. Evidence-based supported employment mitigated negative client factors, including poor work history. Participants with a poor work history benefitted from supported employment even more than those with a recent work experience. Evidence-based supported employment helps people with serious mental illness, especially those with poor job histories, to obtain competitive employment. Factors commonly considered barriers to employment, such as diagnosis, substance use, hospitalization history, and misconceptions about disability benefits, often have little or no impact on competitive employment outcomes.
VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance
Watzlaf, Valerie R.; Ondich, Briana
2012-01-01
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by practitioners, health information managers, and other healthcare entities. This pilot usability study examined whether four respondents who used the top three, free consumer-based, VoIP software systems perceived these VoIP technologies to be private, secure, and HIPAA compliant; most did not. While the pilot study limitations include the number of respondents and systems assessed, the protocol can be applied to future research and replicated for instructional purposes. Recommendations are provided for VoIP companies, providers, and clients/consumers. PMID:25945194
BossPro: a biometrics-based obfuscation scheme for software protection
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham
2013-05-01
This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.
17 CFR 275.222-2 - Definition of “client” for purposes of the national de minimis standard.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Definition of âclientâ for purposes of the national de minimis standard. 275.222-2 Section 275.222-2 Commodity and Securities... 1940 § 275.222-2 Definition of “client” for purposes of the national de minimis standard. For purposes...
The Role of Food Banks in Addressing Food Insecurity: A Systematic Review.
Bazerghi, Chantelle; McKay, Fiona H; Dunn, Matthew
2016-08-01
Food banks play a major role in the food aid sector by distributing donated and purchased groceries directly to food insecure families. The public health implications of food insecurity are significant, particularly as food insecurity has a higher prevalence among certain population groups. This review consolidates current knowledge about the function and efficacy of food banks to address food insecurity. A systematic review was conducted. Thirty-five publications were reviewed, of which 14 examined food security status, 13 analysed nutritional quality of food provided, and 24 considered clients' needs in relation to food bank use. This review found that while food banks have an important role to play in providing immediate solutions to severe food deprivation, they are limited in their capacity to improve overall food security outcomes due to the limited provision of nutrient-dense foods in insufficient amounts, especially from dairy, vegetables and fruits. Food banks have the potential to improve food security outcomes when operational resources are adequate, provisions of perishable food groups are available, and client needs are identified and addressed.
Food insecurity among psychiatric patients and welfare clients in Israel.
Kaufman, Roni; Mirsky, Julia; Witztum, Eliezer; Grisaru, Nimrod
2013-01-01
Twenty-two percent of households in Israel experience food insecurity, and it is especially widespread in socio-economically distressed strata. Although their low socio-economic status renders psychiatric patients at risk for food insecurity, this issue has thus far been ignored in both practice and research. To explore food insecurity among psychiatric patients in comparison with welfare-services clients in order to raise awareness of food insecurity in this population. 114 respondents were recruited from among patients admitted to the emergency room and hospitalized in a mental health center in Beer Sheva; 555 respondents were recruited from among low-income clients of welfare service agencies in the Beer Sheva area. All respondents were surveyed with a self-report questionnaire and with the Food Security Core Survey Module (FSCSM). Forty percent of psychiatric patients and 59% of welfare-services clients reported food insecurity. The use of formal and informal support systems was lower among food-insecure psychiatric patients than among food-insecure welfare clients. Psychiatric patients appear to be a risk population for food insecurity; therefore planned interventions and specific food programs are called for.
Counterfactual quantum certificate authorization
NASA Astrophysics Data System (ADS)
Shenoy H., Akshata; Srikanth, R.; Srinivas, T.
2014-05-01
We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.
Federation for a Secure Enterprise
2016-09-10
12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
32 CFR 727.8 - Confidential and privileged character of service provided.
Code of Federal Regulations, 2010 CFR
2010-07-01
... providing the nonprivileged statistical data required by § 727.13 of this part. Protection of the... individual legal assistance client by name or any other particular, such as social security number, shall be...
32 CFR 727.8 - Confidential and privileged character of service provided.
Code of Federal Regulations, 2011 CFR
2011-07-01
... providing the nonprivileged statistical data required by § 727.13 of this part. Protection of the... individual legal assistance client by name or any other particular, such as social security number, shall be...
Proposal and Implementation of SSH Client System Using Ajax
NASA Astrophysics Data System (ADS)
Kosuda, Yusuke; Sasaki, Ryoichi
Technology called Ajax gives web applications the functionality and operability of desktop applications. In this study, we propose and implement a Secure Shell (SSH) client system using Ajax, independent of the OS or Java execution environment. In this system, SSH packets are generated on a web browser by using JavaScript and a web server works as a proxy in communication with an SSH server to realize end-to-end SSH communication. We implemented a prototype program and confirmed by experiment that it runs on several web browsers and mobile phones. This system has enabled secure SSH communication from a PC at an Internet cafe or any mobile phone. By measuring the processing performance, we verified satisfactory performance for emergency use, although the speed was unsatisfactory in some cases with mobile phone. The system proposed in this study will be effective in various fields of E-Business.
Three-party authenticated key agreements for optimal communication
Lee, Tian-Fu; Hwang, Tzonelih
2017-01-01
Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253
An Efficient Remote Authentication Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen
2017-02-01
Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.
The role of the early therapeutic alliance in predicting drug treatment dropout.
Meier, Petra S; Donmall, Michael C; McElduff, Patrick; Barrowclough, Christine; Heller, Richard F
2006-06-09
To investigate the role of the therapeutic alliance in predicting length of retention in residential drug treatment. The study recruited 187 clients starting residential rehabilitation treatment for drug misuse in three UK services. Counsellor and client information was assessed at intake, and the average total scores of client and counsellor ratings on the WAI-S (obtained during weeks 1-3) were use as the alliance measure. Length of retention and treatment completion (stay beyond 90 days) were used as measures of retention. Clients with weak counsellor rated alliances dropped out of treatment significantly sooner than clients with strong counsellor rated therapeutic alliances, whether or not the model adjusted for individual counsellor effects and potential confounders including psychological well-being, treatment motivation and readiness, coping strategies, and attachment style. The client rated alliance did not predict length of retention. Apart from the alliance, pre-treatment crack use, secure attachment style and better coping strategies were associated with shorter retention, whereas greater confidence in treatment, older client age and better education predicted treatment completion. Counsellors with greater experience of delivering drug counselling retained clients longer. The findings of this study stress the importance of treatment professionals attending to the therapeutic alliance in drug treatment, as counsellors' alliance ratings were found to be amongst the strongest predictors of dropout. Using alliance measures as clinical tools may help treatment practitioners to become aware of the risk of disengagement early on. Prospective studies are needed to evaluate whether strategies of reallocating clients with poor alliances to different counsellors lead to improvements in retention.
2011-09-01
that you did to help me through this process. Your efforts and guidance truly made this a success. To SPAWAR SCTD expert Stephanie Koontz , your...ty%20and%20Safety%20Services/05– 500%20Security%20Services/5510.36A.pdf [accessed June 19, 2011]. [28] S. Koontz . “Secret client tunneling...devices - KOV-26 talon user procedures.” Unpublished survey, SPAWAR, Point Loma, CA. [29] S. Koontz . “Secret client tunneling devices - KIV-54 user
New challenges for palliative nursing.
Aranda, Sanchia
1997-05-02
Editorials by Jeanette Webber and Libby White (IJPN 2(3)) explored threats to both the nursing profession and palliative nursing as the health system faces the reality of limited resources and expanding client needs. I wish to pick up on these issues in the light of changes proposed for palliative care in one Australian state, Victoria. My central argument is that to secure the future of palliative nursing, efforts must focus on demonstrating clearly the value and contribution of nurses to client and family outcomes. Why do I think we are challenged to do this?
SSeCloud: Using secret sharing scheme to secure keys
NASA Astrophysics Data System (ADS)
Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang
2017-08-01
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
Consequences of client-initiated workplace violence: the role of fear and perceived prevention.
Mueller, Sonja; Tschan, Franziska
2011-04-01
The authors suggested and tested a model of the consequences of client-initiated workplace violence, introducing perceived prevention of violence and perceived coping ability as factors that reduce fear of future violence and mitigate negative personal and organizational consequences. Survey data from 330 frontline staff from job centers and social security offices were analyzed using structural equation modeling. The data supported the model and confirmed the central role of the fear of violence with regard to outcomes such as psychological and physical well-being or irritability. Results point further to perceived prevention of violence as an important factor that influences fear levels in different ways, predicts turnover intentions, and should therefore be considered when managers aim to address the consequences of client-initiated violence and threats.
Elder law and Alzheimer's disease.
Overman, W H; McCormick, W A
1998-04-27
The elder-law practice focuses on the particular needs of older individuals and their families. Thus, elder law is truly "family" law because the needs of older clients are inextricably interwoven with the needs of their families. This is particularly true for the client who is chronically ill or has some form of dementia, such as Alzheimer's disease. Elder-law attorneys may now be certified to identify to the public those lawyers who demonstrate enhanced knowledge, skills, experience, and proficiency in elder law. Elder law draws from many substantive areas, such as trust, real property, agency, health care, tax, guardianship, will and probate, Social Security, Medicare, and Medicaid law. Together, the client and family are educated on legal options and are assisted in making decisions, formalized through legal documentation. The emphasis is on advance planning. Among legal practitioners, elder-law attorneys understand most clearly that the client's needs must be understood in the context of cultural and family dynamics, and addressed through a team approach involving other professions.
DeLisi, Matt; Tahja, Katherine N; Drury, Alan J; Elbert, Michael J; Caropreso, Daniel E; Heinrichs, Timothy
2018-01-01
Adult antisocial behavior is almost always predated by delinquency during childhood or adolescence; however, there is also evidence of adult-onset criminal offending. This study examined this controversial subgroup of offenders using self-reported and official data from a total population of federal correctional clients selected from the Midwestern United States. Difference of means t-tests, chi-square tests, and logistic regression models found that 11.7% of clients had an adult onset of offending and 2.7% of clients (n = 23) had an onset occurring at age 60 years or older. This group-introduced as de novo advanced adult-onset offenders-had high socioeconomic status, mixed evidence of adverse childhood experiences, and virtually no usage of drugs with the exception of alcohol. These offenders were primarily convicted of social security and white-collar crimes and evinced remarkably low psychopathology and criminal risk. More research is needed to replicate the phenomenon of de novo advanced adult-onset offending. © 2017 American Academy of Forensic Sciences.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaponov, Yu.A.; Igarashi, N.; Hiraki, M.
2004-05-12
An integrated controlling system and a unified database for high throughput protein crystallography experiments have been developed. Main features of protein crystallography experiments (purification, crystallization, crystal harvesting, data collection, data processing) were integrated into the software under development. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data that are stored in a central data server) in a MySQL relational database. The database contains four mutually linked hierarchical trees describing protein crystals, data collection of protein crystal and experimental data processing. A database editor was designed and developed. The editor supports basic database functions to view,more » create, modify and delete user records in the database. Two search engines were realized: direct search of necessary information in the database and object oriented search. The system is based on TCP/IP secure UNIX sockets with four predefined sending and receiving behaviors, which support communications between all connected servers and clients with remote control functions (creating and modifying data for experimental conditions, data acquisition, viewing experimental data, and performing data processing). Two secure login schemes were designed and developed: a direct method (using the developed Linux clients with secure connection) and an indirect method (using the secure SSL connection using secure X11 support from any operating system with X-terminal and SSH support). A part of the system has been implemented on a new MAD beam line, NW12, at the Photon Factory Advanced Ring for general user experiments.« less
Second-Order Dimensions of the Work Values Inventory (WVI).
ERIC Educational Resources Information Center
Bolton, Brian
1980-01-01
Stimulating work, interpersonal satisfaction, economic security, responsible autonomy, comfortable existence, and esthetic concerns provide a summary of clients' work motivation at a higher level of generality. They are independent of age, education, and intelligence and can be hand-scored. (Author)
Karlsson, Elin A; Liedberg, Gunilla M; Sandqvist, Jan L
2017-06-22
The Swedish Social Insurance Administration has developed a new assessment tool for sickness insurance. This study is a part of the initial evaluation of the application, called the Assessment of Work Performance, Structured Activities, and focuses on evaluation of the psychometric properties of social validity, content validity, and utility. This was a qualitative study using semi-structured telephone interviews with occupational therapists. A convenience sample was used and participants who fulfilled inclusion criteria (n = 15) were interviewed. Data were analyzed using content analysis with a directed approach. The results indicate that the application provides valuable information and that it is socially valid. Assessors found work tasks suitable for a diverse group of clients and reported that clients accepted the assessments. Improvements were suggested, for example, expanding the application with more work tasks. The instrument has benefits; however, further development is desired. The use of a constructed environment in assessments may be a necessary option to supplement a real environment. But depending on organizational factors such as time and other resources, the participants had different opportunities to do so. Further evaluations regarding ecological validity are essential to ensure that assessments are fair and realistic when using constructed environments. Implications for rehabilitation This study indicates that assessment in a constructed environment can provide a secure and protected context for clients being assessed. Psychometric evaluations are a never-ending process and this assessment instrument needs further development. However, this initial evaluation provides guidance in development of the instrument but also what studies to give priority to. It is important to evaluate social validity in order to ensure that clients and assessors perceive assessment methods fair and meaningful. In this study, participants found the work tasks appropriate and usable when assessing their clients but client's perspective must also be included in following studies. This assessment instrument is the only activity-based assessment instrument within the Swedish Social Security Insurance. Psychometric evaluations are important since it affects so many individuals in Sweden.
Cryptographically secure biometrics
NASA Astrophysics Data System (ADS)
Stoianov, A.
2010-04-01
Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.
Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.
Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian
2016-06-01
As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
NASA Astrophysics Data System (ADS)
Akiyama, Mitsuaki; Iwamura, Makoto; Kawakoya, Yuhei; Aoki, Kazufumi; Itoh, Mitsutaka
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.
The use of touch to enhance nursing care of older person in long-term mental health care facilities.
Gleeson, M; Timmins, F
2004-10-01
The self-care deficits experienced by older clients in long-term mental health settings, because of cognitive impairment, are likely to impact upon the clients' higher-order needs. The practice of nursing the elderly involves a lot of personal contact, during the delivery of fundamental physical care. While physiological and safety needs are crucial to clients in long-term settings, higher-order needs need also to be addressed. From the clients' perspective nurse's use of touch provides comfort, warmth and security, although there is a dearth of empirical evidence of these benefits. This paper explores the nurse's use of touch, the impact of touch and the experiences of touch on the older person in long-term settings. Because of the dearth of research in the use of touch with elderly clients in long-term care mental health facilities, a review of the literature was performed on the topic. This revealed that touch by nurses is frequently associated with routine tasks within nursing, and is less likely to be a caring touch intervention. Recommendations include further research on the topic and caution with widespread adoption of caring touch as an intervention.
78 FR 72932 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-04
... protections when advisers engage in principal trades. Clients of advisers will primarily use the information... information on respondents, including through the use of automated collection techniques or other forms of..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy...
Universal blind quantum computation for hybrid system
NASA Astrophysics Data System (ADS)
Huang, He-Liang; Bao, Wan-Su; Li, Tan; Li, Feng-Guang; Fu, Xiang-Qun; Zhang, Shuo; Zhang, Hai-Long; Wang, Xiang
2017-08-01
As progress on the development of building quantum computer continues to advance, first-generation practical quantum computers will be available for ordinary users in the cloud style similar to IBM's Quantum Experience nowadays. Clients can remotely access the quantum servers using some simple devices. In such a situation, it is of prime importance to keep the security of the client's information. Blind quantum computation protocols enable a client with limited quantum technology to delegate her quantum computation to a quantum server without leaking any privacy. To date, blind quantum computation has been considered only for an individual quantum system. However, practical universal quantum computer is likely to be a hybrid system. Here, we take the first step to construct a framework of blind quantum computation for the hybrid system, which provides a more feasible way for scalable blind quantum computation.
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
Efficient proof of ownership for cloud storage systems
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
Guo, Lifeng; Yau, Wei-Chuen
2015-02-01
Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.
Use of a secure Internet Web site for collaborative medical research.
Marshall, W W; Haley, R W
2000-10-11
Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160
Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas
2007-09-01
Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd
COMMUNITY-SCALE MODELING FOR AIR TOXICS AND HOMELAND SECURITY
The purpose of this task is to develop and evaluate numerical and physical modeling tools for simulating ambient concentrations of airborne substances in urban settings at spatial scales ranging from <1-10 km. Research under this task will support client needs in human exposure ...
A network monitor for HTTPS protocol based on proxy
NASA Astrophysics Data System (ADS)
Liu, Yangxin; Zhang, Lingcui; Zhou, Shuguang; Li, Fenghua
2016-10-01
With the explosive growth of harmful Internet information such as pornography, violence, and hate messages, network monitoring is essential. Traditional network monitors is based mainly on bypass monitoring. However, we can't filter network traffic using bypass monitoring. Meanwhile, only few studies focus on the network monitoring for HTTPS protocol. That is because HTTPS data is in the encrypted traffic, which makes it difficult to monitor. This paper proposes a network monitor for HTTPS protocol based on proxy. We adopt OpenSSL to establish TLS secure tunes between clients and servers. Epoll is used to handle a large number of concurrent client connections. We also adopt Knuth- Morris-Pratt string searching algorithm (or KMP algorithm) to speed up the search process. Besides, we modify request packets to reduce the risk of errors and modify response packets to improve security. Experiments show that our proxy can monitor the content of all tested HTTPS websites efficiently with little loss of network performance.
Unconditionally verifiable blind quantum computation
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph F.; Kashefi, Elham
2017-07-01
Blind quantum computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output, and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. We previously proposed [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science, Atlanta, 2009 (IEEE, Piscataway, 2009), p. 517] a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with additional functionality allowing blind computational basis measurements, which we use to construct another verifiable BQC protocol based on a different class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. This resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest-neighbor form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.
NASA Astrophysics Data System (ADS)
Roach, Colin; Carlsson, Johan; Cary, John R.; Alexander, David A.
2002-11-01
The National Transport Code Collaboration (NTCC) has developed an array of software, including a data client/server. The data server, which is written in C++, serves local data (in the ITER Profile Database format) as well as remote data (by accessing one or several MDS+ servers). The client, a web-invocable Java applet, provides a uniform, intuitive, user-friendly, graphical interface to the data server. The uniformity of the interface relieves the user from the trouble of mastering the differences between different data formats and lets him/her focus on the essentials: plotting and viewing the data. The user runs the client by visiting a web page using any Java capable Web browser. The client is automatically downloaded and run by the browser. A reference to the data server is then retrieved via the standard Web protocol (HTTP). The communication between the client and the server is then handled by the mature, industry-standard CORBA middleware. CORBA has bindings for all common languages and many high-quality implementations are available (both Open Source and commercial). The NTCC data server has been installed at the ITPA International Multi-tokamak Confinement Profile Database, which is hosted by the UKAEA at Culham Science Centre. The installation of the data server is protected by an Internet firewall. To make it accessible to clients outside the firewall some modifications of the server were required. The working version of the ITPA confinement profile database is not open to the public. Authentification of legitimate users is done utilizing built-in Java security features to demand a password to download the client. We present an overview of the NTCC data client/server and some details of how the CORBA firewall-traversal issues were resolved and how the user authentification is implemented.
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
Symmetric Key Services Markup Language (SKSML)
NASA Astrophysics Data System (ADS)
Noor, Arshad
Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.
Morel, Kenneth R
2009-11-01
In the context of forensic neuropsychological assessments, the professional interaction of law and psychology is viewed primarily as one where the retaining attorney or court dictates its needs to psychologists when resolving legal disputes. While this perspective is conceptually accurate, the positive and practical collaboration of law and psychology also relies on attorneys adhering to basic protections of sensitive psychological assessment procedures and tests. Objective testing is undermined when a practitioner of law engages in actions prior to, during, or following a neuropsychological examination in a manner that threatens the test security. An appreciation among practitioners of law and psychology regarding the necessity of test security is essential. This article reviews attorney actions that can affect test security, proposes a distinction by psychology between appropriate and problematic client preparation for a neuropsychological examination, integrates the available legal precedent regarding test security, and suggests productive measures to protect test security in medicolegal settings.
MAC layer security issues in wireless mesh networks
NASA Astrophysics Data System (ADS)
Reddy, K. Ganesh; Thilagam, P. Santhi
2016-03-01
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
Ko, Hoon; Song, MoonBae
2016-01-01
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
E-Psychology: Consumers' Attitude
NASA Astrophysics Data System (ADS)
Jordanova, Malina; Vasileva, Lidia; Rasheva, Maximka; Bojinova, Rumiana
Securing psychological supervision, consultations and help during long lasting flights is vital condition for success. That's why, knowing in details consumers (clients) attitude toward virtual psychology services is essential. Knowledge gained during nowadays studies on Earth will definitely help in the preparation for the future. The presentation focuses on results of a longitudinal survey assessing clients' attitudes toward e-psychology service. The first part of the survey was performed in spring 2006, while the second - in 2008. The study is part of an ongoing project OHN 1514/2005, funded by National Science Fund, Bulgaria. Project's strategic goal is to develop and offer a virtual high quality psychological service to people from remotes areas that have no contact with licensed psychologist. The project enables experts to communicate directly with clients and perform remote consultations, supervision, etc. The objective of this presentation is to report changes and trends in clients' attitude towards innovative virtual psychology care. Both parts of the survey involved men and women between 19 and 70 year, who defend various opinions on the application of virtual technologies for healthcare. The sample is stratifies for age, gender, education level.
Enhanced delegated computing using coherence
NASA Astrophysics Data System (ADS)
Barz, Stefanie; Dunjko, Vedran; Schlederer, Florian; Moore, Merritt; Kashefi, Elham; Walmsley, Ian A.
2016-03-01
A longstanding question is whether it is possible to delegate computational tasks securely—such that neither the computation nor the data is revealed to the server. Recently, both a classical and a quantum solution to this problem were found [C. Gentry, in Proceedings of the 41st Annual ACM Symposium on the Theory of Computing (Association for Computing Machinery, New York, 2009), pp. 167-178; A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, 2009), pp. 517-526]. Here, we study the first step towards the interplay between classical and quantum approaches and show how coherence can be used as a tool for secure delegated classical computation. We show that a client with limited computational capacity—restricted to an XOR gate—can perform universal classical computation by manipulating information carriers that may occupy superpositions of two states. Using single photonic qubits or coherent light, we experimentally implement secure delegated classical computations between an independent client and a server, which are installed in two different laboratories and separated by 50 m . The server has access to the light sources and measurement devices, whereas the client may use only a restricted set of passive optical devices to manipulate the information-carrying light beams. Thus, our work highlights how minimal quantum and classical resources can be combined and exploited for classical computing.
75 FR 742 - Temporary Rule Regarding Principal Trades With Certain Advisory Clients
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... , Office of Investment Adviser Regulation, Division of Investment Management, Securities and Exchange... the Investment Advisers Act of 1940, the interim final temporary rule that establishes an alternative means for investment advisers who are registered with the Commission as broker-dealers to meet the...
Global Situational Awareness with Free Tools
2015-01-15
Client Technical Solutions • Software Engineering Measurement and Analysis • Architecture Practices • Product Line Practice • Team Software Process...multiple data sources • Snort (Snorby on Security Onion ) • Nagios • SharePoint RSS • Flow • Others • Leverage standard data formats • Keyhole Markup Language
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
Lamagna, Jerry; Gleiser, Kari A
2007-01-01
In this paper, we introduce Intra-Relational AEDP (I-R) as an attachment-based experiential approach to trauma treatment. Integrating Accelerated Experiential Dynamic Psychotherapy (AEDP) (Fosha, 2000a,b, 2002, 2003) with ego-state methodology, intra-relational interventions specifically seeks to help clients by (1) fostering capacities for self-regulation through shared states of affective resonance between therapist, client, and dissociated self-states; (2) facilitating authentic, open internal dialogue between self-states which can alter engrained patterns of intra-psychic conflict and self-punishment; (3) developing abilities for self-reflection and emotional processing by co-mingling previously disowned affect and emotional memories with here and now experience; and (4) attending to positive affects evoked through experiences of transformation, self-compassion, and self-affirmation. Drawing from object relations and attachment theory, intra-relational interventions places particular emphasis on internal attachment relationships formed through interactions between the client's subjective selves (internal subjects) and reflective selves (internal objects). Through visual imagery, internal dialogue, and explicit relational techniques, intra-relational interventions aims to develop this subjective-reflective dyad's capacity for reciprocal attunement, resonance, and responsiveness. Such clinical strategies aim to foster healing and psychological integration between the client and heretofore disavowed aspects of self.
Self-perceptions of well-being in professional helpers and volunteers operating in war contexts.
Veronese, Guido
2013-07-01
We carried out qualitative research with 61 health professionals and volunteer workers to explore their perceptions of their own and their clients' well-being in a context of political violence. We applied content analysis to identify the themes emerging from 8 focus group and 11 individual interviews. Participants were found to define the concept of well-being in terms of three key areas: security, participation, and development. Palestinian health providers see promotion of economic development and professional growth, involvement in political and social life, and resistance to the occupation as factors required to enhance well-being and quality of life for themselves and their clients.
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2014 CFR
2014-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2011 CFR
2011-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2013 CFR
2013-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2012 CFR
2012-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
19 CFR 111.38 - False representation to procure employment.
Code of Federal Regulations, 2012 CFR
2012-04-01
... procure employment in any customs matter. In addition, a broker must not represent to a client or... 19 Customs Duties 1 2012-04-01 2012-04-01 false False representation to procure employment. 111.38 Section 111.38 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...
19 CFR 111.38 - False representation to procure employment.
Code of Federal Regulations, 2011 CFR
2011-04-01
... procure employment in any customs matter. In addition, a broker must not represent to a client or... 19 Customs Duties 1 2011-04-01 2011-04-01 false False representation to procure employment. 111.38 Section 111.38 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...
19 CFR 111.38 - False representation to procure employment.
Code of Federal Regulations, 2013 CFR
2013-04-01
... procure employment in any customs matter. In addition, a broker must not represent to a client or... 19 Customs Duties 1 2013-04-01 2013-04-01 false False representation to procure employment. 111.38 Section 111.38 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...
19 CFR 111.38 - False representation to procure employment.
Code of Federal Regulations, 2014 CFR
2014-04-01
... procure employment in any customs matter. In addition, a broker must not represent to a client or... 19 Customs Duties 1 2014-04-01 2014-04-01 false False representation to procure employment. 111.38 Section 111.38 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...
19 CFR 111.38 - False representation to procure employment.
Code of Federal Regulations, 2010 CFR
2010-04-01
... procure employment in any customs matter. In addition, a broker must not represent to a client or... 19 Customs Duties 1 2010-04-01 2010-04-01 false False representation to procure employment. 111.38 Section 111.38 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2010 CFR
2010-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
Clinical Office Safety: Strategies to Enhance the Safety of Staff and Clients
ERIC Educational Resources Information Center
Wilson, Richard M.
2012-01-01
Mental health practitioners' exposure to threats and acts of nonfatal violence are among the highest of all professions. Implementing a comprehensive workplace violence prevention program specific to the clinical setting is paramount to decreasing these risks. However, generic security recommendations at times come in conflict with the…
77 FR 59027 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-25
... investment advisory programs. These programs, which include ``wrap fee'' and ``mutual fund wrap'' programs... most mutual funds. Under wrap fee and similar programs, a client's account is typically managed on a... also must retain certain indicia of ownership of all securities and funds in the account. The...
77 FR 71458 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
...'' and ``mutual fund wrap'' programs, generally are designed to provide professional portfolio management... than the minimum account size of most mutual funds. Under wrap fee and similar programs, a client's... of ownership of all securities and funds in the account. The requirement that the sponsor (or its...
75 FR 9453 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-02
... certain investment advisory programs. These programs, which include ``wrap fee'' and ``mutual fund wrap... size of most mutual funds. Under wrap fee and similar programs, a client's account is typically managed... securities and funds in the account. The requirement that the sponsor (or its designee) obtain information...
ERIC Educational Resources Information Center
Wiggins, Rich
1993-01-01
Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…
17 CFR 1.4 - Use of electronic signatures.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Use of electronic signatures... REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.4 Use of electronic signatures. For purposes of... pool participant or a client of a commodity trading advisor, an electronic signature executed by the...
17 CFR 1.4 - Use of electronic signatures.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Use of electronic signatures... REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.4 Use of electronic signatures. For purposes of... broker, a pool participant or a client of a commodity trading advisor, an electronic signature executed...
17 CFR 1.4 - Use of electronic signatures.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Use of electronic signatures... REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.4 Use of electronic signatures. For purposes of... pool participant or a client of a commodity trading advisor, an electronic signature executed by the...
Analysis of Counterfactual Quantum Certificate Authorization
NASA Astrophysics Data System (ADS)
Wang, Tian-Yin; Li, Yan-Ping; Zhang, Rui-Ling
2016-12-01
A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89, 052307 (20)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.
Cryptographic framework for document-objects resulting from multiparty collaborative transactions.
Goh, A
2000-01-01
Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.
25 CFR 700.541 - Fraud or false statement in a Government matter.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 2 2010-04-01 2010-04-01 false Fraud or false statement in a Government matter. 700.541... RELOCATION PROCEDURES Employee Responsibility and Conduct § 700.541 Fraud or false statement in a Government..., applications for employment, personnel security forms, requests for travel reimbursement, client certification...
Food Security in Older Adults: Community Service Provider Perceptions of Their Roles
ERIC Educational Resources Information Center
Keller, Heather H.; Dwyer, John J. M.; Edwards, Vicki; Senson, Christine; Edward, H. Gayle
2007-01-01
Food insecurity in older adults is influenced by financial constraints, functional disability, and isolation. Twenty-eight social- and community-service providers participated in four focus groups to report (a) perceptions and experiences with food insecurity in their older clients, (b) beliefs about their potential role(s) in promoting food…
Alternative Fuels Data Center: Installing B20 Equipment
operations to share the fueling site with you. Secure Permits, Adhere to State Requirements The contractor is storage tanks. The contractor will register storage tanks with the state environmental agency, which must the contractor and client to ensure the completed project meets expectations. Maps & Data U.S
Universal Blind Quantum Computation
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph; Kashefi, Elham
2012-02-01
Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's inputs, outputs and computation remain private. Recently we proposed a universal unconditionally secure BQC scheme, based on the conceptual framework of the measurement-based quantum computing model, where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. Here we present a refinement of the scheme which vastly expands the class of quantum circuits which can be directly implemented as a blind computation, by introducing a new class of resource states which we term dotted-complete graph states and expanding the set of single qubit states the client is required to prepare. These two modifications significantly simplify the overall protocol and remove the previously present restriction that only nearest-neighbor circuits could be implemented as blind computations directly. As an added benefit, the refined protocol admits a substantially more intuitive and simplified verification mechanism, allowing the correctness of a blind computation to be verified with arbitrarily small probability of error.
Food insecurity in Canadian adults receiving diabetes care.
Galesloot, Suzanne; McIntyre, Lynn; Fenton, Tanis; Tyminski, Sheila
2012-01-01
The prevalence of adult-level household food insecurity was examined among clients receiving outpatient diabetes health care services. Participants were adults diagnosed with diabetes mellitus, who attended individual counselling sessions at Calgary's main clinic from January to April 2010. Clinicians were trained to administer the Household Food Security Survey Module (HFSSM), and did so with clients' assent during their scheduled sessions. The prevalence of adult-level household food insecurity among 314 respondents was 15.0% (95% confidence interval [CI], 11.2 to 19.4); 6.7% (95% CI, 4.2 to 10.0) of clinic attendees were categorized as severely food insecure. The comparable rates obtained in Alberta in 2007 using the same instrument (HFSSM) were 5.6% and 1.2%, respectively. Household food insecurity rates among individuals with diabetes in active care are higher than rates reported in Canadian population surveys. Severe food insecurity, indicating reduced food intake and disrupted eating patterns, may affect this population's ability to follow a pattern of healthy eating necessary for effective diabetes management. This study reinforces the importance of assessing clients' inability to access food because of financial constraints, and indicates that screening with a validated measure may facilitate identification of clients at risk.
An Efficient Authenticated Key Transfer Scheme in Client-Server Networks
NASA Astrophysics Data System (ADS)
Shi, Runhua; Zhang, Shun
2017-10-01
In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.
75 FR 49233 - Amendments to Form ADV
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-12
...The Securities and Exchange Commission is adopting amendments to Part 2 of Form ADV, and related rules under the Investment Advisers Act, to require investment advisers registered with us to provide new and prospective clients with a brochure and brochure supplements written in plain English. These amendments are designed to provide new and prospective advisory clients with clearly written, meaningful, current disclosure of the business practices, conflicts of interest and background of the investment adviser and its advisory personnel. Advisers must file their brochures with us electronically and we will make them available to the public through our Web site. The Commission also is withdrawing the Advisers Act rule requiring advisers to disclose certain disciplinary and financial information.
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
Next Generation Space Surveillance System-of-Systems
NASA Astrophysics Data System (ADS)
McShane, B.
2014-09-01
International economic and military dependence on space assets is pervasive and ever-growing in an environment that is now congested, contested, and competitive. There are a number of natural and man-made risks that need to be monitored and characterized to protect and preserve the space environment and the assets within it. Unfortunately, today's space surveillance network (SSN) has gaps in coverage, is not resilient, and has a growing number of objects that get lost. Risks can be efficiently and effectively mitigated, gaps closed, resiliency improved, and performance increased within a next generation space surveillance network implemented as a system-of-systems with modern information architectures and analytic techniques. This also includes consideration for the newest SSN sensors (e.g. Space Fence) which are born Net-Centric out-of-the-box and able to seamlessly interface with the JSpOC Mission System, global information grid, and future unanticipated users. Significant opportunity exists to integrate legacy, traditional, and non-traditional sensors into a larger space system-of-systems (including command and control centers) for multiple clients through low cost sustainment, modification, and modernization efforts. Clients include operations centers (e.g. JSpOC, USSTRATCOM, CANSPOC), Intelligence centers (e.g. NASIC), space surveillance sensor sites (e.g. AMOS, GEODSS), international governments (e.g. Germany, UK), space agencies (e.g. NASA), and academic institutions. Each has differing priorities, networks, data needs, timeliness, security, accuracy requirements and formats. Enabling processes and technologies include: Standardized and type accredited methods for secure connections to multiple networks, machine-to-machine interfaces for near real-time data sharing and tip-and-queue activities, common data models for analytical processing across multiple radar and optical sensor types, an efficient way to automatically translate between differing client and sensor formats, data warehouse of time based space events, secure collaboration tools for international coalition space operations, shared concept-of-operations, tactics, techniques, and procedures.
In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions
NASA Astrophysics Data System (ADS)
Chen, Jie; Huang, Yan
In the process of realization Internet-based visualization system of the protein molecules, system needs to allow users to use the system to observe the molecular structure of the local computer, that is, customers can generate the three-dimensional graphics from PDB file on the client computer. This requires Applet access to local file, related to the Applet security restrictions question. In this paper include two realization methods: 1.Use such as signature tools, key management tools and Policy Editor tools provided by the JDK to digital signature and authentication for Java Applet, breakthrough certain security restrictions in the browser. 2. Through the use of Servlet agent implement indirect access data methods, breakthrough the traditional Java Virtual Machine sandbox model restriction of Applet ability. The two ways can break through the Applet's security restrictions, but each has its own strengths.
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks
NASA Astrophysics Data System (ADS)
Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.
Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.
Flexible software architecture for user-interface and machine control in laboratory automation.
Arutunian, E B; Meldrum, D R; Friedman, N A; Moody, S E
1998-10-01
We describe a modular, layered software architecture for automated laboratory instruments. The design consists of a sophisticated user interface, a machine controller and multiple individual hardware subsystems, each interacting through a client-server architecture built entirely on top of open Internet standards. In our implementation, the user-interface components are built as Java applets that are downloaded from a server integrated into the machine controller. The user-interface client can thereby provide laboratory personnel with a familiar environment for experiment design through a standard World Wide Web browser. Data management and security are seamlessly integrated at the machine-controller layer using QNX, a real-time operating system. This layer also controls hardware subsystems through a second client-server interface. This architecture has proven flexible and relatively easy to implement and allows users to operate laboratory automation instruments remotely through an Internet connection. The software architecture was implemented and demonstrated on the Acapella, an automated fluid-sample-processing system that is under development at the University of Washington.
Bio-inspired diversity for increasing attacker workload
NASA Astrophysics Data System (ADS)
Kuhn, Stephen
2014-05-01
Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
Attacks on Bluetooth Security Architecture and Its Countermeasures
NASA Astrophysics Data System (ADS)
Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif
WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-26
... clients to utilize wireless connectivity and obtain the lower latency transmission of data from third... Wireless Connectivity September 20, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of... data feeds via wireless connectivity. The text of the proposed rule change is available on the Exchange...
17 CFR 275.206(4)-2 - Custody of funds or securities of clients by investment advisers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Director of the Office of Compliance Inspections and Examinations; and (iii) Upon resignation or dismissal... an elected manager of the limited liability company; or (v) A person is presumed to control a trust... in customer accounts; (iii) A futures commission merchant registered under section 4f(a) of the...
ERIC Educational Resources Information Center
Nadworny, M. J.; And Others
From a comparative economic viewpoint, does regular employment secured through temporary subsidized Special Work training afford the publicly supported individual any marginal advantage over his welfare status? A study of 279 Aid to Needy Families with Children (ANFC) recipients was conducted to address this question. The median annual dollar…
South Carolina's SC LENDS: Optimizing Libraries, Transforming Lending
ERIC Educational Resources Information Center
Hamby, Rogan; McBride, Ray; Lundberg, Maria
2011-01-01
Since SC LENDS started operating in June 2009, more public libraries have come on board. All of this on the back end connects to a Mozilla-based staff client that has distributions for Mac OS X and Microsoft Windows, using SSL encryption to keep communications secure and private between remote libraries and the servers hosted at a high-end…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dykstra, D.; Blomer, J.
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFSmore » and Frontier.« less
1996-01-01
The American Nurses Association (ANA) is committed to safeguarding the public, protecting and advancing the careers of professional nurses, supporting individual and collective efforts by registered nurses to protect their clients and enhancing the professional development and job security of registered nurses. As the nation's health care system is restructured, ANA is actively engaged in initiatives to strengthen the economic and general welfare of registered nurses, the safety and care for the public, and, in partnership with the state nurses associations (SNAs), oppose efforts to replace registered nurses with inappropriate substitutes.
NASA Astrophysics Data System (ADS)
Gallagher, J. H. R.; Potter, N.; Evans, B. J. K.
2016-12-01
OPeNDAP, in conjunction with the Australian National University, documented the installation process needed to add authentication to OPeNDAP-enabled data servers (Hyrax, TDS, etc.) and examined 13 OPeNDAP clients to determine how best to add authentication using LDAP, Shibboleth and OAuth2 (we used NASA's URS). We settled on a server configuration (architecture) that uses the Apache web server and a collection of open-source modules to perform the authentication and authorization actions. This is not the only way to accomplish those goals, but using Apache represents a good balance between functionality, leveraging existing work that has been well vetted and includes support for a wide variety of web services, include those that depend on a servlet engine such as tomcat (which both Hyrax and TDS do). Or work shows how LDAP, OAuth2 and Shibboleth can all be accommodated using this readily available software stack. Also important is that the Apache software is very widely used and is fairly robust - extremely important for security software components. In order to make use of a server requiring authentication, clients must support the authentication process. Because HTTP has included authentication for well over a decade, and because HTTP/HTTPS can be used by simply linking programs with a library, both the LDAP and OAuth2/URS authentication schemes have almost universal support within the OPeNDAP client base. The clients, i.e. the HTTP client libraries they employ, understand how to submit the credentials to the correct server when confronted by an HTTP/S Unauthorized (401) response. Interestingly OAuth2 can achieve it's SSO objectives while relying entirely on normative HTTP transport. All 13 of the clients examined worked.The situation with Shibboleth is different. While Shibboleth does use HTTP, it also requires the client to either scrape a web page or support the SAML2.0 ECP profile, which, for programmatic clients, means using SOAP messages. Since working with SOAP is outside the scope of HTTP, support for Shibboleth must be added explicitly into the client software. Some of the potential burden of enabling OPeNDAP clients to work with Shibboleth may be mitigated by getting both NetCDF-C and NetCDF-Java libraries to use the Shibboleth ECP profile. If done, this would get 9 of the 13 clients we examined working.
Demonstration of blind quantum computing.
Barz, Stefanie; Kashefi, Elham; Broadbent, Anne; Fitzsimons, Joseph F; Zeilinger, Anton; Walther, Philip
2012-01-20
Quantum computers, besides offering substantial computational speedups, are also expected to preserve the privacy of a computation. We present an experimental demonstration of blind quantum computing in which the input, computation, and output all remain unknown to the computer. We exploit the conceptual framework of measurement-based quantum computation that enables a client to delegate a computation to a quantum server. Various blind delegated computations, including one- and two-qubit gates and the Deutsch and Grover quantum algorithms, are demonstrated. The client only needs to be able to prepare and transmit individual photonic qubits. Our demonstration is crucial for unconditionally secure quantum cloud computing and might become a key ingredient for real-life applications, especially when considering the challenges of making powerful quantum computers widely available.
Globus Identity, Access, and Data Management: Platform Services for Collaborative Science
NASA Astrophysics Data System (ADS)
Ananthakrishnan, R.; Foster, I.; Wagner, R.
2016-12-01
Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.
1995-10-06
Viatical Benefits, a viatical settlement company in Fort Lauderdale, FL, is reportedly under investigation by the Securities and Exchange Commission (SEC) for using high-pressure sales tactics to sell policies to investors. The SEC has declined comment, and Egbert Jaeger, the president of Viatical Benefits, has denied any investigation. This investigation follows a preliminary injunction filed by a Federal judge against Life Partners Inc. of Waco, TX, in August. The SEC claimed that Life Partners repackaged life insurance contracts as securities for investors, in violation of Federal securities laws. Viatical settlements enable persons with HIV to sell their life insurance policies at a discount, providing clients with sixty to eighty percent of the face value in cash to use for living expenses. Viatical settlement companies usually act as brokers in the sale of the policies.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.
Ghanti, Shaila; Naik, G M
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System
Ghanti, Shaila
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350
Enterprise Considerations for Ports and Protocols
2016-10-21
selected communications. These protocols are restricted to specific ports or addresses in the receiving web service. HTTPS is familiarly restricted...in use by the web services and applications that are connected to the network are required for interoperability and security. Policies specify the...network or reside at the end-points (i.e., web services or clients). ____________________________ Manuscript received June 1, 2016; revised July
ERIC Educational Resources Information Center
Technology & Learning, 2008
2008-01-01
When it comes to IT, there has always been an important link between data center control and client flexibility. As computing power increases, so do the potentially crippling threats to security, productivity and financial stability. This article talks about Dell's On-Demand Desktop Streaming solution which is designed to centralize complete…
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System
NASA Astrophysics Data System (ADS)
Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won
2009-12-01
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.
NASA Astrophysics Data System (ADS)
Licari, Daniele; Calzolari, Federico
2011-12-01
In this paper we introduce a new way to deal with Grid portals referring to our implementation. L-GRID is a light portal to access the EGEE/EGI Grid infrastructure via Web, allowing users to submit their jobs from a common Web browser in a few minutes, without any knowledge about the Grid infrastructure. It provides the control over the complete lifecycle of a Grid Job, from its submission and status monitoring, to the output retrieval. The system, implemented as client-server architecture, is based on the Globus Grid middleware. The client side application is based on a java applet; the server relies on a Globus User Interface. There is no need of user registration on the server side, and the user needs only his own X.509 personal certificate. The system is user-friendly, secure (it uses SSL protocol, mechanism for dynamic delegation and identity creation in public key infrastructures), highly customizable, open source, and easy to install. The X.509 personal certificate does not get out from the local machine. It allows to reduce the time spent for the job submission, granting at the same time a higher efficiency and a better security level in proxy delegation and management.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Walker, Jennifer L; Holben, David H; Kropf, Mary L; Holcomb, John P; Anderson, Heidi
2007-11-01
Food insecurity has been negatively associated with social capital (a measure of perceived social trust and community reciprocity) and health status. Yet, these factors have not been studied extensively among women from households participating in the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the WIC Farmers' Market Nutrition Program. A cross-sectional, self-administered, mailed survey was conducted in Athens County, Ohio, to examine the household food security status, social capital, and self-rated health status of women from households receiving WIC benefits alone (n=170) and those from households receiving both WIC and Farmers' Market Nutrition Program benefits (n=65), as well as the relationship of food security, social capital, and self-rated health status. Household food security and perceived health status were not significantly different between groups; however, high social capital was greater (chi(2)=8.156, P=0.004) among WIC, compared to WIC/Farmers' Market Nutrition Program group respondents. Overall, household food insecurity was inversely associated with perceived health status (r=-0.229, P=0.001) and social capital (r=0.337, P<0.001). Enabling networking among clients, leading to client-facilitated programs and projects, and developing programs that strengthen social capital, including community-based mentoring programs and nutrition education programs that are linked to community-based activities, are needed, as is additional research to verify these findings.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Securing the anonymity of content providers in the World Wide Web
NASA Astrophysics Data System (ADS)
Demuth, Thomas; Rieke, Andreas
1999-04-01
Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.
A Federated Digital Identity Management Approach for Business Processes
NASA Astrophysics Data System (ADS)
Bertino, Elisa; Ferrini, Rodolfo; Musci, Andrea; Paci, Federica; Steuer, Kevin J.
Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.
Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database
NASA Astrophysics Data System (ADS)
Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin
2014-06-01
The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.
Modular architectures for quantum networks
NASA Astrophysics Data System (ADS)
Pirker, A.; Wallnöfer, J.; Dür, W.
2018-05-01
We consider the problem of generating multipartite entangled states in a quantum network upon request. We follow a top-down approach, where the required entanglement is initially present in the network in form of network states shared between network devices, and then manipulated in such a way that the desired target state is generated. This minimizes generation times, and allows for network structures that are in principle independent of physical links. We present a modular and flexible architecture, where a multi-layer network consists of devices of varying complexity, including quantum network routers, switches and clients, that share certain resource states. We concentrate on the generation of graph states among clients, which are resources for numerous distributed quantum tasks. We assume minimal functionality for clients, i.e. they do not participate in the complex and distributed generation process of the target state. We present architectures based on shared multipartite entangled Greenberger–Horne–Zeilinger states of different size, and fully connected decorated graph states, respectively. We compare the features of these architectures to an approach that is based on bipartite entanglement, and identify advantages of the multipartite approach in terms of memory requirements and complexity of state manipulation. The architectures can handle parallel requests, and are designed in such a way that the network state can be dynamically extended if new clients or devices join the network. For generation or dynamical extension of the network states, we propose a quantum network configuration protocol, where entanglement purification is used to establish high fidelity states. The latter also allows one to show that the entanglement generated among clients is private, i.e. the network is secure.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lurie, Gordon
2007-01-02
The cell phone software allows any Java enabled cell phone to view sensor and meteorological data via an internet connection using a secure connection to the CB-EMIS Web Service. Users with appropriate privileges can monitor the state of the sensors and perform simple maintenance tasks remotely. All sensitive data is downloaded from the web service, thus protecting sensitive data in the event a cell phone is lost.
ERIC Educational Resources Information Center
Adebiaye, Richmond
2010-01-01
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
U.S. Security-Related Agreements in Force Since 1955: Introducing a New Database
2014-01-01
necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving...PAF), a division of the RAND Corporation, is the U.S. Air Force’s federally funded research and development center for studies and analyses. PAF...33 Additional Applications of the Treaty and Agreement Database ........................................................... 35 Summary
Salkever, David
2013-02-01
A recent policy analysis argued that expanding access to evidence-based supported employment can provide savings in major components of social costs. This article extends the scope of this policy analysis by placing the argument within a recently developed economic framework for social cost-effectiveness analysis that defines a program's social cost impact as its effect on net consumption of all goods and services. A total of 27 studies over the past two decades are reviewed to synthesize evidence of the social cost impacts of expanding access to the individual placement and support model of supported employment (IPS-SE). Most studies have focused primarily on agency costs of providing IPS-SE services, cost offsets when clients shift from "traditional" rehabilitation to IPS-SE, and impacts on clients' earnings. Because costs and cost offsets are similar in magnitude, incremental costs of expanding services to persons who would otherwise receive traditional services are probably small or even negative. The population served by an expansion could be sizable, but the feasibility of a policy targeting IPS-SE expansion in this way has yet to be demonstrated. IPS-SE has positive impacts on competitive job earnings, but these may not fully translate into social cost offsets. Additional empirical support is needed for the argument that large-scale expansion would yield substantial mental health treatment cost offsets. Other gaps in evidence of policy impacts include take-up rate estimates, cost impact estimates from longer-term studies (exceeding two years), and longer-term studies of whether IPS-SE prevents younger clients from becoming recipients of Supplemental Security Income or Social Security Disability Insurance
PCASSO: a design for secure communication of personal health information via the internet.
Baker, D B; Masys, D R
1999-05-01
The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.
Visual identification system for homeland security and law enforcement support
NASA Astrophysics Data System (ADS)
Samuel, Todd J.; Edwards, Don; Knopf, Michael
2005-05-01
This paper describes the basic configuration for a visual identification system (VIS) for Homeland Security and law enforcement support. Security and law enforcement systems with an integrated VIS will accurately and rapidly provide identification of vehicles or containers that have entered, exited or passed through a specific monitoring location. The VIS system stores all images and makes them available for recall for approximately one week. Images of alarming vehicles will be archived indefinitely as part of the alarming vehicle"s or cargo container"s record. Depending on user needs, the digital imaging information will be provided electronically to the individual inspectors, supervisors, and/or control center at the customer"s office. The key components of the VIS are the high-resolution cameras that capture images of vehicles, lights, presence sensors, image cataloging software, and image recognition software. In addition to the cameras, the physical integration and network communications of the VIS components with the balance of the security system and client must be ensured.
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
A transmission security framework for email-based telemedicine.
Caffery, Liam J; Smith, Anthony C
2010-01-01
Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in conjunction with ordinary email and secure hypertext transfer protocol (HTTPS) used by secure web-mail applications. Both of these approaches have advantages and disadvantages in terms of viability, cost, usability and compliance. The aim of this study was develop an instrument to identify the most appropriate means of encrypting email communication for telemedicine. A multi-method approach was used to construct the instrument. Technical assessment and existing bodies of knowledge regarding the utility of PKI were analyzed, along with survey results from users of Queensland Health's Child and Youth Mental Health Service secure web-mail service. The resultant decision support model identified that the following conditions affect the choice of encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption, email-client used by correspondents, the tolerance to human error and the availability of technical resources. A decision support model is presented as a flow chart to identify the most appropriate encryption for a specific email-based telemedicine service.
NASA Astrophysics Data System (ADS)
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
2017-10-01
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
A Design of a Surgical Site Verification System.
Shen, Biyu; He, Yan; Chen, Haoyang
2017-01-01
Patient security is a significant issue in medical research and clinical practice at present. The Surgical Verification System (Patent Number: ZL 201420079273.5) is designed to recognize and check surgical sites of patients so as to ensure operation security and decrease the risk for practitioners. Composition: (1) Operating Room Server, (2) Label Reader, (3) E-Label, (4) Surgical Site Display, (5) Ward Client, (6) Label Rader-Writer, and (7) Acousto-Optic Alarm. If the Surgical identification, the surgical site, and so on are incorrect, a flashing label control will appear when the alarm rings. You can specify a sound to play for the alarm, a picture to draw, and a message to send. It is a user-friendly system.
Access Control of Web and Java Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan
2011-01-01
Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.
Analysis of Disaster Preparedness Planning Measures in DoD Computer Facilities
1993-09-01
city, stae, aod ZP code) 10 Source of Funding Numbers SProgram Element No lProject No ITask No lWork Unit Accesion I 11 Title include security...Computer Disaster Recovery .... 13 a. PC and LAN Lessons Learned . . ..... 13 2. Distributed Architectures . . . .. . 14 3. Backups...amount of expense, but no client problems." (Leeke, 1993, p. 8) 2. Distributed Architectures The majority of operations that were disrupted by the
Network Science Research Laboratory (NSRL) Telemetry Warehouse
2016-06-01
Functionality and architecture of the NSRL Telemetry Warehouse are also described as well as the web interface, data structure, security aspects, and...Experiment Controller 6 4.5 Telemetry Sensors 7 4.6 Custom Data Processing Nodes 7 5. Web Interface 8 6. Data Structure 8 6.1 Measurements 8...telemetry in comma-separated value (CSV) format from the web interface or via custom applications developed by researchers using the client application
Phoenix: Service Oriented Architecture for Information Management - Abstract Architecture Document
2011-09-01
implementation logic and policy if and which Information Brokering and Repository Services the information is going to be forwarded to. These service chains...descriptions are going to be retrieved. Raised Exceptions: • Exception getConsumers(sessionTrack : SessionTrack, information : Information...that exetnd the usefullness of the IM system as a whole. • Client • Event Notification • Filter • Information Discovery • Security • Service
The Military Applications of Cloud Computing Technologies
2013-05-23
tactical networks will potentially cause some unique issues when implementing the JIE. Tactical networks are temporary in nature , and are utilized...connected ABCS clients will receive software updates and security patches as they are published over the network , rather than catching up after an extended...approach from the previous JNN network model, in that it introduces a limited, wireless capability to a unit’s LAN that will enable limited, on-the
Rep. Hall, John J. [D-NY-19
2010-06-28
Senate - 07/13/2010 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
2009-03-01
the Distrustful Decomposition pattern: • a number of separate programs, each running in a separate process . For more complete sepa- ration, each...be used in place of fork(). For example, under various versions of Windows, the CreateProcess() func- tion is used to spawn a child process . Figure...list contains the SIDs of the client processes that are allowed to connect to the server, that is, the Windows service. For more information about
Integrating Webtop Components with Thin-Client Web Applicators using WDK Tickets
NASA Technical Reports Server (NTRS)
Duley, Jason
2004-01-01
Contents include the folloving: Issues surrounding encryption/decryption of password strings when deploying on different machines and platforms. Security concerns when exposing docbases to internet users. Docbase Session management in Java Servlets. Customization of Webtop components. WDK Tickets as a silent login alternative. Encoding Tickets and Ticket syntax. Invoking Webtop components via an Action URL. Issues with accessing Webtop components on Mac OS X through SSL.
Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade
NASA Astrophysics Data System (ADS)
Graça, S.; Santos, J.; Manso, M. E.
2004-10-01
The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.
Neither aider nor abettor be: attorneys become prosecutorial targets for federal healthcare crimes.
Schmidt, M M
1999-01-01
Attorneys representing healthcare entities are not immune to federal criminal prosecution for the assistance that they give their clients. This Article focuses on potential attorney liability for aiding and abetting a client's violation of law. The author examines the securities, tax, and white-collar crime fields for guidance regarding the interpretation and application of the federal aiding and abetting statute to attorneys practicing in the health law field. Based on these analogous areas, and upon the federal criminal statutes applicable in the healthcare field, he recommends steps that can be taken to minimize the possibility of aiding and abetting liability. In addition, he recommends that the courts require a prosecutorial showing of both actual knowledge of wrong-doing and wrongful intent before imposing aider and abettor liability upon health law practitioners.
Technical Considerations in Remote LIMS Access via the World Wide Web
Schlabach, David M.
2005-01-01
The increased dependency on the World Wide Web by both laboratories and their customers has led LIMS developers to take advantage of thin-client web applications that provide both remote data entry and manipulation, along with remote reporting functionality. Use of an LIMS through a web browser allows a person to interact with a distant application, providing both remote administration and real-time analytical result delivery from virtually anywhere in the world. While there are many benefits of web-based LIMS applications, some concern must be given to these new methods of system architecture before justifying them as a suitable replacement for their traditional client-server systems. Developers and consumers alike must consider the security aspects of introducing a wide area network capable system into a production environment, as well as the concerns of data integrity and usability. PMID:18924736
Recommendations for a service framework to access astronomical archives
NASA Technical Reports Server (NTRS)
Travisano, J. J.; Pollizzi, J.
1992-01-01
There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.
Is this the right time to come out? Case study.
Williamson, A D; Woods, J D; Conley, J M; O'Barr, W M; Losey, M R; Colbert, C; Wofford, J; McNamara, E
1993-01-01
In this fictional case study, Adam Lawson is a promising young associate at Kirkham McDowell Securities, a St. Louis underwriting and financial advisory firm. Recently, Adam helped to bring in an extremely lucrative deal, and soon he and a few other associates will be honored for their efforts at the firm's silver anniversary dinner. George Campbell, vice president in mergers and acquisitions, is caught unprepared when Adam tells him that, after serious reflection, he has decided to bring his partner, Robert Collins, to the banquet. George is one of Adam's biggest supporters at the firm, and he personally has no problem with Adam being gay. But it is one thing for Adam to come out of the closet at the office. It is quite another to do so at a public company-client event. After all, Kirkham McDowell's client roster includes some very conservative companies--one of the country's largest defense contractors, for example. George is concerned with how Adam's openness about his sexual orientation will play with their clients and, as a result, how senior management will react. Adam has not come to George for permission to bring Robert to the dinner. But clearly Adam wants some sort of response. George has never faced sexual diversity issues in the workplace before, and there is no company policy to guide him. Just how negative an effect could Robert have on Adam's career with the firm and the firm's relationship with its clients? Isn't it possible that even the firm's most conservative clients will simply decide that Adam's choice of guest is a personal matter--not a business one?(ABSTRACT TRUNCATED AT 250 WORDS)
Towards the cyber security paradigm of ehealth: Resilience and design aspects
NASA Astrophysics Data System (ADS)
Rajamäki, Jyri; Pirinen, Rauno
2017-06-01
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.
Food security in older adults: community service provider perceptions of their roles.
Keller, Heather H; Dwyer, John J M; Edwards, Vicki; Senson, Christine; Gayle Edward, H
2007-01-01
Food insecurity in older adults is influenced by financial constraints, functional disability, and isolation. Twenty-eight social- and community-service providers participated in four focus groups to report (a) perceptions and experiences with food insecurity in their older clients, (b) beliefs about their potential role(s) in promoting food security, and (c) opinions about constraints that influenced these roles. A constant comparison analysis identified key themes. The formal caregivers reported six roles for improving food security: (a) monitoring, (b) coordination, and (c) promoting services, (d) education, (e) advocacy, and (f) providing a social environment. The final theme summarizes these roles as "the need for personalization of service". Social and community service providers are involved in roles that can promote the health of older adults by addressing their food insecurity. Social service providers need to be acknowledged and supported in this health promotion role.
Brewer, Jeffrey L; Taber-Doughty, Teresa; Kubik, Sara
2010-01-01
We investigated the perceptions of people about the safety, security and privacy of a telecare monitoring system for adults with developmental disabilities living in residential settings. The telecare system was used by remote caregivers overnight, when staff were not present in the homes. We surveyed 127 people from different stakeholder groups in the state of Indiana. The people surveyed included those with knowledge or experience of telecare, and those without. The stakeholders were clients, their advocates, service provider administrators and independent case coordinators. The responses in each category for every group were positive except one: only 4 of the 11 telecare case coordinators agreed that the telecare system provided a secure environment. Overall, the telecare system was perceived to be as safe, secure and private as the conventional alternative of having staff in the home.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
A radiology department intranet: development and applications.
Willing, S J; Berland, L L
1999-01-01
An intranet is a "private Internet" that uses the protocols of the World Wide Web to share information resources within a company or with the company's business partners and clients. The hardware requirements for an intranet begin with a dedicated Web server permanently connected to the departmental network. The heart of a Web server is the hypertext transfer protocol (HTTP) service, which receives a page request from a client's browser and transmits the page back to the client. Although knowledge of hypertext markup language (HTML) is not essential for authoring a Web page, a working familiarity with HTML is useful, as is knowledge of programming and database management. Security can be ensured by using scripts to write information in hidden fields or by means of "cookies." Interfacing databases and database management systems with the Web server and conforming the user interface to HTML syntax can be achieved by means of the common gateway interface (CGI), Active Server Pages (ASP), or other methods. An intranet in a radiology department could include the following types of content: on-call schedules, work schedules and a calendar, a personnel directory, resident resources, memorandums and discussion groups, software for a radiology information system, and databases.
Currell, Siobhan; Christodoulides, Thomas; Siitarinen, Jonna; Dudley, Robert
2016-07-01
Randomized controlled trials have established that cognitive behavioural therapy (CBT) is effective in helping people with psychosis, though there is enormous variability in outcome. It is not clear what patient factors contribute to good outcomes. In fact, most studies considering client factors have excluded people with psychosis. It is clinicians who are deciding who is likely to benefit from CBT for psychosis (CBTp), though little is understood in terms of their views on who benefits from CBTp. This study investigated clinicians' views on client characteristics that influence outcome in CBTp. A Q-set of 61 client characteristics was developed from a literature search and interviews with clinicians experienced in working with CBT and/or psychosis. Twenty-one participants (familiar with psychosis and CBT through education, profession, practice or knowledge) rated the items based on their importance in effecting a positive outcome, on a forced normal distribution. 21 completed Q-sorts yielded four factors, named as: acceptance and application of the cognitive model; attending to the present; secure base; meaningful active collaboration. Items regarding therapeutic alliance were highly endorsed throughout all factors. Some empirically-based items were not endorsed, although overall, clinician responses were consistent with prior research.
Sears, Clinton; Andersson, Zach; Cann, Meredith
2016-01-01
ABSTRACT Background: Supporting the diverse needs of people living with HIV (PLHIV) can help reduce the individual and structural barriers they face in adhering to antiretroviral treatment (ART). The Livelihoods and Food Security Technical Assistance II (LIFT) project sought to improve adherence in Malawi by establishing 2 referral systems linking community-based economic strengthening and livelihoods services to clinical health facilities. One referral system in Balaka district, started in October 2013, connected clients to more than 20 types of services while the other simplified approach in Kasungu and Lilongwe districts, started in July 2014, connected PLHIV attending HIV and nutrition support facilities directly to community savings groups. Methods: From June to July 2015, LIFT visited referral sites in Balaka, Kasungu, and Lilongwe districts to collect qualitative data on referral utility, the perceived association of referrals with client and household health and vulnerability, and the added value of the referral system as perceived by network member providers. We interviewed a random sample of 152 adult clients (60 from Balaka, 57 from Kasungu, and 35 from Lilongwe) who had completed their referral. We also conducted 2 focus group discussions per district with network providers. Findings: Clients in all 3 districts indicated their ability to save money had improved after receiving a referral, although the percentage was higher among clients in the simplified Kasungu and Lilongwe model than the more complex Balaka model (85.6% vs. 56.0%, respectively). Nearly 70% of all clients interviewed had HIV infection; 72.7% of PLHIV in Balaka and 95.7% of PLHIV in Kasungu and Lilongwe credited referrals for helping them stay on their ART. After the referral, 76.0% of clients in Balaka and 92.3% of clients in Kasungu and Lilongwe indicated they would be willing to spend their savings on health costs. The more diverse referral network and use of an mHealth app to manage data in Balaka hindered provider uptake of the system, while the simpler system in Kasungu and Lilongwe, which included only 2 referral options and use of a paper-based referral tool, seemed simpler for the providers to manage. Conclusions: Participation in the referral systems was perceived positively by clients and providers in both models, but more so in Kasungu and Lilongwe where the referral process was simpler. Future referral networks should consider limiting the number of service options included in the network and simplify referral tools to the extent possible to facilitate uptake among network providers. PMID:28031300
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era
NASA Astrophysics Data System (ADS)
Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr
2018-05-01
The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
A Paradox-based data collection and management system for multi-center randomized clinical trials.
Abdellatif, Mazen; Reda, Domenic J
2004-02-01
We have developed a Paradox-based data collection and management system for large-scale multi-site randomized clinical trials. The system runs under Windows operating system and integrates Symantec pcAnywhere32 telecommunications software for data transmission and remote control sessions, PKZIP utility for the compression/decompression of transmitted data, and Stat/Transfer for exporting the centralized Paradox database for analyses. We initially developed this system for VA Cooperative Study #399 'The Effect of Antiarrhythmic Therapy in Maintaining Stability of Sinus Rhythm in Atrial Fibrillation', which collects over 1000 variables on 706 patients at 20 sites. Patient intake for this 5-year study began in March of 1998. We have also developed an enhanced version of this system, which is being used in the NIH-funded 'Glucosamine/Chondroitin Arthritis Intervention Trial (GAIT)' that collects over 1200 variables on 1588 patients at 13 sites. Patient intake for this 4-year study began in October of 2000.
Patterns of health service utilization at a medical school clinic in Ghana.
Yawson, A E; Malm, K L; Adu, A A; Wontumi, G-M; Biritwum, R B
2012-09-01
The University of Ghana Medical School (UGMS) Clinic provides healthcare service which is free at point of service to students, staff, retired staff and dependents of staff of the College of Health Sciences. However, since 1983, no in-depth review of health service provision or utilization has been undertaken. This study reviewed client characteristics, utilization and disease patterns at the clinic and also compared the disease patterns to that of other primary health facilities nationwide. This was an analytical cross-sectional study undertaken at the UGMS clinic in Korle-Bu. It was a retrospective review of records of all clients attending the facility from January 2002 to December, 2004. More males than females attended the clinic and majority (63.9%) of clients were between 15-44 years (median age was 26 years). Dependents of staff constituted the highest attendants (41%) to the clinic. Among staff, junior staffs were in the majority. Malaria, respiratory tract infection and musculoskeletal pain were the most common conditions seen. Overall, 83% of clients were treated and discharged per visit without the need for review visits. Dependents of staff used the facility the most and they live in many different part of the city of Accra, and to ask them to attend the clinic for care is not efficient. It will be better to provide or supplement their securing of insurance so that they could access health care close to their homes and save time and attention to students and staff.
Supporting Secure, AD HOC Joins for Tactical Networks
2002-05-07
ftp.isi.edu/in-notes/ rfc2501.txt (20SEP01). [4] Deitel , Harvery M. and Paul J. Deitel . Java: How to Program 3rd Edition. (Prentice Hall: New...produce a complete product, to include the construction of TTNT hardware. The TTNT program is concerned with frequency hopping schemes, error correcting...Configuration To create the digital certificates needed for the client authentication, we modified a hybrid file encryption program that used a Rivest-Shamir
Working Around the Military: Challenges to Military Spouse Employment and Education
2004-01-01
POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE The RAND...failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 2004 2. REPORT TYPE 3...RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. © Copyright 2004 RAND
Air Force Civil Engineer, Volume 14, Number 2, 2006
2006-01-01
homes located off base), reimburs - able service agreements are created between the housing development’s project owner and both the Air Force...Just as with security, fire protection is provided by the on-base fire department on a reimbursable basis. At a recent fire at Hanscom AFB, Mass... reimbursable clients; and programming functions. Input of this “living record” allows the database to manage the 5-Year Plan so 16 AIR FORCE CIVIL
Environmental Requirements for Authentication Protocols
2002-01-01
Engineering for Informa- tion Security, March 2001. 10. D. Chaum . Blind signatures for untraceable payments. In Advances in Cryptology{ Proceedings of...the connection, the idea relies on a concept similar to blinding in the sense of Chaum [10], who used it e ectively in the design of anonymous payment...digital signature on the key and a nonce provided by the server, in which the client’s challenge response was independent of the type of cipher
Housing outcomes and predictors of success: the role of hospitalization in street outreach.
Lettner, B H; Doan, R J; Miettinen, A W
2016-03-01
What is known on the subject? Outreach services are often successful in engaging and housing street homeless individuals. People experiencing homelessness have greatly increased rates of mental illness and substance abuse. What this paper adds to existing knowledge? Given the relative lack of research involving street homeless individuals, this retrospective chart review examined factors associated with successful housing by a multidisciplinary street outreach team, including the use of hospitalization as an intervention within a housing first framework. The majority of clients were successfully housed by the end of outreach team involvement. An admission to hospital was strongly associated with successful housing for those with a psychotic disorder. What are the implications for practice? Multidisciplinary outreach teams, specifically those with psychiatric and nursing support, successfully work with and house people experiencing street homelessness and psychosis. Mental health nurses embedded in the community are an essential link between inpatient and outpatient care for highly vulnerable street homeless individuals. Introduction Housing-first strategies have helped establish housing as a human right. However, endemic homelessness persists. Multidisciplinary outreach teams that include nursing, social and psychiatric services allow for integrative strategies to engage and support clients on their housing trajectory. The following retrospective review focused on the identification of demographic, clinical, and service characteristics that predicted the obtainment of housing, and explored the role of psychiatric hospitalization as an intervention, not an outcome measure, in contrast to previous studies. These have rarely focused on street homelessness. A retrospective chart review of 85 homeless, primarily rough-sleeping, clients was conducted to determine housing outcomes and the factors associated with obtaining housing through care provided by a psychiatric street outreach team in Toronto, Canada. Demographics, homelessness duration, diagnosis, hospitalization and housing status were tracked during team involvement. Overall, 46% (36/79) were housed during the study term. Securing housing at the end of treatment/data collection was significantly enhanced by hospitalization (OR = 9.04, 95% CI [2.43, 33.59]). It was significantly diminished by psychosis (OR = 0.22, 95% CI [0.05, 0.95]) and prior homelessness >36 months (OR = 0.10, 95% CI [0.02, 0.50]). Twenty-three of 31 (74%) hospitalized clients with psychosis were subsequently housed, compared to 4 of 30 (13%) not hospitalized (Fisher's exact, P < .001). Multidisciplinary street outreach teams successfully house long-standing homeless clients (>12 months without a permanent address) with serious mental illness and/or substance abuse. Hospitalization can be utilized as a complimentary intervention, particularly for those with psychosis, in the continuum of housing first initiatives, and can contribute to securing housing for those with persistent psychotic disorders. Implications for nursing practice Community mental health nurses are uniquely positioned to translate care between hospital and community settings, ensuring timely assessment, intervention and treatment of clients who are historically difficult to engage. © 2016 John Wiley & Sons Ltd.
GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application
NASA Technical Reports Server (NTRS)
McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.
2010-01-01
The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.
Job Satisfaction: Insights from Home Support Care Workers in Three Canadian Jurisdictions.
Panagiotoglou, Dimitra; Fancey, Pamela; Keefe, Janice; Martin-Matthews, Anne
2017-03-01
This mixed-methods study identified the personal and workplace characteristics that drive the job satisfaction of home support workers (HSWs) providing assistance to elderly clients. Data were based on a standardized measure of job satisfaction, along with in-depth qualitative interviews with 176 home support workers from three Canadian provincial jurisdictions (British Columbia, n = 108; Ontario, n = 28; Nova Scotia, n = 40). We anticipated that variability in demographic profiles between the three groups of workers and different job descriptions would be associated with differences in perceived job satisfaction. This was not the case. Results from the qualitative analysis highlight key areas that contributed to job satisfaction. These are job (scheduling, travel, and safety), economic (income security), and organizational (communication, support, and respect) factors. Given these findings, we recommend improvements to workplace communication, increased travel time allowance between clients, and wage parity with equivalent positions in long-term care facilities.
Privacy enabling technology for video surveillance
NASA Astrophysics Data System (ADS)
Dufaux, Frédéric; Ouaret, Mourad; Abdeljaoued, Yousri; Navarro, Alfonso; Vergnenègre, Fabrice; Ebrahimi, Touradj
2006-05-01
In this paper, we address the problem privacy in video surveillance. We propose an efficient solution based on transformdomain scrambling of regions of interest in a video sequence. More specifically, the sign of selected transform coefficients is flipped during encoding. We address more specifically the case of Motion JPEG 2000. Simulation results show that the technique can be successfully applied to conceal information in regions of interest in the scene while providing with a good level of security. Furthermore, the scrambling is flexible and allows adjusting the amount of distortion introduced. This is achieved with a small impact on coding performance and negligible computational complexity increase. In the proposed video surveillance system, heterogeneous clients can remotely access the system through the Internet or 2G/3G mobile phone network. Thanks to the inherently scalable Motion JPEG 2000 codestream, the server is able to adapt the resolution and bandwidth of the delivered video depending on the usage environment of the client.
Koutelakis, George V.; Anastassopoulos, George K.; Lymberopoulos, Dimitrios K.
2012-01-01
Multiprotocol medical imaging communication through the Internet is more flexible than the tight DICOM transfers. This paper introduces a modular multiprotocol teleradiology architecture that integrates DICOM and common Internet services (based on web, FTP, and E-mail) into a unique operational domain. The extended WADO service (a web extension of DICOM) and the other proposed services allow access to all levels of the DICOM information hierarchy as opposed to solely Object level. A lightweight client site is considered adequate, because the server site of the architecture provides clients with service interfaces through the web as well as invulnerable space for temporary storage, called as User Domains, so that users fulfill their applications' tasks. The proposed teleradiology architecture is pilot implemented using mainly Java-based technologies and is evaluated by engineers in collaboration with doctors. The new architecture ensures flexibility in access, user mobility, and enhanced data security. PMID:22489237
Registered File Support for Critical Operations Files at (Space Infrared Telescope Facility) SIRTF
NASA Technical Reports Server (NTRS)
Turek, G.; Handley, Tom; Jacobson, J.; Rector, J.
2001-01-01
The SIRTF Science Center's (SSC) Science Operations System (SOS) has to contend with nearly one hundred critical operations files via comprehensive file management services. The management is accomplished via the registered file system (otherwise known as TFS) which manages these files in a registered file repository composed of a virtual file system accessible via a TFS server and a file registration database. The TFS server provides controlled, reliable, and secure file transfer and storage by registering all file transactions and meta-data in the file registration database. An API is provided for application programs to communicate with TFS servers and the repository. A command line client implementing this API has been developed as a client tool. This paper describes the architecture, current implementation, but more importantly, the evolution of these services based on evolving community use cases and emerging information system technology.
Implementation of the Web-based laboratory
NASA Astrophysics Data System (ADS)
Ying, Liu; Li, Xunbo
2005-12-01
With the rapid developments of Internet technologies, remote access and control via Internet is becoming a reality. A realization of the web-based laboratory (the W-LAB) was presented. The main target of the W-LAB was to allow users to easily access and conduct experiments via the Internet. While realizing the remote communication, a system, which adopted the double client-server architecture, was introduced. It ensures the system better security and higher functionality. The experimental environment implemented in the W-Lab was integrated by both virtual lab and remote lab. The embedded technology in the W-LAB system as an economical and efficient way to build the distributed infrastructural network was introduced. Furthermore, by introducing the user authentication mechanism in the system, it effectively secures the remote communication.
Service-Oriented Architecture for NVO and TeraGrid Computing
NASA Technical Reports Server (NTRS)
Jacob, Joseph; Miller, Craig; Williams, Roy; Steenberg, Conrad; Graham, Matthew
2008-01-01
The National Virtual Observatory (NVO) Extensible Secure Scalable Service Infrastructure (NESSSI) is a Web service architecture and software framework that enables Web-based astronomical data publishing and processing on grid computers such as the National Science Foundation's TeraGrid. Characteristics of this architecture include the following: (1) Services are created, managed, and upgraded by their developers, who are trusted users of computing platforms on which the services are deployed. (2) Service jobs can be initiated by means of Java or Python client programs run on a command line or with Web portals. (3) Access is granted within a graduated security scheme in which the size of a job that can be initiated depends on the level of authentication of the user.
Holmes, Jeremy
2017-08-01
Developmental research on resilience is summarised and illustrated with a case example. Self-reflection, positive relationships, and agency foster resilience in the face of adversity. Attachment and resilience are related categories. The different patterns of attachment - secure, insecure-organised and insecure-disorganised - are manifest in different patterns of resilience, depending on prevailing environmental conditions. However, the greater the environmental adversity, the less will the resilience factors emerge. Clients tend to present for psychotherapy when resilience strategies have failed. The therapeutic relationship has neurochemical and relational characteristic mirroring the secure mother-infant bond. These foster mentalising, stress innoculation, affect co-regulation, self-esteem, and agency, forming the basis for enduring and more flexible resilience strategies.
OpenID Connect as a security service in cloud-based medical imaging systems.
Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter
2016-04-01
The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.
NASA Astrophysics Data System (ADS)
Vijay Singh, Ran; Agilandeeswari, L.
2017-11-01
To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.
Towards real-time photon Monte Carlo dose calculation in the cloud
NASA Astrophysics Data System (ADS)
Ziegenhein, Peter; Kozin, Igor N.; Kamerling, Cornelis Ph; Oelfke, Uwe
2017-06-01
Near real-time application of Monte Carlo (MC) dose calculation in clinic and research is hindered by the long computational runtimes of established software. Currently, fast MC software solutions are available utilising accelerators such as graphical processing units (GPUs) or clusters based on central processing units (CPUs). Both platforms are expensive in terms of purchase costs and maintenance and, in case of the GPU, provide only limited scalability. In this work we propose a cloud-based MC solution, which offers high scalability of accurate photon dose calculations. The MC simulations run on a private virtual supercomputer that is formed in the cloud. Computational resources can be provisioned dynamically at low cost without upfront investment in expensive hardware. A client-server software solution has been developed which controls the simulations and transports data to and from the cloud efficiently and securely. The client application integrates seamlessly into a treatment planning system. It runs the MC simulation workflow automatically and securely exchanges simulation data with the server side application that controls the virtual supercomputer. Advanced encryption standards were used to add an additional security layer, which encrypts and decrypts patient data on-the-fly at the processor register level. We could show that our cloud-based MC framework enables near real-time dose computation. It delivers excellent linear scaling for high-resolution datasets with absolute runtimes of 1.1 seconds to 10.9 seconds for simulating a clinical prostate and liver case up to 1% statistical uncertainty. The computation runtimes include the transportation of data to and from the cloud as well as process scheduling and synchronisation overhead. Cloud-based MC simulations offer a fast, affordable and easily accessible alternative for near real-time accurate dose calculations to currently used GPU or cluster solutions.
Towards real-time photon Monte Carlo dose calculation in the cloud.
Ziegenhein, Peter; Kozin, Igor N; Kamerling, Cornelis Ph; Oelfke, Uwe
2017-06-07
Near real-time application of Monte Carlo (MC) dose calculation in clinic and research is hindered by the long computational runtimes of established software. Currently, fast MC software solutions are available utilising accelerators such as graphical processing units (GPUs) or clusters based on central processing units (CPUs). Both platforms are expensive in terms of purchase costs and maintenance and, in case of the GPU, provide only limited scalability. In this work we propose a cloud-based MC solution, which offers high scalability of accurate photon dose calculations. The MC simulations run on a private virtual supercomputer that is formed in the cloud. Computational resources can be provisioned dynamically at low cost without upfront investment in expensive hardware. A client-server software solution has been developed which controls the simulations and transports data to and from the cloud efficiently and securely. The client application integrates seamlessly into a treatment planning system. It runs the MC simulation workflow automatically and securely exchanges simulation data with the server side application that controls the virtual supercomputer. Advanced encryption standards were used to add an additional security layer, which encrypts and decrypts patient data on-the-fly at the processor register level. We could show that our cloud-based MC framework enables near real-time dose computation. It delivers excellent linear scaling for high-resolution datasets with absolute runtimes of 1.1 seconds to 10.9 seconds for simulating a clinical prostate and liver case up to 1% statistical uncertainty. The computation runtimes include the transportation of data to and from the cloud as well as process scheduling and synchronisation overhead. Cloud-based MC simulations offer a fast, affordable and easily accessible alternative for near real-time accurate dose calculations to currently used GPU or cluster solutions.
Development of mobile preventive notification system (PreNotiS)
NASA Astrophysics Data System (ADS)
Kumar, Abhinav; Akopian, David; Chen, Philip
2009-02-01
The tasks achievable by mobile handsets continuously exceed our imagination. Statistics show that the mobile phone sales are soaring, rising exponentially year after year with predictions being that they will rise to a billion units in 2009, with a large section of these being smartphones. Mobile service providers, mobile application developers and researchers have been working closely over the past decade to bring about revolutionary and hardware and software advancements in hand-sets such as embedded digital camera, large memory capacity, accelerometer, touch sensitive screens, GPS, Wi- Fi capabilities etc. as well as in the network infrastructure to support these features. Recently we presented a multi-platform, massive data collection system from distributive sources such as cell phone users1 called PreNotiS. This technology was intended to significantly simplify the response to the events and help e.g. special agencies to gather crucial information in time and respond as quickly as possible to prevent or contain potential emergency situations and act as a massive, centralized evidence collection mechanism that effectively exploits the advancements in mobile application development platforms and the existing network infrastructure to present an easy-touse, fast and effective tool to mobile phone users. We successfully demonstrated the functionality of the client-server application suite to post user information onto the server. This paper presents a new version of the system PreNotiS, with a revised client application and with all new server capabilities. PreNotiS still puts forth the idea of having a fast, efficient client-server based application suite for mobile phones which through a highly simplified user interface will collect security/calamity based information in a structured format from first responders and relay that structured information to a central server where this data is sorted into a database in a predefined manner. This information which includes selections, images and text will be instantly available to authorities and action forces through a secure web portal thus helping them to make decisions in a timely and prompt manner. All the cell phones have self-localizing capability according to FCC E9112 mandate, thus the communicated information can be further tagged automatically by location and time information at the server making all this information available through the secure web-portal.
Security policy speculation of user uploaded images on content sharing sites
NASA Astrophysics Data System (ADS)
Iyapparaja, M.; Tiwari, Maneesh
2017-11-01
Innovation is developing step by step tremendously. As there are numerous social locales where information likes pictures, sound, video and so forth are shared by the client to each other. In concentrate to all exercises on social locales, there is need of protection to pictures. Because of this reason, I utilized Adaptive protection strategy forecast instrument to give security to the pictures. Issue identified with pictures is the huge issue in social locales like Facebook, twitter and so on. So here the part of a social thought, security to pictures, metadata and so on is produced. To conquer this issue we produced an answer which is 2 systems which understanding to a background marked by the pictures gives appropriated answer for them. Here we give an arrangement to the specific sort of pictures by characterizing them and in addition giving protection to pictures which are transferred agreement to a calculation that we utilized. Consequently as indicated by this arrangement expectation pictures take after a similar approach on up and coming pictures and give successful security to them.
Network Security and the NPS Internet Firewall.
1994-09-16
NIS between clients and servers. The ypxfr service is used for trans- Network Information ferring the /etc/ passwd file from the master server to the...slave Service servers. If the NIS domain name is guessed, an outsider can get a copy of the /etc/ passwd file. Table 5: Network Services With Known...TCP ports 20 and 21), for the ftp network service: outside% ftp 131.120.50.151 ftp> get /etc/ passwd /tmp/passwd.inside (login process...) ftp> cd nttcp
[Mechanisms of articulation between the informal and the formal urban sectors].
Lomnitz, L
1978-01-01
This article utilizes field data from Mexico City squatter settlements and personal interviews with employers to analyze some aspects of social relations between the informal sector and the formal urban sector, and compares the results with findings of other anthropologists in Mexico and elsewhere to derive a series of theoretical generalizations concerning mechanisms of articulation between the marginal sector and the formal economic and political institutions of the society. The formal sector is postulated to consist of the 3 subsectors of power, capital, and labor, which are in permanent conflict among themselves but all of which enjoy labor security and an assured minimal level of income. The marginal or informal sector lacks employment security, a minimal income level, and bargaining power. It is characterized by a small scale economy utilizing intensive familial labor. The informal sector is marginal to the dominant industrial system of production and the state apparatus, although it fulfills functions in terms of the national economy. 2 types of relationships may be distinguished in the social organization of the marginal sector: reciprocal relations between equals which form a network for the exchange of goods and services, or patron/client relations which are used, for example, in the case of petty entrepreneurs utilizing their relatives and acquaintances to create units of production. The functions of reciprocal relations are affected by social, physical, economic, and psychosocial distance or proximity and may result in exchanges of information, labor assistance, loans, services, or moral support. Patron/client relations may be direct, or the "patron" may be an intermediary. Some reciprocal networks display a pattern of incipient asymmetry leading to formation of true patron/client ties and some petty entrepreneurs or intermediaries manage to develop true patron/client networks; case histories are used to illustrate both phenomena. Intermediaries functioning in the system of production and the political process are discussed. It is concluded that as long as members of the informal sector continue to be excluded from local and national institutions, intermediaries will be required to link the 2 sectors. The patron superimposes an element of inequality in his network of reciprocal relations, but his economic utility makes it necessary. At the same time, the prevailing lack of social mobility means that his true class position will not improve significantly.
NASA Astrophysics Data System (ADS)
Friberg, P. A.; Luis, R. S.; Quintiliani, M.; Lisowski, S.; Hunter, S.
2014-12-01
Recently, a novel set of modules has been included in the Open Source Earthworm seismic data processing system, supporting the use of web applications. These include the Mole sub-system, for storing relevant event data in a MySQL database (see M. Quintiliani and S. Pintore, SRL, 2013), and an embedded webserver, Moleserv, for serving such data to web clients in QuakeML format. These modules have enabled, for the first time using Earthworm, the use of web applications for seismic data processing. These can greatly simplify the operation and maintenance of seismic data processing centers by having one or more servers providing the relevant data as well as the data processing applications themselves to client machines running arbitrary operating systems.Web applications with secure online web access allow operators to work anywhere, without the often cumbersome and bandwidth hungry use of secure shell or virtual private networks. Furthermore, web applications can seamlessly access third party data repositories to acquire additional information, such as maps. Finally, the usage of HTML email brought the possibility of specialized web applications, to be used in email clients. This is the case of EWHTMLEmail, which produces event notification emails that are in fact simple web applications for plotting relevant seismic data.Providing web services as part of Earthworm has enabled a number of other tools as well. One is ISTI's EZ Earthworm, a web based command and control system for an otherwise command line driven system; another is a waveform web service. The waveform web service serves Earthworm data to additional web clients for plotting, picking, and other web-based processing tools. The current Earthworm waveform web service hosts an advanced plotting capability for providing views of event-based waveforms from a Mole database served by Moleserve.The current trend towards the usage of cloud services supported by web applications is driving improvements in JavaScript, css and HTML, as well as faster and more efficient web browsers, including mobile. It is foreseeable that in the near future, web applications are as powerful and efficient as native applications. Hence the work described here has been the first step towards bringing the Open Source Earthworm seismic data processing system to this new paradigm.
System for Secure Integration of Aviation Data
NASA Technical Reports Server (NTRS)
Kulkarni, Deepak; Wang, Yao; Keller, Rich; Chidester, Tom; Statler, Irving; Lynch, Bob; Patel, Hemil; Windrem, May; Lawrence, Bob
2007-01-01
The Aviation Data Integration System (ADIS) of Ames Research Center has been established to promote analysis of aviation data by airlines and other interested users for purposes of enhancing the quality (especially safety) of flight operations. The ADIS is a system of computer hardware and software for collecting, integrating, and disseminating aviation data pertaining to flights and specified flight events that involve one or more airline(s). The ADIS is secure in the sense that care is taken to ensure the integrity of sources of collected data and to verify the authorizations of requesters to receive data. Most importantly, the ADIS removes a disincentive to collection and exchange of useful data by providing for automatic removal of information that could be used to identify specific flights and crewmembers. Such information, denoted sensitive information, includes flight data (here signifying data collected by sensors aboard an aircraft during flight), weather data for a specified route on a specified date, date and time, and any other information traceable to a specific flight. The removal of information that could be used to perform such tracing is called "deidentification." Airlines are often reluctant to keep flight data in identifiable form because of concerns about loss of anonymity. Hence, one of the things needed to promote retention and analysis of aviation data is an automated means of de-identification of archived flight data to enable integration of flight data with non-flight aviation data while preserving anonymity. Preferably, such an automated means would enable end users of the data to continue to use pre-existing data-analysis software to identify anomalies in flight data without identifying a specific anomalous flight. It would then also be possible to perform statistical analyses of integrated data. These needs are satisfied by the ADIS, which enables an end user to request aviation data associated with de-identified flight data. The ADIS includes client software integrated with other software running on flight-operations quality-assurance (FOQA) computers for purposes of analyzing data to study specified types of events or exceedences (departures of flight parameters from normal ranges). In addition to ADIS client software, ADIS includes server hardware and software that provide services to the ADIS clients via the Internet (see figure). The ADIS server receives and integrates flight and non-flight data pertaining to flights from multiple sources. The server accepts data updates from authorized sources only and responds to requests from authorized users only. In order to satisfy security requirements established by the airlines, (1) an ADIS client must not be accessible from the Internet by an unauthorized user and (2) non-flight data as airport terminal information system (ATIS) and weather data must be displayed without any identifying flight information. ADIS hardware and software architecture as well as encryption and data display scheme are designed to meet these requirements. When a user requests one or more selected aviation data characteristics associated with an event (e.g., a collision, near miss, equipment malfunction, or exceedence), the ADIS client augments the request with date and time information from encrypted files and submits the augmented request to the server. Once the user s authorization has been verified, the server returns the requested information in de-identified form.
Iosif, Ana-Maria; Zakskorn, Lauren N; Nye, Kathleen E; Zia, Aqsa; Niendam, Tara Ann
2018-01-01
Background A growing body of literature indicates that smartphone technology is a feasible add-on tool in the treatment of individuals with early psychosis (EP) . However, most studies to date have been conducted independent of outpatient care or in a research clinic setting, often with financial incentives to maintain user adherence to the technology. Feasibility of dissemination and implementation of smartphone technology into community mental health centers (CMHCs) has yet to be tested, and whether young adults with EP will use this technology for long periods of time without incentive is unknown. Furthermore, although EP individuals willingly adopt smartphone technology as part of their treatment, it remains unclear whether providers are amenable to integrating smartphone technology into treatment protocols. Objective This study aimed to establish the feasibility of implementing a smartphone app and affiliated Web-based dashboard in 4 community outpatient EP clinics in Northern California. Methods EP individuals in 4 clinics downloaded an app on their smartphone and responded to daily surveys regarding mood and symptoms for up to 5 months. Treatment providers at the affiliated clinics viewed survey responses on a secure Web-based dashboard in sessions with their clients and between appointments. EP clients and treatment providers filled out satisfaction surveys at study end regarding usability of the app. Results Sixty-one EP clients and 20 treatment providers enrolled in the study for up to 5 months. Forty-one EP clients completed the study, and all treatment providers remained in the study for their duration in the clinic. Survey completion for all 61 EP clients was moderate: 40% and 39% for daily and weekly surveys, respectively. Completion rates were slightly higher in the participants who completed the study: 44% and 41% for daily and weekly surveys, respectively. Twenty-seven of 41 (66%) EP clients who completed the study and 11 of 13 (85%) treatment providers who responded to satisfaction surveys reported they would continue to use the app as part of treatment services. Six (15%; 6/41) clients and 3 providers (23%; 3/13) stated that technological glitches impeded their engagement with the platform. Conclusions EP clients and treatment providers in community-based outpatient clinics are responsive to integrating smartphone technology into treatment services. There were logistical and technical challenges associated with enrolling individuals in CMHCs. To be most effective, implementing smartphone technology in CMHC EP care necessitates adequate technical staff and support for utilization of the platform. PMID:29487044
2013-01-01
To view methadone maintenance treatment (MMT) globally, it is necessary to accumulate data on MMT policy implementation under different health service systems. The aim of the current study is to provide empirical evidence about policy implementation of MMT and HIV infection control, as well as recommendations for improvement of MMT in the future. Based on China’s national policy framework of MMT, policy implementation of MMT in Hubei province has two objectives: 1) to create linkages between health and public security, and 2) to provide integrated services for management of drug abusers. From 2007 to 2011, following the establishment of MMT clinics that provide methadone as well as HIV prevention services, the proportion of HIV infection among drug abusers decreased relatively quickly (12.12% → 5.77% → 5.19% → 2.39% → 2.04%). However, high drop-out rate and poor information management have been identified as particular problems which now need to be addressed. Furthermore, client drop-out from MMT programs may reflect social issues the clients encounter, and consequently, sustainable MMT development requires incorporation of social measures that help MMT clients return to society without discrimination, especially through family cooperation and employment opportunities. PMID:24188659
From community to commodity: the ethics of pharma-funded social networking sites for physicians.
Landa, Amy Snow; Elliott, Carl
2013-01-01
A growing number of doctors in the United States are joining online professional networks that cater exclusively to licensed physicians. The most popular are Sermo, with more than 135,000 members, and Doximity, with more than 100,000. Both companies claim to offer a valuable service by enabling doctors to "connect" in a secure online environment. But their business models raise ethical concerns. The sites generate revenue by selling access to their large networks of physician-users to clients that include global pharmaceutical companies, market research and consulting firms, and hedge funds and other investors. In exchange for a fee, these clients are offered a variety of tools to monitor, analyze, and solicit physicians' opinions. In Sermo's case, clients are also offered opportunities to conduct "awareness campaigns" on the site that are aimed at influencing physician sentiment about specific drugs and medical devices. In effect, these online networks have created an even more efficient means for the pharmaceutical industry to track physician sentiment, disseminate messages, and cultivate key opinion leaders. This paper argues that the dual nature of these sites (a) undermines their integrity and transparency as forums for the exchange of medical opinion and (b) presents an ethical conflict for the doctors who use them. © 2013 American Society of Law, Medicine & Ethics, Inc.
Quality of care and contraceptive use in urban Kenya
Pence, Brian W.; Curtis, Siân L.; Marshall, Stephen W.; Speizer, Ilene S.
2015-01-01
CONTEXT Family planning is highly beneficial to women’s overall health, morbidity, and mortality, particularly in developing countries. Yet, in much of sub-Saharan Africa, contraceptive prevalence remains low while unmet need for family planning remains high. It has been frequently hypothesized that the poor quality of family planning service provision in many low-income settings acts as a barrier to optimal rates of contraceptive use but this association has not been rigorously tested. METHODS Using data collected from 3,990 women in 2010, this study investigates the association between family planning service quality and current modern contraceptive use in five cities in Kenya. In addition to individual-level data, audits of select facilities and service provider interviews were conducted in 260 facilities. Within 126 higher-volume clinics, exit interviews were conducted with family planning clients. Individual and facility-level data are linked based on the source of the woman’s current method or other health service. Adjusted prevalence ratios are estimated using binomial regression and we account for clustering of observations within facilities using robust standard errors. RESULTS Solicitation of client preferences, assistance with method selection, provision of information by providers on side effects, and provider treatment of clients were all associated with a significantly increased likelihood of current modern contraceptive use and effects were often stronger among younger and less educated women. CONCLUSION Efforts to strengthen contraceptive security and improve the content of contraceptive counseling and treatment of clients by providers have the potential to significantly increase contraceptive use in urban Kenya. PMID:26308259
Cusack, Lynette; de Crespigny, Charlotte; Athanasos, Peter
2011-04-01
This article discusses the clinical implications of adverse health outcomes derived during heatwaves for people with mental health disorders, substance misuse and those taking prescribed medications such as lithium, various neuroleptic and anticholinergic drugs. With climate change it is predicted that the incidence of prolonged periods of extreme heat will increase. Specific adverse health outcomes associated with high environmental temperatures include heat stroke and heat exhaustion. Those at increased risk for heat-related mortality are those with chronic health conditions, including those with mental health disorders and substance misuse. Sources of evidence included and 'grey' literature published between 1985 and 2010, such as key texts, empirical research, public policies, training manuals and community information sheets on heat waves. Current clinical practice and clinical impact of heatwaves on those people with comorbidity is explored. This includes the physiological components of heat stress, heat regulation, and the impact of alcohol and other drugs; and, ramifications and professional practice issues for those with mental health conditions and those requiring mental health medications. Client education covering modification of the environment and the use of client heat safety action plans. Secure, accessible stores of prescribed medication are recommended and emergency substance withdrawal kits could be made available. All nurses have a responsibility to increase the capability and resilience of their clients to manage their chronic health needs during a heatwave. At these times nurses need to give extra monitoring and assistance when clients lack the capacity or resources to protect themselves. © 2011 The Authors. Journal of Advanced Nursing © 2011 Blackwell Publishing Ltd.
GLobal Integrated Design Environment
NASA Technical Reports Server (NTRS)
Kunkel, Matthew; McGuire, Melissa; Smith, David A.; Gefert, Leon P.
2011-01-01
The GLobal Integrated Design Environment (GLIDE) is a collaborative engineering application built to resolve the design session issues of real-time passing of data between multiple discipline experts in a collaborative environment. Utilizing Web protocols and multiple programming languages, GLIDE allows engineers to use the applications to which they are accustomed in this case, Excel to send and receive datasets via the Internet to a database-driven Web server. Traditionally, a collaborative design session consists of one or more engineers representing each discipline meeting together in a single location. The discipline leads exchange parameters and iterate through their respective processes to converge on an acceptable dataset. In cases in which the engineers are unable to meet, their parameters are passed via e-mail, telephone, facsimile, or even postal mail. The result of this slow process of data exchange would elongate a design session to weeks or even months. While the iterative process remains in place, software can now exchange parameters securely and efficiently, while at the same time allowing for much more information about a design session to be made available. GLIDE is written in a compilation of several programming languages, including REALbasic, PHP, and Microsoft Visual Basic. GLIDE client installers are available to download for both Microsoft Windows and Macintosh systems. The GLIDE client software is compatible with Microsoft Excel 2000 or later on Windows systems, and with Microsoft Excel X or later on Macintosh systems. GLIDE follows the Client-Server paradigm, transferring encrypted and compressed data via standard Web protocols. Currently, the engineers use Excel as a front end to the GLIDE Client, as many of their custom tools run in Excel.
A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
NASA Astrophysics Data System (ADS)
Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal
2016-11-01
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
Better protecting staff working alone.
Swindlehurst, Darren
2016-08-01
Established four and a half years ago as a wholly-owned subsidiary of Dutch-headquartered personal security and critical communications solutions provider, Atus BV, Hereford-based Atus Systems has since established a strong UK-wide client base supplying personal pagers, wireless personal alarm units, and the associated infrastructure, predominantly to high secure mental health facilities, prisons, and detention centres. Recent months, however, mark a new chapter for it, with the launch of a 'unique' lone worker protection system able to identify such personnel's location even when they are indoors and out of range of GPS coverage, and a sophisticated two-way enterprise critical messaging system. As HEJ editor, Jonathan Baillie, discovered from MD, Darren Swindlehurst, the company will target both systems squarely at the NHS and private healthcare providers, as well as at its more 'traditional' customers.
Security Analysis of Session Initiation Protocol
2010-06-01
traffic as Bob@biloxi.com), a VPN was established with OpenVPN 2.1_rc19 between all relevant entities. Configuration files used by the clients and...static key is created by running the command ’ openvpn --genkey --secret static.key.’ By 22 rerouting all SIP traffic through VPNs as needed, a network... OpenVPN , and VM 2’s routing table is modified so that all IP packets except those addressed to VM 1’s publicly facing IP are routed through the OpenVPN
T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On
2007-12-01
following tools: • Apache Tomcat 6.0—a Java Servlet container to host the Web services and a simple Web client application [Apache 2007a] • Apache Axis...Eclipse. Eclipse – an open development platform. http://www.eclipse.org/ (2007) [Hunter 2001] Hunter, Jason. Java Servlet Programming, 2nd Edition...Citation SAML 1.1 Java Toolkit SAML Ping Identity’s SAML-1.1 implementation [SourceID 2006] OpenSAML SAML An open source implementation of SAML 1.1
A Security Architecture Based on Trust Management for Pervasive Computing Systems
2005-01-01
SmartSpace framework, we extended the C2 [16] ar- chitecture, which in turn is based on the Centaurus [10] model. In Centaurus a Client can access...the services provided by the nearest Centaurus Service Manager (SM) via some short-range communi- cation. The SM acts as an active proxy by executing...The In the Centaurus project [10], the main design goal is the development of a framework for building portals to services using various types of
The informatics superhighway: prototyping on the World Wide Web.
Cimino, J J; Socratous, S A; Grewal, R
1995-01-01
We have experimented with developing a prototype Surgeon's Workstation which makes use of the World Wide Web client-server architecture. Although originally intended merely as a means for obtaining user feedback for use in designing a "real" system, the application has been adopted for use by our Department of Surgery. As they begin to use the application, they have suggested changes and we have responded. This paper illustrates some of the advantages we have found for prototyping with Web-based applications, including security aspects.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Casella, R.
RESTful (REpresentational State Transfer) web services are an alternative implementation to SOAP/RPC web services in a client/server model. BNLs IT Division has started deploying RESTful Web Services for enterprise data retrieval and manipulation. Data is currently used by system administrators for tracking configuration information and as it is expanded will be used by Cyber Security for vulnerability management and as an aid to cyber investigations. This talk will describe the implementation and outstanding issues as well as some of the reasons for choosing RESTful over SOAP/RPC and future directions.
SAVAH: Source Address Validation with Host Identity Protocol
NASA Astrophysics Data System (ADS)
Kuptsov, Dmitriy; Gurtov, Andrei
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as CGA, our approach is suitable both for IPv4 and IPv6. We have implemented SAVAH in Wi-Fi access points and evaluated its overhead for clients and the first-hop router.
Proton beam therapy control system
Baumann, Michael A [Riverside, CA; Beloussov, Alexandre V [Bernardino, CA; Bakir, Julide [Alta Loma, CA; Armon, Deganit [Redlands, CA; Olsen, Howard B [Colton, CA; Salem, Dana [Riverside, CA
2008-07-08
A tiered communications architecture for managing network traffic in a distributed system. Communication between client or control computers and a plurality of hardware devices is administered by agent and monitor devices whose activities are coordinated to reduce the number of open channels or sockets. The communications architecture also improves the transparency and scalability of the distributed system by reducing network mapping dependence. The architecture is desirably implemented in a proton beam therapy system to provide flexible security policies which improve patent safety and facilitate system maintenance and development.
Proton beam therapy control system
Baumann, Michael A.; Beloussov, Alexandre V.; Bakir, Julide; Armon, Deganit; Olsen, Howard B.; Salem, Dana
2010-09-21
A tiered communications architecture for managing network traffic in a distributed system. Communication between client or control computers and a plurality of hardware devices is administered by agent and monitor devices whose activities are coordinated to reduce the number of open channels or sockets. The communications architecture also improves the transparency and scalability of the distributed system by reducing network mapping dependence. The architecture is desirably implemented in a proton beam therapy system to provide flexible security policies which improve patent safety and facilitate system maintenance and development.
Proton beam therapy control system
Baumann, Michael A; Beloussov, Alexandre V; Bakir, Julide; Armon, Deganit; Olsen, Howard B; Salem, Dana
2013-06-25
A tiered communications architecture for managing network traffic in a distributed system. Communication between client or control computers and a plurality of hardware devices is administered by agent and monitor devices whose activities are coordinated to reduce the number of open channels or sockets. The communications architecture also improves the transparency and scalability of the distributed system by reducing network mapping dependence. The architecture is desirably implemented in a proton beam therapy system to provide flexible security policies which improve patent safety and facilitate system maintenance and development.
Proton beam therapy control system
Baumann, Michael A; Beloussov, Alexandre V; Bakir, Julide; Armon, Deganit; Olsen, Howard B; Salem, Dana
2013-12-03
A tiered communications architecture for managing network traffic in a distributed system. Communication between client or control computers and a plurality of hardware devices is administered by agent and monitor devices whose activities are coordinated to reduce the number of open channels or sockets. The communications architecture also improves the transparency and scalability of the distributed system by reducing network mapping dependence. The architecture is desirably implemented in a proton beam therapy system to provide flexible security policies which improve patent safety and facilitate system maintenance and development.
Major Crimes as Analogs to Potential Threats to Nuclear Facilities and Programs
1980-04-01
that he had gotten involved in land development in Europe, that his clients paid him in cash and diamonds, and that he had a cash - flow problem with...scheme to bilk the Los Angeles city treasury out of $3.5 million by cashing stolen city checks. $902,000 was never recovered and is assumed to be in...Analysis of the loot shows cash and securities to be the predominant loot taken (58 percent), followed by jewelry and precious metals (20 percent
Technical note: real-time web-based wireless visual guidance system for radiotherapy.
Lee, Danny; Kim, Siyong; Palta, Jatinder R; Kim, Taeho
2017-06-01
Describe a Web-based wireless visual guidance system that mitigates issues associated with hard-wired audio-visual aided patient interactive motion management systems that are cumbersome to use in routine clinical practice. Web-based wireless visual display duplicates an existing visual display of a respiratory-motion management system for visual guidance. The visual display of the existing system is sent to legacy Web clients over a private wireless network, thereby allowing a wireless setting for real-time visual guidance. In this study, active breathing coordinator (ABC) trace was used as an input for visual display, which captured and transmitted to Web clients. Virtual reality goggles require two (left and right eye view) images for visual display. We investigated the performance of Web-based wireless visual guidance by quantifying (1) the network latency of visual displays between an ABC computer display and Web clients of a laptop, an iPad mini 2 and an iPhone 6, and (2) the frame rate of visual display on the Web clients in frames per second (fps). The network latency of visual display between the ABC computer and Web clients was about 100 ms and the frame rate was 14.0 fps (laptop), 9.2 fps (iPad mini 2) and 11.2 fps (iPhone 6). In addition, visual display for virtual reality goggles was successfully shown on the iPhone 6 with 100 ms and 11.2 fps. A high network security was maintained by utilizing the private network configuration. This study demonstrated that a Web-based wireless visual guidance can be a promising technique for clinical motion management systems, which require real-time visual display of their outputs. Based on the results of this study, our approach has the potential to reduce clutter associated with wired-systems, reduce space requirements, and extend the use of medical devices from static usage to interactive and dynamic usage in a radiotherapy treatment vault.
IMIS desktop & smartphone software solutions for monitoring spacecrafts' payload from anywhere
NASA Astrophysics Data System (ADS)
Baroukh, J.; Queyrut, O.; Airaud, J.
In the past years, the demand for satellite remote operations has increased guided by on one hand, the will to reduce operations cost (on-call operators out of business hours), and on the other hand, the development of cooperation space missions resulting in a world wide distribution of engineers and science team members. Only a few off-the-shelf solutions exist to fulfill the need of remote payload monitoring, and they mainly use proprietary devices. The recent advent of mobile technologies (laptops, smartphones and tablets) as well as the worldwide deployment of broadband networks (3G, Wi-Fi hotspots), has opened up a technical window that brings new options. As part of the Mars Science Laboratory (MSL) mission, the Centre National D'Etudes Spatiales (CNES, the French space agency) has developed a new software solution for monitoring spacecraft payloads. The Instrument Monitoring Interactive Software (IMIS) offers state-of-the-art operational features for payload monitoring, and can be accessed remotely. It was conceived as a generic tool that can be used for heterogeneous payloads and missions. IMIS was designed as a classical client/server architecture. The server is hosted at CNES and acts as a data provider while two different kinds of clients are available depending on the level of mobility required. The first one is a rich client application, built on Eclipse framework, which can be installed on usual operating systems and communicates with the server through the Internet. The second one is a smartphone application for any Android platform, connected to the server thanks to the mobile broadband network or a Wi-Fi connection. This second client is mainly devoted to on-call operations and thus only contains a subset of the IMIS functionalities. This paper describes the operational context, including security aspects, that led IMIS development, presents the selected software architecture and details the various features of both clients: the desktop and the sm- rtphone application.
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
OpenID Connect as a security service in cloud-based medical imaging systems
Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter
2016-01-01
Abstract. The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as “Kerberos of cloud.” We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model. PMID:27340682
Kaiser, Michelle L; Cafer, Anne
2018-01-01
The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gastelum, Zoe N.; Henry, Michael J.
2013-11-13
In FY2013, the PIE International Safeguards team demonstrated our development progress to U.S. Department of Energy (DOE) staff from the Office of Nonproliferation and International Security (NA-24, our client) and the Office of Defense Nuclear Nonproliferation Research and Development (NA-22). Following the demonstration, the team was asked by our client to complete additional development prior to a planned demonstration at the International Atomic Energy Agency (IAEA), scheduled tentatively for January or spring of 2014. The team discussed four potential areas for development (in priority order), and will develop them as time and funding permit prior to an IAEA demonstration. Themore » four capability areas are: 1. Addition of equipment manuals to PIE-accessible files 2. Optical character recognition (OCR) of photographed text 3. Barcode reader with information look-up from a database 4. Add Facilities to Data Model 5. Geospatial capabilities with information integration Each area will be described below in a use case.« less
Forti, Amanda; Stapleton, Helen; Kildea, Sue
2013-12-01
Around-the-clock access to a known midwife is a distinct feature of Midwifery Group Practice (MGP) and caseload midwifery settings; although the literature suggests this aspect of working life may hinder recruitment and retention to this model of care. Mobile technologies, known as mHealth where they are used in health care, facilitate access and hence communication, however little is known about this area of midwifery practice. Which communication modalities are used, and most frequently, by MGP midwives and clients? A prospective, cross sectional design included a purposive sample of MGP midwives from an Australian tertiary maternity hospital. Data on modes of midwife-client contact were collected 24h/day, for two consecutive weeks, and included: visits, phone-calls, texts and emails. Demographic data were also collected. Details about 1442 midwife-client contacts were obtained. The majority of contact was via text, between the hours of 07:00 and 14:59, with primiparous women, when the primary midwife was on-call. An average of 96 contacts per fortnight occurred. The majority of contact was between the midwife and their primary clients, reiterating a key tenet of caseload models and confirming mobile technologies as a significant and evolving aspect of practice. The pattern of contact within social (or daytime) hours is reassuring for midwives considering caseload midwifery, who are concerned about the on-call burden. The use of text as the preferred communication modality raises issues regarding data security and retrieval, accountability, confidentiality and text management during off-duty periods. The development of Australian-wide guidelines to inform local policies and best practice is recommended. Copyright © 2013 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.
Power and confidence in professions: lessons for occupational therapy.
Clark, Florence A
2010-12-01
Powerful professions have the capacity to obtain leadership positions, advocate successfully in the policy arena, and secure the resources necessary to achieve their professional goals. Within the occupational therapy profession, cultivating power and confidence among our practitioners is essential to realize our full capacity for meeting society's occupational needs. Drawing from a historical analysis of the medical and nursing professions, this paper discusses the implications of power and disempowerment among health professions for their practitioners, clients, and public image. Theoretical perspectives on power from social psychology, politics, organizational management, and post-structuralism are introduced and their relevance to the profession of occupational therapy is examined. The paper concludes with recommendations for occupational therapy practitioners to analyze their individual sources of power and evaluate opportunities to develop confidence and secure power for their professional work--in venues both in and outside the workplace.
Collaborating With Businesses to Support and Sustain Research.
Moch, Susan Diemert; Jansen, Debra A; Jadack, Rosemary A; Page, Phil; Topp, Robert
2015-10-01
Financial assistance is necessary for sustaining research at universities. Business collaborations are a potential means for obtaining these funds. To secure funding, understanding the process for obtaining these business funds is important for nursing faculty members. Although faculty rarely request funding from businesses, they are often in a position to solicit financial support due to existing relationships with clinical agency administrators, staff, and community leaders. The economic support received from businesses provides outcomes in nursing research, research education, academic-service partnerships, and client health care. This article describes the steps and processes involved in successfully obtaining research funding from businesses. In addition, case examples for securing and maintaining funding from health care agencies (evidence-based practice services) and from a health manufacturing company (product evaluation) are used to demonstrate the process. © The Author(s) 2015.
Iliyasu, Z; Kabir, M; Galadanci, H S; Abubakar, I S; Aliyu, M H
2005-01-01
Mother to child transmission accounts for the majority of HIV infections in children in the developing countries. This study assessed pregnant women's knowledge of HIV/AIDS, awareness and attitudes towards Voluntary Counselling and Testing (VCT) in a teaching hospital in northern Nigeria. A pre-tested structured interview questionnaire was administered on a cross-section of 210 antenatal clients in Aminu Kano Teaching Hospital, Nigeria. All respondents were aware of HIV/AIDS. Fifty seven percent had good knowledge, 32% had fair knowledge and the remaining 11% had poor knowledge of the infection. Most respondents were aware of VCT through health workers, mass media and friends. Similarly, most respondents (81.0%) approved of VCT, 13.0% disapproved of it and the remaining (6%) was undecided. The main reasons for disapproval were; fear of stigmatisation, isolation and effect on marriage security. Those that had tertiary level of education were three times more likely to accept VCT compared to those with lower levels of education (O.R=3.2, 95% confidence interval =1.3-8.0). Although the awareness of VCT for HIV was quite high with most antenatal clients harbouring positive attitudes towards it, there is a need to intensify health education to convince the remaining minority who are still sceptical or ignorant of the benefits of VCT.
Development of wide area environment accelerator operation and diagnostics method
NASA Astrophysics Data System (ADS)
Uchiyama, Akito; Furukawa, Kazuro
2015-08-01
Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.
Rural telemedicine project in northern New Mexico
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zink, S.; Hahn, H.; Rudnick, J.
A virtual electronic medical record system is being deployed over the Internet with security in northern New Mexico using TeleMed, a multimedia medical records management system that uses CORBA-based client-server technology and distributed database architecture. The goal of the NNM Rural Telemedicine Project is to implement TeleMed into fifteen rural clinics and two hospitals within a 25,000 square mile area of northern New Mexico. Evaluation of the project consists of three components: job task analysis, audit of immunized children, and time motion studies. Preliminary results of the evaluation components are presented.
AceCloud: Molecular Dynamics Simulations in the Cloud.
Harvey, M J; De Fabritiis, G
2015-05-26
We present AceCloud, an on-demand service for molecular dynamics simulations. AceCloud is designed to facilitate the secure execution of large ensembles of simulations on an external cloud computing service (currently Amazon Web Services). The AceCloud client, integrated into the ACEMD molecular dynamics package, provides an easy-to-use interface that abstracts all aspects of interaction with the cloud services. This gives the user the experience that all simulations are running on their local machine, minimizing the learning curve typically associated with the transition to using high performance computing services.
Application of Attachment Theory in Clinical Social Work.
Blakely, Thomas Joseph; Dziadosz, Gregory M
2015-11-01
This article proposes the use of attachment theory in clinical social work practice. This theory is very appropriate in this context because of its fit with social work concepts of person-in-situation, the significance of developmental history in the emergence of psychosocial problems, and the content of human behavior in the social environment. A literature review supports the significance of the theory. Included are ideas about how attachment styles and working models may be used in assessment and treatment to help clients achieve a secure attachment style.
The Study on Financial Supervision for Chinese Financial Industry under Mixed Operation
NASA Astrophysics Data System (ADS)
Wei, Song
Financial mixed operation refers to that financial institution can offer all financial services (banking, securities, insurance, and trust) and engage in industrial businesses by holding the share ownership. Because of self interests, risk diversification, the change of competition condition, and clients' needs of the diversity of financial products and services, commercial banks make it possible for the mixed operation to be the optimal choice of the banking businesses under dynamic conditions in globalized competition, which results in the diversity and integration of banking businesses.
Securing a web-based teleradiology platform according to German law and "best practices".
Spitzer, Michael; Ullrich, Tobias; Ueckert, Frank
2009-01-01
The Medical Data and Picture Exchange platform (MDPE), as a teleradiology system, facilitates the exchange of digital medical imaging data among authorized users. It features extensive support of the DICOM standard including networking functions. Since MDPE is designed as a web service, security and confidentiality of data and communication pose an outstanding challenge. To comply with demands of German laws and authorities, a generic data security concept considered as "best practice" in German health telematics was adapted to the specific demands of MDPE. The concept features strict logical and physical separation of diagnostic and identity data and thus an all-encompassing pseudonymization throughout the system. Hence, data may only be merged at authorized clients. MDPE's solution of merging data from separate sources within a web browser avoids technically questionable techniques such as deliberate cross-site scripting. Instead, data is merged dynamically by JavaScriptlets running in the user's browser. These scriptlets are provided by one server, while content and method calls are generated by another server. Additionally, MDPE uses encrypted temporary IDs for communication and merging of data.
Recovery and money management.
Rowe, Michael; Serowik, Kristin L; Ablondi, Karen; Wilber, Charles; Rosen, Marc I
2013-06-01
Social recovery and external money management are important approaches in contemporary mental health care, but little research has been done on the relationship between the two or on application of recovery principles to money management for people at risk of being assigned a representative payee or conservator. Out of 49 total qualitative interviews, 25 transcripts with persons receiving Social Security insurance or Social Security disability insurance who were at risk of being assigned a money manager were analyzed to assess the presence of recognized recovery themes. The recovery principles of self-direction and responsibility were strong themes in participant comments related to money management. Money management interventions should incorporate peoples' recovery-related motivations to acquire financial management skills as a means to direct and assume responsibility for one's finances. Staff involved in money management should receive training to support client's recovery-related goals. (PsycINFO Database Record (c) 2013 APA, all rights reserved).
A Review Study on Cloud Computing Issues
NASA Astrophysics Data System (ADS)
Kanaan Kadhim, Qusay; Yusof, Robiah; Sadeq Mahdi, Hamid; Al-shami, Sayed Samer Ali; Rahayu Selamat, Siti
2018-05-01
Cloud computing is the most promising current implementation of utility computing in the business world, because it provides some key features over classic utility computing, such as elasticity to allow clients dynamically scale-up and scale-down the resources in execution time. Nevertheless, cloud computing is still in its premature stage and experiences lack of standardization. The security issues are the main challenges to cloud computing adoption. Thus, critical industries such as government organizations (ministries) are reluctant to trust cloud computing due to the fear of losing their sensitive data, as it resides on the cloud with no knowledge of data location and lack of transparency of Cloud Service Providers (CSPs) mechanisms used to secure their data and applications which have created a barrier against adopting this agile computing paradigm. This study aims to review and classify the issues that surround the implementation of cloud computing which a hot area that needs to be addressed by future research.
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
NASA Astrophysics Data System (ADS)
Hori, Yohei; Yokoyama, Hiroyuki; Sakane, Hirofumi; Toda, Kenji
We developed a content delivery system using a partially reconfigurable FPGA to securely distribute digital content on the Internet. With partial reconfigurability of a Xilinx Virtex-II Pro FPGA, the system provides an innovative single-chip solution for protecting digital content. In the system, a partial circuit must be downloaded from a server to the client terminal to play content. Content will be played only when the downloaded circuit is correctly combined (=interlocked) with the circuit built in the terminal. Since each circuit has a unique I/O configuration, the downloaded circuit interlocks with the corresponding built-in circuit designed for a particular terminal. Thus, the interface of the circuit itself provides a novel authentication mechanism. This paper describes the detailed architecture of the system and clarify the feasibility and effectiveness of the system. In addition, we discuss a fail-safe mechanism and future work necessary for the practical application of the system.
Feasibility of Using Distributed Wireless Mesh Networks for Medical Emergency Response
Braunstein, Brian; Trimble, Troy; Mishra, Rajesh; Manoj, B. S.; Rao, Ramesh; Lenert, Leslie
2006-01-01
Achieving reliable, efficient data communications networks at a disaster site is a difficult task. Network paradigms, such as Wireless Mesh Network (WMN) architectures, form one exemplar for providing high-bandwidth, scalable data communication for medical emergency response activity. WMNs are created by self-organized wireless nodes that use multi-hop wireless relaying for data transfer. In this paper, we describe our experience using a mesh network architecture we developed for homeland security and medical emergency applications. We briefly discuss the architecture and present the traffic behavioral observations made by a client-server medical emergency application tested during a large-scale homeland security drill. We present our traffic measurements, describe lessons learned, and offer functional requirements (based on field testing) for practical 802.11 mesh medical emergency response networks. With certain caveats, the results suggest that 802.11 mesh networks are feasible and scalable systems for field communications in disaster settings. PMID:17238308
NASA Astrophysics Data System (ADS)
Čepický, Jáchym; Moreira de Sousa, Luís
2016-06-01
The OGC® Web Processing Service (WPS) Interface Standard provides rules for standardizing inputs and outputs (requests and responses) for geospatial processing services, such as polygon overlay. The standard also defines how a client can request the execution of a process, and how the output from the process is handled. It defines an interface that facilitates publishing of geospatial processes and client discovery of processes and and binding to those processes into workflows. Data required by a WPS can be delivered across a network or they can be available at a server. PyWPS was one of the first implementations of OGC WPS on the server side. It is written in the Python programming language and it tries to connect to all existing tools for geospatial data analysis, available on the Python platform. During the last two years, the PyWPS development team has written a new version (called PyWPS-4) completely from scratch. The analysis of large raster datasets poses several technical issues in implementing the WPS standard. The data format has to be defined and validated on the server side and binary data have to be encoded using some numeric representation. Pulling raster data from remote servers introduces security risks, in addition, running several processes in parallel has to be possible, so that system resources are used efficiently while preserving security. Here we discuss these topics and illustrate some of the solutions adopted within the PyWPS implementation.
Multi-factor challenge/response approach for remote biometric authentication
NASA Astrophysics Data System (ADS)
Al-Assam, Hisham; Jassim, Sabah A.
2011-06-01
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.
Welfare benefits' screening and referral: a new direction for community nurses?
Hoskins, Robert; Carter, Diana E.
2000-11-01
The White Paper, Towards a Healthier Scotland considerably widens the community nursing scope for health promotion, as it recognises that disadvantaged life circumstances as well as unhealthy lifestyles contribute to poor health. It has been shown that income and health are interrelated. This evidence has demonstrated that it is not how rich a nation is that determines the overall health of its inhabitants; it is how equitably its wealth is distributed that counts: countries that have narrow income differentials tend to have better health. Both the income and health divide in Britain widened considerably between 1980 and 1992. It is argued that increasing income inequality leads to social isolation and chronic stress, which can impact on psycho-social pathways and damages life expectancy. This paper suggests that community nurses can address adverse life circumstances by finding ways of improving the economic status of their most vulnerable clients, and that one way of doing this would be to ensure that clients claim their full quota of welfare entitlement, given that there is several billion pounds of social security benefits that remain unclaimed in Britain every year.
Secure transport and adaptation of MC-EZBC video utilizing H.264-based transport protocols☆
Hellwagner, Hermann; Hofbauer, Heinz; Kuschnig, Robert; Stütz, Thomas; Uhl, Andreas
2012-01-01
Universal Multimedia Access (UMA) calls for solutions where content is created once and subsequently adapted to given requirements. With regard to UMA and scalability, which is required often due to a wide variety of end clients, the best suited codecs are wavelet based (like the MC-EZBC) due to their inherent high number of scaling options. However, most transport technologies for delivering videos to end clients are targeted toward the H.264/AVC standard or, if scalability is required, the H.264/SVC. In this paper we will introduce a mapping of the MC-EZBC bitstream to existing H.264/SVC based streaming and scaling protocols. This enables the use of highly scalable wavelet based codecs on the one hand and the utilization of already existing network technologies without accruing high implementation costs on the other hand. Furthermore, we will evaluate different scaling options in order to choose the best option for given requirements. Additionally, we will evaluate different encryption options based on transport and bitstream encryption for use cases where digital rights management is required. PMID:26869746
A Proposal of TLS Implementation for Cross Certification Model
NASA Astrophysics Data System (ADS)
Kaji, Tadashi; Fujishiro, Takahiro; Tezuka, Satoru
Today, TLS is widely used for achieving a secure communication system. And TLS is used PKI for server authentication and/or client authentication. However, its PKI environment, which is called as “multiple trust anchors environment,” causes the problem that the verifier has to maintain huge number of CA certificates in the ubiquitous network because the increase of terminals connected to the network brings the increase of CAs. However, most of terminals in the ubiquitous network will not have enough memory to hold such huge number of CA certificates. Therefore, another PKI environment, “cross certification environment”, is useful for the ubiquitous network. But, because current TLS is designed for the multiple trust anchors model, TLS cannot work efficiently on the cross-certification model. This paper proposes a TLS implementation method to support the cross certification model efficiently. Our proposal reduces the size of exchanged messages between the TLS client and the TLS server during the handshake process. Therefore, our proposal is suitable for implementing TLS in the terminals that do not have enough computing power and memory in ubiquitous network.
IVOA Credential Delegation Protocol Version 1.0
NASA Astrophysics Data System (ADS)
Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew
2010-02-01
The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.
OpenID connect as a security service in Cloud-based diagnostic imaging systems
NASA Astrophysics Data System (ADS)
Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter
2015-03-01
The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.
Douglas, Flora; Sapko, Jennifer; Kiezebrink, Kirsty; Kyle, Janet
2015-01-01
There is growing policy maker and public concern about current trends in food bank use in Scotland. Yet little is known about the experiences of those seeking help from food banks in this country. This research aimed to address this issue by studying the use and operation of a food bank situated in a rich northeast city during January and June 2014. The study aimed to establish who was seeking help from the food bank, their reasons for doing so, and what those who did thought of, and dealt with the food they received from it. Consequently, an audit of the food bank's client database, four months of participant observation based in the food bank, and seven face-to-face interviews with current and former food bank clients were conducted. The audit revealed that clients came from a range of socio-economic backgrounds, with men more likely to access it compared to women. Debt and social security benefit delays were cited as the main reasons for doing so. Qualitative data confirmed that sudden and unanticipated loss of income was a key driver of use. Resourcefulness in making donated food last as long as possible, keeping fuel costs low, and concern to minimise food waste were commonly described by participants. Desperation, gratitude, shame and powerlessness were also prevalent themes. Furthermore, clients were reluctant to ask for food they normally ate, as they were acutely aware that the food bank had little control over what it was able offer. Insights from this study suggest that recent UK policy proposals to address food poverty may have limited impact, without concomitant effort to address material disadvantage. Research is urgently required to determine the precise nature and extent of household level food insecurity in Scotland, and to consider monitoring for adverse physical and mental health outcomes for those affected by it.
Douglas, Flora; Sapko, Jennifer; Kiezebrink, Kirsty; Kyle, Janet
2015-01-01
There is growing policy maker and public concern about current trends in food bank use in Scotland. Yet little is known about the experiences of those seeking help from food banks in this country. This research aimed to address this issue by studying the use and operation of a food bank situated in a rich northeast city during January and June 2014. The study aimed to establish who was seeking help from the food bank, their reasons for doing so, and what those who did thought of, and dealt with the food they received from it. Consequently, an audit of the food bank's client database, four months of participant observation based in the food bank, and seven face-to-face interviews with current and former food bank clients were conducted. The audit revealed that clients came from a range of socio-economic backgrounds, with men more likely to access it compared to women. Debt and social security benefit delays were cited as the main reasons for doing so. Qualitative data confirmed that sudden and unanticipated loss of income was a key driver of use. Resourcefulness in making donated food last as long as possible, keeping fuel costs low, and concern to minimise food waste were commonly described by participants. Desperation, gratitude, shame and powerlessness were also prevalent themes. Furthermore, clients were reluctant to ask for food they normally ate, as they were acutely aware that the food bank had little control over what it was able offer. Insights from this study suggest that recent UK policy proposals to address food poverty may have limited impact, without concomitant effort to address material disadvantage. Research is urgently required to determine the precise nature and extent of household level food insecurity in Scotland, and to consider monitoring for adverse physical and mental health outcomes for those affected by it. PMID:29546112
Best Practices for the Security of Radioactive Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coulter, D.T.; Musolino, S.
2009-05-01
This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.« less
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2011-06-01
The new corporate approach to efficient processing and storage is migrating from in-house service-center services to the newly coined approach of Cloud Computing. This approach advocates thin clients and providing services by the service provider over time-shared resources. The concept is not new, however the implementation approach presents a strategic shift in the way organizations provision and manage their IT resources. The requirements on some of the data sets targeted to be run on the cloud vary depending on the data type, originator, user, and confidentiality level. Additionally, the systems that fuse such data would have to deal with the classifying the product and clearing the computing resources prior to allowing new application to be executed. This indicates that we could end up with a multi-level security system that needs to follow specific rules and can send the output to a protected network and systems in order not to have data spill or contaminated resources. The paper discusses these requirements and potential impact on the cloud architecture. Additionally, the paper discusses the unexpected advantages of the cloud framework providing a sophisticated environment for information sharing and data mining.
Zandi, Mitra; Vanaki, Zohreh; Shiva, Marziyeh; Mohammadi, Eesa; Bagheri-Lankarani, Narges
2016-07-01
Despite the increasing use of surrogacy, there are no caring theories/models that serve as the basis for nursing care to surrogacy commissioning mothers. This study has designed a model for caring of surrogacy commissioning mothers in 2013. The theory synthesis of Walker and Avant's strategies of theory construction (2011) was used to design a caring model/theory. The theory synthesis includes three stages: (i) selection of focal concept (the concept of "security giving in motherhood" was selected); (ii) review of studies in order to identify factors related to focal concept relevant studies (42 articles and 13 books) were reviewed, statements and concepts related to focal concept were then extracted and classified, and their relations were specified; and (iii) organization of concepts and statements within a relevant general and effective manifestation of the phenomenon under study which led to developing of a model. In this caring model/theory, entitled "security giving in surrogacy motherhood", nurses roles were conceptualized within the conceptual framework that includes three main roles: (i) coordination; (ii) participation; and (iii) security giving (physical, emotional, and legal support; empowerment; presence; relationship management between both parties and advocacy). Training surrogacy specialist nurses and establishment of surrogacy care centers are important factors for implementation of the model. This model could help to provided better caring for surrogacy clients, especially for commissioning mothers. © 2016 Japan Academy of Nursing Science.
Mo, Phoenix K H; Mak, Winnie W S; Kwok, Yvonne T Y; Xin, Meiqi; Chan, Charlie W L; Yip, Louise W M
2018-08-01
Young female sex workers (YFSWs) are confronted with significant threats during sex work. The present cross-sectional study examined different levels of threats (i.e., threats to life and health, threats to humanity, threats to control of work and financial security, and the threats to future) experienced by 87 YFSWs (age 16-25) in Hong Kong, and identified their association with mental health (i.e., psychological well-being) together with other factors, including childhood trauma, self-efficacy, hope, and social support. Results showed that the participants encountered a significant number of threats. More than half reported that they had a condom removed by clients during sex (51.7%); or have been humililated by clients (51.7%). Because of sex work, about a quarter (25.3%) have had sexually transmitted disease, and respectively 10.3% and 12.6% have had abortion and unplanned pregnancy. The majority have had friends found out that they engaged in sex work (72.4%). They also showed a high level of worry about the various threats. Multiple linear regression analysis showed that childhood trauma (β = -.26) and worry about threats during sex work (β = -.22) were significantly negative predictors, while self-efficacy (β = .20) and hope (β = .27) were significantly positive predictors of mental health. Future services should improve YFSWs' skills to minimize potential threats during female sex work, address the structural correlates and relieve their worries, and empower them with more hope and self-efficacy in choosing clients.
Distributed cyberinfrastructure tools for automated data processing of structural monitoring data
NASA Astrophysics Data System (ADS)
Zhang, Yilan; Kurata, Masahiro; Lynch, Jerome P.; van der Linden, Gwendolyn; Sederat, Hassan; Prakash, Atul
2012-04-01
The emergence of cost-effective sensing technologies has now enabled the use of dense arrays of sensors to monitor the behavior and condition of large-scale bridges. The continuous operation of dense networks of sensors presents a number of new challenges including how to manage such massive amounts of data that can be created by the system. This paper reports on the progress of the creation of cyberinfrastructure tools which hierarchically control networks of wireless sensors deployed in a long-span bridge. The internet-enabled cyberinfrastructure is centrally managed by a powerful database which controls the flow of data in the entire monitoring system architecture. A client-server model built upon the database provides both data-provider and system end-users with secured access to various levels of information of a bridge. In the system, information on bridge behavior (e.g., acceleration, strain, displacement) and environmental condition (e.g., wind speed, wind direction, temperature, humidity) are uploaded to the database from sensor networks installed in the bridge. Then, data interrogation services interface with the database via client APIs to autonomously process data. The current research effort focuses on an assessment of the scalability and long-term robustness of the proposed cyberinfrastructure framework that has been implemented along with a permanent wireless monitoring system on the New Carquinez (Alfred Zampa Memorial) Suspension Bridge in Vallejo, CA. Many data interrogation tools are under development using sensor data and bridge metadata (e.g., geometric details, material properties, etc.) Sample data interrogation clients including those for the detection of faulty sensors, automated modal parameter extraction.
Architectural design of a secure forensic state psychiatric hospital.
Dvoskin, Joel A; Radomski, Steven J; Bennett, Charles; Olin, Jonathan A; Hawkins, Robert L; Dotson, Linda A; Drewnicky, Irene N
2002-01-01
This article describes the architectural design of a secure forensic state psychiatric hospital. The project combined input from staff at all levels of the client organization, outside consultants, and a team of experienced architects. The design team was able to create a design that maximized patient dignity and privacy on one hand, and the ability of staff to observe all patient activity on the other. The design centers around 24-bed units, broken into smaller living wings of eight beds each. Each eight-bed living wing has its own private bathrooms (two) and showers (two), as well as a small living area solely reserved for these eight patients and their guests. An indoor-outdoor dayroom allows patients to go outside whenever they choose, while allowing staff to continue observing them. The heart of the facility is a large treatment mall, designed to foster the acquisition of social, emotional, cognitive, and behavioral skills that will help patients to safely return to their communities. Copyright 2002 John Wiley & Sons, Ltd.
Urassa, J A E
2012-03-01
The main objective of this study was to assess equity in access to health care provision under the Medicare Security for Small Scale Entrepreneurs (SSE). Methodological triangulation was used to an exploratory and randomized cross- sectional study in order to supplement information on the topic under investigation. Questionnaires were administered to 281 respondents and 6 Focus Group Discussions (FGDs) were held with males and females. Documentary review was also used. For quantitative aspect of the study, significant associations were measured using confidence intervals (95% CI) testing. Qualitative data were analyzed with assistance of Open code software. The results show that inequalities in access to health care services were found in respect to affordability of medical care costs, distance from home to health facilities, availability of drugs as well as medical equipments and supplies. As the result of existing inequalities some of clients were not satisfied with the provided health services. The study concludes by drawing policy and research implications of the findings.
Milan, M A; McKee, J M
1976-01-01
Two experiments were conducted (1) to explore the application of token reinforcement procedures in a maximum security correctional institution for adult male felons and (2) to determine to what extent the reinforcement procedures disrupted the day-to-day lives of inmate participants. In Experiment 1, an expanded reversal design revealed that the combination of praise and token reinforcement was more effective than the combinations of praise and noncontingent token award or direct commands on four common institutional activities. The latter two combinations were not found to be any more effective than praise alone. Experiment 2, which also employed a reversal design, indicated that the high levels of performance observed during the token reinforcement phases of Experiment 1 could be attained without subjecting participants to undue hardship in the form of increased deprivation of either social intercourse or the opportunity to engage in recreational and entertainment activities. Client safeguards are discussed in detail. PMID:977516
NASA Astrophysics Data System (ADS)
Kravitz, David William
This paper presents an insider's view of the rationale and the cryptographic mechanics of some principal elements of the Open Mobile Alliance (OMA) Secure Content Exchange (SCE) Technical Specifications. A primary goal is to enable implementation of a configurable methodology that quarantines the effects that unknown-compromised entities have on still-compliant entities in the system, while allowing import from upstream protection systems and multi-client reuse of Rights Objects that grant access to plaintext content. This has to be done without breaking compatibility with the underlying legacy OMA DRM v2.0/v2.1 Technical Specifications. It is also required that legacy devices can take at least partial advantage of the new import functionality, and can request the creation of SCE-compatible Rights Objects and utilize Rights Objects created upon request of SCE-conformant devices. This must be done in a way that the roles played by newly defined entities unrecognizable by legacy devices remain hidden.
Mantsios, Andrea; Galai, Noya; Mbwambo, Jessie; Likindikoki, Samuel; Shembilu, Catherine; Mwampashi, Ard; Beckham, S W; Leddy, Anna; Davis, Wendy; Sherman, Susan; Kennedy, Caitlin; Kerrigan, Deanna
2018-02-24
This study assessed the association between community savings group participation and consistent condom use (CCU) among female sex workers (FSW) in Iringa, Tanzania. Using cross-sectional data from a survey of venue-based FSW (n = 496), logistic regression was used to examine the associations between financial indicators including community savings group participation and CCU. Over one-third (35%) of the women participated in a savings group. Multivariable regression results indicated that participating in a savings group was significantly associated with nearly two times greater odds of CCU with new clients in the last 30 days (aOR = 1.77, 95% CI 1.10-2.86). Exploratory mediation analysis indicated that the relationship between savings group participation and CCU was partially mediated by financial security, as measured by monthly income. Findings indicate that community savings groups may play an important role in reducing sexual risk behaviors of FSW and hold promise as part of comprehensive, community-led HIV prevention strategies among FSW.
Wright, Lauri; Vance, Lauren; Sudduth, Christina; Epps, James B
2015-01-01
Maintaining independence and continuing to live at home is one solution to manage the rising health care costs of aging populations in the United States; furthermore, seniors are at risk of malnutrition and food insecurity. Home-delivered meal programs are a tool to address food, nutrition, and well-being concerns of this population. Few studies have identified outcomes from these programs; this pilot study reviews the nutritional status, dietary intake, well-being, loneliness, and food security levels of seniors participating in a Meals on Wheels delivery service. Clients, new to the meal program, participated in pre- and postphone interviews, and 51 seniors completed the study. The survey was composed of five scales or questionnaires, and statistical analyses were conducted using SPSS. Improvements across all five measures were statistically significant after participating two months in the home-delivered meal program. Implications for further research, practice, and the Older Americans Act are discussed.
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
NASA Astrophysics Data System (ADS)
Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes
We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.
Duncan, R G; Saperia, D; Dulbandzhyan, R; Shabot, M M; Polaschek, J X; Jones, D T
2001-01-01
The advent of the World-Wide-Web protocols and client-server technology has made it easy to build low-cost, user-friendly, platform-independent graphical user interfaces to health information systems and to integrate the presentation of data from multiple systems. The authors describe a Web interface for a clinical data repository (CDR) that was moved from concept to production status in less than six months using a rapid prototyping approach, multi-disciplinary development team, and off-the-shelf hardware and software. The system has since been expanded to provide an integrated display of clinical data from nearly 20 disparate information systems.
Web-Altairis: An Internet-Enabled Ground System
NASA Technical Reports Server (NTRS)
Miller, Phil; Coleman, Jason; Gemoets, Darren; Hughes, Kevin
2000-01-01
This paper describes Web-Altairis, an Internet-enabled ground system software package funded by the Advanced Automation and Architectures Branch (Code 588) of NASA's Goddard Space Flight Center. Web-Altairis supports the trend towards "lights out" ground systems, where the control center is unattended and problems are resolved by remote operators. This client/server software runs on most popular platforms and provides for remote data visualization using the rich functionality of the VisAGE toolkit. Web-Altairis also supports satellite commanding over the Internet. This paper describes the structure of Web-Altairis and VisAGE, the underlying technologies, the provisions for security, and our experiences in developing and testing the software.
Facilities and Infrastructure FY 2017 Budget At-A-Glance
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016-03-01
The Facilities and Infrastructure Program includes EERE’s capital investments, operations and maintenance, and site-wide support of the National Renewable Energy Laboratory (NREL). It is the nation’s only national laboratory with a primary mission dedicated to the research, development and demonstration (RD&D) of energy efficiency, renewable energy and related technologies. EERE is NREL’s steward, primary client and sponsor of NREL’s designation as a Federally Funded Research and Development Center. The Facilities and Infrastructure (F&I) budget maintains NREL’s research and support infrastructure, ensures availability for EERE’s use, and provides a safe and secure workplace for employees.
A data-management system using sensor technology and wireless devices for port security
NASA Astrophysics Data System (ADS)
Saldaña, Manuel; Rivera, Javier; Oyola, Jose; Manian, Vidya
2014-05-01
Sensor technologies such as infrared sensors and hyperspectral imaging, video camera surveillance are proven to be viable in port security. Drawing from sources such as infrared sensor data, digital camera images and processed hyperspectral images, this article explores the implementation of a real-time data delivery system. In an effort to improve the manner in which anomaly detection data is delivered to interested parties in port security, this system explores how a client-server architecture can provide protected access to data, reports, and device status. Sensor data and hyperspectral image data will be kept in a monitored directory, where the system will link it to existing users in the database. Since this system will render processed hyperspectral images that are dynamically added to the server - which often occupy a large amount of space - the resolution of these images is trimmed down to around 1024×768 pixels. Changes that occur in any image or data modification that originates from any sensor will trigger a message to all users that have a relation with the aforementioned. These messages will be sent to the corresponding users through automatic email generation and through a push notification using Google Cloud Messaging for Android. Moreover, this paper presents the complete architecture for data reception from the sensors, processing, storage and discusses how users of this system such as port security personnel can use benefit from the use of this service to receive secure real-time notifications if their designated sensors have detected anomalies and/or have remote access to results from processed hyperspectral imagery relevant to their assigned posts.
The peer review system (PRS) for quality assurance and treatment improvement in radiation therapy
NASA Astrophysics Data System (ADS)
Le, Anh H. T.; Kapoor, Rishabh; Palta, Jatinder R.
2012-02-01
Peer reviews are needed across all disciplines of medicine to address complex medical challenges in disease care, medical safety, insurance coverage handling, and public safety. Radiation therapy utilizes technologically advanced imaging for treatment planning, often with excellent efficacy. Since planning data requirements are substantial, patients are at risk for repeat diagnostic procedures or suboptimal therapeutic intervention due to a lack of knowledge regarding previous treatments. The Peer Review System (PRS) will make this critical radiation therapy information readily available on demand via Web technology. The PRS system has been developed with current Web technology, .NET framework, and in-house DICOM library. With the advantages of Web server-client architecture, including IIS web server, SOAP Web Services and Silverlight for the client side, the patient data can be visualized through web browser and distributed across multiple locations by the local area network and Internet. This PRS will significantly improve the quality, safety, and accessibility, of treatment plans in cancer therapy. Furthermore, the secure Web-based PRS with DICOM-RT compliance will provide flexible utilities for organization, sorting, and retrieval of imaging studies and treatment plans to optimize the patient treatment and ultimately improve patient safety and treatment quality.
Closing the (service) gap: exploring partnerships between Aboriginal and mainstream health services.
Taylor, Kate P; Thompson, Sandra C
2011-08-01
Although effective partnerships between Aboriginal and mainstream health services are critical to improve Aboriginal health outcomes, many factors can cause these partnerships to be tenuous and unproductive. Understanding the elements of best practice for successful partnerships is essential. A literature review was conducted in 2009 using keyword searches of electronic databases. Sourced literature was assessed for relevance regarding the benefits, challenges, lessons learnt and factors contributing to successful Aboriginal and mainstream partnerships. Key themes were collated. Although there is much literature regarding general partnerships generally, few specifically examine Aboriginal and mainstream health service partnerships. Twenty-four sources were reviewed in detail. Benefits include broadening service capacity and improving the cultural security of healthcare. Challenges include the legacy of Australia's colonial history, different approaches to servicing clients and resource limitations. Recommendations for success include workshopping tensions early, building trust and leadership. Although successful partnerships are crucial to optimise Aboriginal health outcomes, failed collaborations risk inflaming sensitive Aboriginal-non-Aboriginal relationships. Factors supporting successful partnerships remind us to develop genuine, trusting relationships that are tangibly linked to the Aboriginal community. Failure to invest in this relational process and push forward with 'business as usual' can ultimately have negative ramifications on client outcomes.
Detecting relay attacks on RFID communication systems using quantum bits
NASA Astrophysics Data System (ADS)
Jannati, Hoda; Ardeshir-Larijani, Ebrahim
2016-11-01
RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.
Data-Driven Software Framework for Web-Based ISS Telescience
NASA Technical Reports Server (NTRS)
Tso, Kam S.
2005-01-01
Software that enables authorized users to monitor and control scientific payloads aboard the International Space Station (ISS) from diverse terrestrial locations equipped with Internet connections is undergoing development. This software reflects a data-driven approach to distributed operations. A Web-based software framework leverages prior developments in Java and Extensible Markup Language (XML) to create portable code and portable data, to which one can gain access via Web-browser software on almost any common computer. Open-source software is used extensively to minimize cost; the framework also accommodates enterprise-class server software to satisfy needs for high performance and security. To accommodate the diversity of ISS experiments and users, the framework emphasizes openness and extensibility. Users can take advantage of available viewer software to create their own client programs according to their particular preferences, and can upload these programs for custom processing of data, generation of views, and planning of experiments. The same software system, possibly augmented with a subset of data and additional software tools, could be used for public outreach by enabling public users to replay telescience experiments, conduct their experiments with simulated payloads, and create their own client programs and other custom software.
Masseroli, M; Bonacina, S; Pinciroli, F
2004-01-01
The actual development of distributed information technologies and Java programming enables employing them also in the medical arena to support the retrieval, integration and evaluation of heterogeneous data and multimodal images in a web browser environment. With this aim, we used them to implement a client-server architecture based on software agents. The client side is a Java applet running in a web browser and providing a friendly medical user interface to browse and visualize different patient and medical test data, integrating them properly. The server side manages secure connections and queries to heterogeneous remote databases and file systems containing patient personal and clinical data. Based on the Java Advanced Imaging API, processing and analysis tools were developed to support the evaluation of remotely retrieved bioimages through the quantification of their features in different regions of interest. The Java platform-independence allows the centralized management of the implemented prototype and its deployment to each site where an intranet or internet connection is available. Giving healthcare providers effective support for comprehensively browsing, visualizing and evaluating medical images and records located in different remote repositories, the developed prototype can represent an important aid in providing more efficient diagnoses and medical treatments.
Sirepo for Synchrotron Radiation Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nagler, Robert; Moeller, Paul; Rakitin, Maksim
Sirepo is an open source framework for cloud computing. The graphical user interface (GUI) for Sirepo, also known as the client, executes in any HTML5 compliant web browser on any computing platform, including tablets. The client is built in JavaScript, making use of the following open source libraries: Bootstrap, which is fundamental for cross-platform web applications; AngularJS, which provides a model–view–controller (MVC) architecture and GUI components; and D3.js, which provides interactive plots and data-driven transformations. The Sirepo server is built on the following Python technologies: Flask, which is a lightweight framework for web development; Jinja, which is a secure andmore » widely used templating language; and Werkzeug, a utility library that is compliant with the WSGI standard. We use Nginx as the HTTP server and proxy, which provides a scalable event-driven architecture. The physics codes supported by Sirepo execute inside a Docker container. One of the codes supported by Sirepo is the Synchrotron Radiation Workshop (SRW). SRW computes synchrotron radiation from relativistic electrons in arbitrary magnetic fields and propagates the radiation wavefronts through optical beamlines. SRW is open source and is primarily supported by Dr. Oleg Chubar of NSLS-II at Brookhaven National Laboratory.« less
The working experiences of novice psychiatric nurses in Taiwanese culture: a phenomenological study.
Hung, B J; Huang, X Y; Cheng, J F; Wei, S J; Lin, M J
2014-08-01
Novice psychiatric nurses experience heavy workloads, insufficient training and support in Taiwan. The aim of this study was to understand the working experiences of novice psychiatric nurses during their first year in a clinical setting. A qualitative phenomenological approach, using semi-structured face-to-face interviews was used. Narratives were analyzed using Colaizzi's seven-step method. Data saturation was reached after interviews were conducted with 15 nurses based on the purposive sampling. Four themes and eight sub-themes were identified: struggling (lacking a sense of security and competency), emulating (learning the process of interaction with clients and families, learning an appropriate role from nursing staff), prevailing (developing core competency, creating a therapeutic environment) and belonging (coping with the job, becoming a part of the psychiatric nursing staff). The findings from this study demonstrate that nurses are often inadequately prepared for psychiatric nursing. They have little understanding of mental illness, are unable to communicate appropriately with clients and struggle to cope with the conditions. Our study supports the importance for helping nurses to improve their essential knowledge and skills for coping with the job and providing good quality care, particularly in the first year. © 2014 John Wiley & Sons Ltd.
A statistical investigation into the stability of iris recognition in diverse population sets
NASA Astrophysics Data System (ADS)
Howard, John J.; Etter, Delores M.
2014-05-01
Iris recognition is increasingly being deployed on population wide scales for important applications such as border security, social service administration, criminal identification and general population management. The error rates for this incredibly accurate form of biometric identification are established using well known, laboratory quality datasets. However, it is has long been acknowledged in biometric theory that not all individuals have the same likelihood of being correctly serviced by a biometric system. Typically, techniques for identifying clients that are likely to experience a false non-match or a false match error are carried out on a per-subject basis. This research makes the novel hypothesis that certain ethnical denominations are more or less likely to experience a biometric error. Through established statistical techniques, we demonstrate this hypothesis to be true and document the notable effect that the ethnicity of the client has on iris similarity scores. Understanding the expected impact of ethnical diversity on iris recognition accuracy is crucial to the future success of this technology as it is deployed in areas where the target population consists of clientele from a range of geographic backgrounds, such as border crossings and immigration check points.
McKim, Vicky L
2017-06-01
In the world of risk management, which encompasses the business continuity disciplines, many types of risk require evaluation. Financial risk is most often the primary focus, followed by product and market risks. Another critical area, which typically lacks a thorough review or may be overlooked, is operational risk. This category encompasses many risk exposure types including those around building structures and systems, environmental issues, nature, neighbours, clients, regulatory compliance, network, data security and so on. At times, insurance carriers will assess internal hazards, but seldom do these assessments include more than a cursory look at other types of operational risk. In heavily regulated environments, risk assessments are required but may not always include thorough assessments of operational exposures. Vulnerabilities may linger or go unnoticed, only to become the catalyst for a business disruption at a later time, some of which are so severe that business recovery becomes nearly impossible. Businesses may suffer loss of clients as the result of a prolonged disruption of services. Comprehensive operational risk assessments can assist in identifying such vulnerabilities, exposures and threats so that the risk can be minimised or removed. This paper lays out how an assessment of this type can be successfully conducted.
Bachelor, Alexandra; Laverdière, Olivier; Gamache, Dominick; Bordeleau, Vincent
2007-06-01
To gain a closer understanding of client collaboration and its determinants, the first goal of this study involved the investigation of clients' perceptions of collaboration using a discovery-oriented methodology. Content analysis of 30 clients' written descriptions revealed three different modes of client collaboration, labeled active, mutual, and therapist-dependent, which emphasized client initiative and active participation, joint participation, and reliance on therapists' contributions to the work and change process, respectively. The majority of clients valued the therapist's active involvement and also emphasized the helpfulness of their collaborative experiences. In general, the therapist actions and attitudes involved in clients' views of good collaboration varied among clients. A second goal was to examine the relationships between client psychological functioning, quality of interpersonal relationships, and motivation, and clients' collaborative contributions, as rated by clients and therapists. Of these, only motivation was significantly associated with client collaboration, particularly in the perceptions of therapists. (PsycINFO Database Record (c) 2010 APA, all rights reserved).
Müthing, Jannis; Jäschke, Thomas
2017-01-01
Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271
Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M
2017-10-18
Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.
Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid
2016-01-01
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques. PMID:27384239
Abdulhamid, Shafi'i Muhammad; Abd Latiff, Muhammad Shafie; Abdul-Salaam, Gaddafi; Hussain Madni, Syed Hamid
2016-01-01
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks
Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu
2017-01-01
Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users’ medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs’ applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs’ deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models. PMID:28475110
Li, Song; Cui, Jie; Zhong, Hong; Liu, Lu
2017-05-05
Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users' medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs' applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs' deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models.
Integrating nutrition security with treatment of people living with HIV: lessons from Kenya.
Byron, Elizabeth; Gillespie, Stuart; Nangami, Mabel
2008-06-01
The increased caloric requirements of HIV-positive individuals, undesirable side effects of treatment that may be worsened by malnutrition (but alleviated by nutritional support), and associated declines in adherence and possible increased drug resistance are all justifications for developing better interventions to strengthen the nutrition security of individuals receiving antiretroviral treatment. To highlight key benefits and challenges relating to interventions aimed at strengthening the nutrition security of people living with HIV who are receiving antiretroviral treatment. Qualitative research was undertaken on a short-term nutrition intervention linked to the provision of free antiretroviral treatment for people living with HIV in western Kenya in late 2005 and early 2006. Patients enrolled in the food program while on treatment regimens self-reported greater adherence to their medication, fewer side effects, and a greater ability to satisfy increased appetite. Most clients self-reported weight gain, recovery of physical strength, and the resumption of labor activities while enrolled in dual (food supplementation and treatment) programs. Such improvements were seen to catalyze increased support from family and community. These findings provide further empirical support to calls for a more holistic and comprehensive response to the coexistence of AIDS epidemics with chronic nutrition insecurity. Future work is needed to clarify ways of bridging the gap between short-term nutritional support to individuals and longer-term livelihood security programming for communities affected by AIDS. Such interdisciplinary research will need to be matched by intersectoral action on the part of the agriculture and health sectors in such environments.
Dreaming of you: client and therapist dreams about each other during psychodynamic psychotherapy.
Hill, Clara E; Knox, Sarah; Crook-Lyon, Rachel E; Hess, Shirley A; Miles, Joe; Spangler, Patricia T; Pudasaini, Sakar
2014-01-01
Our objectives were to describe the frequency of therapists' dreams about their clients and clients' dreams about their therapists, to determine how therapists and clients who had such dreams differed from those who did not have such dreams, whether therapy process and outcome differed for those who had and did not have such dreams, and to describe the content and consequences of these dreams. Thirteen doctoral student therapists conducted psychodynamic psychotherapy with 63 clients in a community clinic. Therapists who had dreams about clients had higher estimated and actual dream recall than did therapists who did not dream about clients. Qualitative analyses indicated that therapists' dreams yielded insights about the therapist, clients, and therapy; therapists used insights in their work with the clients. Among the clients, only two (who were particularly high in attachment anxiety and who feared abandonment from their therapists) reported dreams that were manifestly about their therapists. Therapists-in-training dreamed more about their clients than their clients dreamed about them. Dreams about clients can be used by therapists to understand themselves, clients, and the dynamics of the therapy relationship.
National Security Technology Incubation Strategic Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.« less
Kavanaugh, Megan L.; Frohwirth, Lori; Jerman, Jenna; Popkin, Ronna; Ethier, Kathleen
2013-01-01
Study objective To describe and explore provider- and patient-level perspectives regarding long-acting reversible contraception (LARC) for teens and young adults (ages 16-24). Methods Data collection occurred between June – December 2011. We first conducted telephone interviews with administrative directors at 20 publicly funded facilities that provide family planning services. At six of these sites, we conducted a total of six focus group discussions (FGDs) with facility staff and forty-eight in-depth interviews (IDIs) with facility clients ages 16-24. Results Staff in the FGDs did not generally equate being a teen with ineligibility for IUDs. In contrast to staff, one quarter of the young women did perceive young age as rendering them ineligible. Clients and staff agreed that the “forgettable” nature of the methods and their duration were some of LARC’s most significant advantages. They also agreed that fear of pain associated with both insertion and removal and negative side effects were disadvantages. Some aspects of IUDs and implants were perceived as advantages by some clients but disadvantages by others. Common challenges to providing LARC-specific services to younger patients included extra time required to counsel young patients about LARC methods, outdated clinic policies requiring multiple visits to obtain IUDs, and a perceived higher removal rate among young women. The most commonly cited strategy for addressing many of these challenges was securing supplementary funding to support the provision of these services to young patients. Conclusion Incorporating young women’s perspectives on LARC methods into publicly funded family planning facilities’ efforts to provide these methods to a younger population may increase their use among young women. PMID:23287602
Dcs Data Viewer, an Application that Accesses ATLAS DCS Historical Data
NASA Astrophysics Data System (ADS)
Tsarouchas, C.; Schlenker, S.; Dimitrov, G.; Jahn, G.
2014-06-01
The ATLAS experiment at CERN is one of the four Large Hadron Collider experiments. The Detector Control System (DCS) of ATLAS is responsible for the supervision of the detector equipment, the reading of operational parameters, the propagation of the alarms and the archiving of important operational data in a relational database (DB). DCS Data Viewer (DDV) is an application that provides access to the ATLAS DCS historical data through a web interface. Its design is structured using a client-server architecture. The pythonic server connects to the DB and fetches the data by using optimized SQL requests. It communicates with the outside world, by accepting HTTP requests and it can be used stand alone. The client is an AJAX (Asynchronous JavaScript and XML) interactive web application developed under the Google Web Toolkit (GWT) framework. Its web interface is user friendly, platform and browser independent. The selection of metadata is done via a column-tree view or with a powerful search engine. The final visualization of the data is done using java applets or java script applications as plugins. The default output is a value-over-time chart, but other types of outputs like tables, ascii or ROOT files are supported too. Excessive access or malicious use of the database is prevented by a dedicated protection mechanism, allowing the exposure of the tool to hundreds of inexperienced users. The current configuration of the client and of the outputs can be saved in an XML file. Protection against web security attacks is foreseen and authentication constrains have been taken into account, allowing the exposure of the tool to hundreds of users world wide. Due to its flexible interface and its generic and modular approach, DDV could be easily used for other experiment control systems.
Fantus, Sophia; Souleymanov, Rusty; Lachowsky, Nathan J; Brennan, David J
2017-11-03
Mobile applications and socio-sexual networking websites are used by outreach workers to respond synchronously to questions and provide information, resources, and referrals on sexual health and STI/HIV prevention, testing, and care to gay, bisexual and other men who have sex with men (GB2M). This exploratory study examined ethical issues identified by online outreach workers who conduct online sexual health outreach for GB2M. Semi-structured individual interviews were conducted between November 2013 and April 2014 with online providers and managers (n = 22) to explore the benefits, challenges, and ethical implications of delivering online outreach services in Ontario, Canada. Interviews were digitally recorded and transcribed verbatim. Thematic analyses were conducted, and member-checking, analyses by multiple coders, and peer debriefing supported validity and reliability. Four themes emerged on the ethical queries of providing online sexual health outreach for GB2M: (a) managing personal and professional boundaries with clients; (b) disclosing personal or identifiable information to clients; (c) maintaining client confidentiality and anonymity; and (d) security and data storage measures of online information. Participants illustrated familiarity with potential ethical challenges, and discussed ways in which they seek to mitigate and prevent ethical conflict. Implications of this analysis for outreach workers, researchers, bioethicists, and policy-makers are to: (1) understand ethical complexities associated with online HIV prevention and outreach for GB2M; (2) foster dialogue to recognize and address potential ethical conflict; and (3) identify competencies and skills to mitigate risk and promote responsive and accessible online HIV outreach.
Microcredit participation and nutrition outcomes among women in Peru.
Hamad, Rita; Fernald, Lia C H
2012-06-01
Microcredit services--the awarding of small loans to individuals who are too poor to take advantage of traditional financial services--are an increasingly popular scheme for poverty alleviation. Several studies have examined the ability of microcredit programmes to influence the financial standing of borrowers, but only a few studies have examined whether the added household income improves health and nutritional outcomes among household members. This study examined the hypothesis that longer participation in microcredit services would be associated with better nutritional status in women. Cross-sectional data were obtained in February 2007 from 1593 female clients of a microcredit organisation in Peru. The primary predictor variable was length of time as a microcredit client measured in number of completed loan cycles (range 0 to 5.5 years, average loan size US$350). The outcome variables were age-adjusted body mass index (BMI), haemoglobin levels (g/dl) and food insecurity measured using the US household food security survey module. Extensive data on demographic and socioeconomic status were also collected. Longer microcredit participation was associated with higher BMI (β=0.05, p=0.06), higher haemoglobin levels (β=0.07, p<0.01) and lower food insecurity (β=-0.13, p<0.01). With the inclusion of demographic and socioeconomic variables, the associations with higher haemoglobin (β=0.03, p=0.04) and lower food insecurity (β=-0.08, p<0.01) were sustained. This study supports the notion that microcredit participation has positive effects on the nutritional status of female clients. Further research should explore more definitive causal pathways through which these effects may occur and should examine the effects on other household members.
Kivlighan, Dennis M; Hill, Clara E; Gelso, Charles J; Baumann, Ellen
2016-03-01
We used the Actor Partner Interdependence Model (APIM; Kashy & Kenny, 2000) to examine the dyadic associations of 74 clients and 23 therapists in their evaluations of working alliance, real relationship, session quality, and client improvement over time in ongoing psychodynamic or interpersonal psychotherapy. There were significant actor effects for both therapists and clients, with the participant's own ratings of working alliance and real relationship independently predicting their own evaluations of session quality. There were significant client partner effects, with clients' working alliance and real relationship independently predicting their therapists' evaluations of session quality. The client partner real relationship effect was stronger in later sessions than in earlier sessions. Therapists' real relationship ratings (partner effect) were a stronger predictor of clients' session quality ratings in later sessions than in earlier sessions. Therapists' working alliance ratings (partner effect) were a stronger predictor of clients' session quality ratings when clients made greater improvement than when clients made lesser improvement. For clients' session outcome ratings, there were complex three-way interactions, such that both Client real relationship and working alliance interacted with client improvement and time in treatment to predict clients' session quality. These findings strongly suggest both individual and partner effects when clients and therapists evaluate psychotherapy process and outcome. Implications for research and practice are discussed. (c) 2016 APA, all rights reserved).
Mbuagbaw, Lawrence; Bonono-Momnougui, Renee-Cecile; Thabane, Lehana; Kouanfack, Charles; Smieja, Marek; Ongolo-Zogo, Pierre
2014-09-26
Mobile phone text messaging has been shown to improve adherence to antiretroviral therapy and to improve communication between patients and health care workers. It is unclear which strategies are most appropriate for scaling up text messaging programmes. We sought to investigate acceptability and readiness for ownership (community members designing, sending and receiving text messages) of a text message programme among a community of clients living with human immunodeficiency virus (HIV) in Yaoundé, Cameroon and to develop a framework for implementation. We used the mixed-methods sequential exploratory design. In the qualitative strand we conducted 7 focus group discussions (57 participants) to elicit themes related to acceptability and readiness. In the quantitative strand we explored the generalizability of these themes in a survey of 420 clients. Qualitative and quantitative data were merged to generate meta-inferences. Both qualitative and quantitative strands showed high levels of acceptability and readiness despite low rates of participation in other community-led projects. In the qualitative strand, compared to the quantitative strand, more potential service users were willing to pay for a text messaging service, preferred participation of health personnel in managing the project and preferred that the project be based in the hospital rather than in the community. Some of the limitations identified to implementing a community-owned project were lack of management skills in the community, financial, technical and literacy challenges. Participants who were willing to pay were more likely to find the project acceptable and expressed positive feelings about community readiness to own a text messaging project. Community ownership of a text messaging programme is acceptable to the community of clients at the Yaoundé Central Hospital. Our framework for implementation includes components for community members who take on roles as services users (demonstrating clear benefits, allowing a trial period and ensuring high levels of confidentiality) or service providers (training in project management and securing sustainable funding). Such a project can be evaluated using participation rate, clinical outcomes, satisfaction with the service, cost and feedback from users.
A Qualitative Exploration of the Use of Attachment Theory in Adult Psychological Therapy.
Burke, Eilish; Danquah, Adam; Berry, Katherine
2016-01-01
There is a growing interest into how attachment theory can inform psychotherapeutic practice with adults. This study aimed to explore how a group of therapists with an interest in attachment theory use it in their work with adult clients. A cross-sectional qualitative design was adopted. Sampling, data collection and analysis procedures were guided by grounded theory principles. Semi-structured telephone interviews were conducted with 12 therapists from a variety of training backgrounds. Data were coded and developed into thematic categories. Six primary themes were identified to describe how attachment theory influenced the clinical practice of the sample through the following: (i) complementing other therapeutic models; (ii) providing a framework to understand the development of clients' mental health problems; (iii) working with different attachment styles; (iv) thinking about the therapeutic relationship as an attachment relationship; (iv) influencing the different stages of the therapeutic process; and (vi) influencing clinical service design and delivery. It is concluded that attachment theory can play a significant role in influencing the practice of therapists and can be usefully adopted to complement therapeutic processes irrespective of the therapist's dominant clinical orientation. Further research is needed to explore the views of clinicians from different theoretical orientations and to investigate the security of the client-therapist attachment within the context of therapeutic change processes. Attachment theory may have implications for practice across a range of different types of therapy and may help therapists to bridge apparent differences between modality-specific formulation and techniques. Attachment theory can be used to understand the development of mental health problems. Therapists should assess and formulate clients' attachment styles, and these formulations should guide therapeutic approaches. Attachment theory provides a comprehensive framework for facilitating the therapist's attentiveness to relational issues and use of the therapeutic relationship as a fulcrum for change. The principles of attachment theory can be used to inform all stages of the therapeutic process, as well as the design and delivery of mental health services. Copyright © 2015 John Wiley & Sons, Ltd.
Secure data sharing in public cloud
NASA Astrophysics Data System (ADS)
Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.
2012-04-01
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
Exploring Windows Domain-Level Defenses Against Authentication Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, Jeff A.; Curtis, Laura
2016-01-01
We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary tomore » cause this response.« less
Protecting Patient Records from Unwarranted Access
NASA Astrophysics Data System (ADS)
Gardner, Ryan; Garera, Sujata; Rubin, Aviel D.; Rajan, Anand; Rozas, Carlos V.; Sastry, Manoj
Securing access to medical information is vital to protecting patient privacy. However, Electronic Patient Record (EPR) systems are vulnerable to a number of inside and outside threats. Adversaries can compromise EPR client machines to obtain a variety of highly sensitive information including valid EPR login credentials, without detection. Furthermore, medical staff can covertly view records of their choosing for personal interest or more malicious purposes. In particular, we observe that the lack of integrity measurement and auditability in these systems creates a potential threat to the privacy of patient information. We explore the use of virtualization and trusted computing hardware to address these problems. We identify open problems and encourage further research in the area.
NASA Astrophysics Data System (ADS)
Garcia-Gonzalez, Juan P.; Gacitua-Decar, Geronica; Pahl, Claus
Providing mobility to participants of business processes is an increasing trend in the banking sector. Independence of a physical place to interact with clients, while been able to use the information managed in the banking applications is one, of the benefits of mobile business processes. Challenges arising from this approach include to deal with a scenario of occasionally connected communication; security issues regarding the exposition of internal information on devices-that could be lost-; and restrictions on the capacity of mobile devices. This paper presents our experience in implementing a service-based architecture solution to extend centralised resources from a financial institution to a mobile platform.
NASA Astrophysics Data System (ADS)
Widiyanto, Sigit; Setyawan, Aris Budi; Tarigan, Avinanta; Sussanto, Herry
2016-02-01
The increase of the number of business impact on the increasing service requirements for companies and Small Medium Enterprises (SMEs) in submitting their license request. The service system that is needed must be able to accommodate a large number of documents, various institutions, and time limitations of applicant. In addition, it is also required distributed applications which is able to be integrated each other. Service oriented application fits perfectly developed along client-server application which has been developed by the Government to digitalize submitted data. RESTful architecture and MVC framework are embedded in developing application. As a result, the application proves its capability in solving security, transaction speed, and data accuracy issues.
Hammar, Teija; Perälä, Marja-Leena; Rissanen, Pekka
2009-03-01
The aim of the study was to compare clients' and named home care (HC) workers' perceptions of clients' functional ability (FA) and need for help and to analyse which client- and municipality-related factors are associated with perceptions of client's FA. The total of 686 Finnish HC clients was interviewed in 2001. Further, the questionnaire was sent to 686 HC workers. FA was assessed by activities of daily living (ADL), which included both basic/physical (PADL) and instrumental (IADL) activities. The association between client's FA and municipality-related variables was analysed by using hierarchical logistic regression models. The findings indicated that clients' and HC-workers' perceptions about what the clients were able to do were similar in the PADL functions, but perceptions differed when it comes to the IADL functions for mobility and in climbing stairs. A smaller proportion of clients compared with HC workers assessed themselves to be in need of help in all ADL functions. Use of home help and bathing services increased the probability of belonging to the 'poor' FA class while living alone and small size of municipality decreased the probability. The study indicates that although clients and workers assessed client's FA fairly similarly, there were major differences in perceptions concerning clients' needs for help in ADL functions. Clients' and workers' shared view of need for help forms a basis for high-quality care. Therefore, the perception of both the clients and workers must be taken into account when planning care and services. There was also variation in clients' FA between municipalities, although only the size of municipality had some association with the variation. The probability that clients with a lower FA are cared for in HC is higher if the clients live in large- rather than small-sized municipalities. This may reflect a better mix of services and resources in large-sized municipalities.
Improving publicly funded substance abuse treatment: the value of case management.
Shwartz, M; Baker, G; Mulvey, K P; Plough, A
1997-01-01
OBJECTIVES: This study evaluated the impact of case management on client retention in treatment and short-term relapse for clients in the publicly funded substance abuse treatment system. METHODS: A retrospective cohort design was used to study clients discharged from the following four modalities in 1993 and 1994: short-term residential (3112 clients), long-term residential (2888 clients), outpatient (7431 clients), and residential detox (7776 clients). Logistic regression models were used to analyze the impact of case management after controlling for baseline characteristics. RESULTS: The odds that case-managed clients reached a length of stay previously identified as associated with more successful treatment were 1.6 (outpatient programs) to 3.6 (short-term residential programs) times higher than the odds for non-case-managed clients. With the exception of outpatient clients, the odds of case-managed clients' being admitted to detox within 90 days after discharge (suggesting relapse) were about two thirds those of non-case-managed clients. The odds of case-managed detox clients' transitioning to post-detox treatment (a good outcome) were 1.7 times higher than the odds for non-case-managed clients. CONCLUSIONS: Case management is a low-cost enhancement that improves short-term outcomes of substance abuse treatment programs. PMID:9357349
The development and validation of the client expectations of massage scale.
Boulanger, Karen T; Campo, Shelly; Glanville, Jennifer L; Lowe, John B; Yang, Jingzhen
2012-01-01
Although there is evidence that client expectations influence client outcomes, a valid and reliable scale for measuring the range of client expectations for both massage therapy and the behaviors of their massage therapists does not exist. Understanding how client expectations influence client outcomes would provide insight into how massage achieves its reported effects. To develop and validate the Client Expectations of Massage Scale (CEMS), a measure of clients' clinical, educational, interpersonal, and outcome expectations. Offices of licensed massage therapists in Iowa. A practice-based research methodology was used to collect data from two samples of massage therapy clients. For Sample 1, 21 volunteer massage therapists collected data from their clients before the massage. Factor analysis was conducted to test construct validity and coefficient alpha was used to assess reliability. Correlational analyses with the CEMS, previous measures of client expectations, and the Life Orientation Test-Revised were examined to test the convergent and discriminant validity of the CEMS. For Sample 2, 24 massage therapists distributed study materials for clients to complete before and after a massage therapy session. Structural equation modeling was used to assess the construct, discriminant, and predictive validity of the CEMS. Sample 1 involved 320 and Sample 2 involved 321 adult massage clients. Standard care provided by licensed massage therapists. Numeric Rating Scale for pain and Positive and Negative Affect Schedule-Revised (including the Serenity subscale). The CEMS demonstrated good construct, convergent, discriminant and predictive validity, and adequate reliability. Client expectations were generally positive toward massage and their massage therapists. Positive outcome expectations had a positive effect on clients' changes in pain and serenity. High interpersonal expectations had a negative effect on clients' changes in serenity. Client expectations contribute to the nonspecific effects of massage therapy.
The Meaning of Work and Love: Career Issues and Interventions.
ERIC Educational Resources Information Center
Savickas, Mark L.
1991-01-01
To help clients increase career success and life satisfaction, counselors can elicit and examine clients' concepts about work and love. If client's personal meanings conflict with social meaning of work and love, counselors can link client beliefs to client's career concerns, provoking cognitive dissonance that motivates client to modify beliefs.…
49 CFR 1103.23 - Confidences of a client.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 8 2010-10-01 2010-10-01 false Confidences of a client. 1103.23 Section 1103.23... Responsibilities Toward A Client § 1103.23 Confidences of a client. (a) The practitioner's duty to preserve his client's confidence outlasts the practitioner's employment by the client, and this duty extends to the...
Request queues for interactive clients in a shared file system of a parallel computing system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bent, John M.; Faibish, Sorin
Interactive requests are processed from users of log-in nodes. A metadata server node is provided for use in a file system shared by one or more interactive nodes and one or more batch nodes. The interactive nodes comprise interactive clients to execute interactive tasks and the batch nodes execute batch jobs for one or more batch clients. The metadata server node comprises a virtual machine monitor; an interactive client proxy to store metadata requests from the interactive clients in an interactive client queue; a batch client proxy to store metadata requests from the batch clients in a batch client queue;more » and a metadata server to store the metadata requests from the interactive client queue and the batch client queue in a metadata queue based on an allocation of resources by the virtual machine monitor. The metadata requests can be prioritized, for example, based on one or more of a predefined policy and predefined rules.« less
Melese, Tadele; Gebrehiwot, Yirgu; Bisetegne, Daniel; Habte, Dereje
2014-01-01
Introduction Patients perception about service quality shapes their confidence with regard to use of the available health care facility. This study is aimed to assess the client`s satisfaction in a maternal health care setting. Methods This is an institution based cross sectional descriptive study. A total of 423 postpartum women were interviewed. Data was analyzed using SPSS version 20 statistical package. Results The proportion of mothers who are completely satisfied with health care ranges between 2.4 to 21%. Pain control was the poorest source of satisfaction with 82% reporting dissatisfaction. Provider's communication with clients yielded complete satisfaction rates ranging between 0.7 to 26%. Inadequate information about the drug prescribed and explanation of procedures to be done to the client were found to be major causes of dissatisfaction. The complete satisfaction rate with environmental factor of the hospital was between 3.3 to 40.2%. Age of the client, educational status, income of the client and client's address away from Addis Ababa were found to be the predictors of client satisfaction. Provider's attitude and communication, as well as longer duration of stay in the ward were independent predictors of client satisfaction. Conclusion Pain management, client privacy and client provider communication need to be addressed to ensure the satisfaction of maternity clients. The clients need to be involved in the management of their own health problems. PMID:25018826
Debyser, Bart; Grypdonck, Mieke H F; Defloor, Tom; Verhaeghe, Sofie T L
2011-02-01
Even though the central position of the client has been recognized in psychiatric nursing education, the client is seldom formally involved in the feedback provided to students during practical training. This research paper focuses on three questions: (1) What conditions support the gathering of meaningful client feedback to enhance the student's learning process and client's wellbeing? (2) Does the use of the practical model for client feedback lead to positive experiences, and if so, under what conditions? (3) To what extent is a client's feedback on the student's work performance, consistent with feedback from the mentor (nurse from the ward), the teacher and the student? Based on a literature review, participatory observation and contacts with experts, a practical model was developed to elicit client feedback. Using this model in two psychiatric inpatient services, clients were actively and formally involved in providing feedback to four, final year psychiatric nursing students. Clients, nurses, teachers and students were interviewed and data were analysed using a qualitative explorative research approach. Analyses revealed that client feedback becomes meaningful in a safe environment created by the psychiatric nurse. Client feedback generates a learning effect for the student and supports the student's recognition of the value and vulnerability of the psychiatric client. Copyright © 2010 Elsevier Ltd. All rights reserved.
Martin, Linda; Gitsels-van der Wal, Janneke T; Pereboom, Monique T R; Spelten, Evelien R; Hutton, Eileen K; van Dulmen, Sandra
2016-01-01
This study focuses on facilitation of clients' psychosocial communication during prenatal counseling for fetal anomaly screening. We assessed how psychosocial communication by clients is related to midwives' psychosocial and affective communication, client-directed gaze and counseling duration. During 184 videotaped prenatal counseling consultations with 20 Dutch midwives, verbal psychosocial and affective behavior was measured by the Roter Interaction Analysis System (RIAS). We rated the duration of client-directed gaze. We performed multilevel analyses to assess the relation between clients' psychosocial communication and midwives' psychosocial and affective communication, client-directed gaze and counseling duration. Clients' psychosocial communication was higher if midwives' asked more psychosocial questions and showed more affective behavior (β=0.90; CI: 0.45-1.35; p<0.00 and β=1.32; CI: 0.18-2.47; p=0.025, respectively). Clients "psychosocial communication was not related to midwives" client-directed gaze. Additionally, psychosocial communication by clients was directly, positively related to the counseling duration (β=0.59; CI: 0.20-099; p=0.004). In contrast with our expectations, midwives' client-directed gaze was not related with psychosocial communication of clients. In addition to asking psychosocial questions, our study shows that midwives' affective behavior and counseling duration is likely to encourage client's psychosocial communication, known to be especially important for facilitating decision-making. Copyright © 2015 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.
Policy reform dilemmas in promoting employment of persons with severe mental illness.
Noble, J H
1998-06-01
Recent evaluations by the U.S. General Accounting Office and the National Alliance for the Mentally Ill of reemployment efforts of the federal-state vocational rehabilitation program found that services offered by state vocational rehabilitation agencies do not produce long-term earnings for clients with emotional or physical disabilities. This paper examines reasons for these poor outcomes and the implications of recent policy reform recommendations. Congress must decide whether to take action at the federal level to upgrade programs affecting persons with severe mental illnesses or to continue to rely on state decision making. The federal-state program largely wastes an estimated $490 million annually on time-limited services to consumers with mental illnesses. Rechanneled into a variety of innovative and more appropriate integrated services models, the money could buy stable annual vocational rehabilitation funding for 62,000 to 90,000 consumers with severe mental illnesses. Larger macrosystem problems involve the dynamics of the labor market that limit job opportunities and the powerful work disincentives for consumers with severe disabilities now inherent in Social Security Disability Insurance, Supplemental Security Income, Medicare, and Medicaid.
DNA Compass: a secure, client-side site for navigating personal genetic information
Curnin, Charles; Gordon, Assaf; Erlich, Yaniv
2017-01-01
Abstract Motivation: Millions of individuals have access to raw genomic data using direct-to-consumer companies. The advent of large-scale sequencing projects, such as the Precision Medicine Initiative, will further increase the number of individuals with access to their own genomic information. However, querying genomic data requires a computer terminal and computational skill to analyze the data—an impediment for the general public. Results: DNA Compass is a website designed to empower the public by enabling simple navigation of personal genomic data. Users can query the status of their genomic variants for over 1658 markers or tens of millions of documented single nucleotide polymorphisms (SNPs). DNA Compass presents the relevant genotypes of the user side-by-side with explanatory scientific resources. The genotype data never leaves the user’s computer, a feature that provides improved security and performance. More than 12 000 unique users, mainly from the general genetic genealogy community, have already used DNA Compass, demonstrating its utility. Availability and Implementation: DNA Compass is freely available on https://compass.dna.land. Contact: yaniv@cs.columbia.edu PMID:28334237
Ultrabroadband photonic internet: safety aspects
NASA Astrophysics Data System (ADS)
Kalicki, Arkadiusz; Romaniuk, Ryszard
2008-11-01
Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.
Spiegel, Allen D; Kavaler, Florence
2004-02-01
An improperly healed fracture was the most common reason for the medical malpractice crisis between the 1830s and 1860s in the United States. As a practicing lawyer in Illinois, Abraham Lincoln defended physicians in medical malpractice law suits. One of these was Dr. Powers Ritchey, who was sued for malpractice in 1855. Lincoln agreed to represent Dr. Ritchey in 1858 as the case was appealed to the supreme court of Illinois. In the interim, Lincoln defended two indicted murderers and won acquittals for both. Between the two murder trials, Lincoln debated Stephen A. Douglas while running for U.S. Senator from Illinois. Lincoln believed that Ritchey's case was poorly represented in the lower court. Ritchey's prior attorneys did not file a bill of exceptions to the testimony of the plaintiff's expert medical witnesses. Lincoln attempted to rebut the allegation of a lack of reasonable medical care and diligence by Ritchey, and he sought to secure a new trial for his client. In its decision, the supreme court of Illinois did not find any error and affirmed the lower court's judgment.
Taylor, John L; Thorne, Ian; Robertson, Alison; Avery, Ginny
2002-01-01
The extent to which people with intellectual disabilities (ID) set fires is difficult to ascertain. However, services working with people with ID and offending or quasi-offending histories are increasing the amount of attention that they give to this difficult and perplexing issue. This is due to the real and perceived threat that it presents to society and the seriousness with which it viewed by the criminal justice system. Against this background there is very little available in the research literature concerning treatment interventions for fire-setting behaviour in this client group, and even less regarding their effectiveness. In the current study 14 men and women with mild and borderline ID, convictions for arson and detained in a hospital low secure service were offered and completed a broadly cognitive behavioural, approximately 40-session group-based intervention. The treatment was aimed primarily at reducing fire interest and attitudes associated with fire-setting behaviour. Participants were assessed pre- and post-treatment on a number of fire-specific, anger, self-esteem and depression measures. Following treatment, significant improvements were found in all areas assessed, excepting depression. Despite the limitations of the study design, the results provide encouragement and some guidance to practitioners who are required to develop interventions for this challenging, yet much neglected client group.
Enhancing Web applications in radiology with Java: estimating MR imaging relaxation times.
Dagher, A P; Fitzpatrick, M; Flanders, A E; Eng, J
1998-01-01
Java is a relatively new programming language that has been used to develop a World Wide Web-based tool for estimating magnetic resonance (MR) imaging relaxation times, thereby demonstrating how Java may be used for Web-based radiology applications beyond improving the user interface of teaching files. A standard processing algorithm coded with Java is downloaded along with the hypertext markup language (HTML) document. The user (client) selects the desired pulse sequence and inputs data obtained from a region of interest on the MR images. The algorithm is used to modify selected MR imaging parameters in an equation that models the phenomenon being evaluated. MR imaging relaxation times are estimated, and confidence intervals and a P value expressing the accuracy of the final results are calculated. Design features such as simplicity, object-oriented programming, and security restrictions allow Java to expand the capabilities of HTML by offering a more versatile user interface that includes dynamic annotations and graphics. Java also allows the client to perform more sophisticated information processing and computation than is usually associated with Web applications. Java is likely to become a standard programming option, and the development of stand-alone Java applications may become more common as Java is integrated into future versions of computer operating systems.
Attachment-informed therapy for adults: Towards a unifying perspective on practice.
Berry, Katherine; Danquah, Adam
2016-03-01
We aimed to provide an integrated overview of the key goals and strategies of an attachment-informed psychotherapy by summarizing the literature describing the clinical implications of attachment theory for psychological therapy for adults. We carried out a narrative thematic review of 58 texts from a diverse range of therapeutic schools, until we agreed that we had reached a saturation of themes. We identified six key themes: Changing internal working models; the therapeutic relationship and creating a secure base; formulating and processing relationship experiences; countertransference; separation, termination and boundary issues; and working with different attachment styles or patterns. We discuss empirical evidence in relation to each theme and highlight areas for research. Attachment theory provides a useful framework to inform psychological therapy with adults, but there is a pressing need for further research to empirically demonstrate the 'added value' of an attachment perspective. Attachment theory should be used to inform individual psychological therapy in adulthood. From the outset of their careers, therapists should receive training and supervision to enhance their awareness of their own and their clients' attachment experiences and how these play out during therapy. There is a need for greater empirical research to investigate whether the degree to which therapists formulate and meet clients' attachment needs influences outcomes. © 2015 The British Psychological Society.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nagler, Robert; Moeller, Paul
Sirepo is an open source framework for cloud computing. The graphical user interface (GUI) for Sirepo, also known as the client, executes in any HTML5 compliant web browser on any computing platform, including tablets. The client is built in JavaScript, making use of the following open source libraries: Bootstrap, which is fundamental for cross-platform web applications; AngularJS, which provides a model–view–controller (MVC) architecture and GUI components; and D3.js, which provides interactive plots and data-driven transformations. The Sirepo server is built on the following Python technologies: Flask, which is a lightweight framework for web development; Jin-ja, which is a secure andmore » widely used templating language; and Werkzeug, a utility library that is compliant with the WSGI standard. We use Nginx as the HTTP server and proxy, which provides a scalable event-driven architecture. The physics codes supported by Sirepo execute inside a Docker container. One of the codes supported by Sirepo is Warp. Warp is a particle-in-cell (PIC) code de-signed to simulate high-intensity charged particle beams and plasmas in both the electrostatic and electromagnetic regimes, with a wide variety of integrated physics models and diagnostics. At pre-sent, Sirepo supports a small subset of Warp’s capabilities. Warp is open source and is part of the Berkeley Lab Accelerator Simulation Toolkit.« less
Bendou, Hocine; Sizani, Lunga; Reid, Tim; Swanepoel, Carmen; Ademuyiwa, Toluwaleke; Merino-Martinez, Roxana; Meuller, Heimo; Abayomi, Akin
2017-01-01
A laboratory information management system (LIMS) is central to the informatics infrastructure that underlies biobanking activities. To date, a wide range of commercial and open-source LIMSs are available and the decision to opt for one LIMS over another is often influenced by the needs of the biobank clients and researchers, as well as available financial resources. The Baobab LIMS was developed by customizing the Bika LIMS software (www.bikalims.org) to meet the requirements of biobanking best practices. The need to implement biobank standard operation procedures as well as stimulate the use of standards for biobank data representation motivated the implementation of Baobab LIMS, an open-source LIMS for Biobanking. Baobab LIMS comprises modules for biospecimen kit assembly, shipping of biospecimen kits, storage management, analysis requests, reporting, and invoicing. The Baobab LIMS is based on the Plone web-content management framework. All the system requirements for Plone are applicable to Baobab LIMS, including the need for a server with at least 8 GB RAM and 120 GB hard disk space. Baobab LIMS is a server–client-based system, whereby the end user is able to access the system securely through the internet on a standard web browser, thereby eliminating the need for standalone installations on all machines. PMID:28375759
Bendou, Hocine; Sizani, Lunga; Reid, Tim; Swanepoel, Carmen; Ademuyiwa, Toluwaleke; Merino-Martinez, Roxana; Meuller, Heimo; Abayomi, Akin; Christoffels, Alan
2017-04-01
A laboratory information management system (LIMS) is central to the informatics infrastructure that underlies biobanking activities. To date, a wide range of commercial and open-source LIMSs are available and the decision to opt for one LIMS over another is often influenced by the needs of the biobank clients and researchers, as well as available financial resources. The Baobab LIMS was developed by customizing the Bika LIMS software ( www.bikalims.org ) to meet the requirements of biobanking best practices. The need to implement biobank standard operation procedures as well as stimulate the use of standards for biobank data representation motivated the implementation of Baobab LIMS, an open-source LIMS for Biobanking. Baobab LIMS comprises modules for biospecimen kit assembly, shipping of biospecimen kits, storage management, analysis requests, reporting, and invoicing. The Baobab LIMS is based on the Plone web-content management framework. All the system requirements for Plone are applicable to Baobab LIMS, including the need for a server with at least 8 GB RAM and 120 GB hard disk space. Baobab LIMS is a server-client-based system, whereby the end user is able to access the system securely through the internet on a standard web browser, thereby eliminating the need for standalone installations on all machines.
Duff, Putu; Deering, Kathleen; Gibson, Kate; Tyndall, Mark; Shannon, Kate
2011-08-12
Drawing on data from a community-based prospective cohort study in Vancouver, Canada, we examined the prevalence and individual, interpersonal and work environment correlates of homelessness among 252 women in street-based sex work. Bivariate and multivariate logistic regression using generalized estimating equations (GEE) was used to examine the individual, interpersonal and work environment factors that were associated with homelessness among street-based sex workers. Among 252 women, 43.3% reported homelessness over an 18-month follow-up period. In the multivariable GEE logistic regression analysis, younger age (adjusted odds ratio [aOR] = 0.93; 95%confidence interval [95%CI] 0.93-0.98), sexual violence by non-commercial partners (aOR = 2.14; 95%CI 1.06-4.34), servicing a higher number of clients (10+ per week vs < 10) (aOR = 1.68; 95%CI 1.05-2.69), intensive, daily crack use (aOR = 1.65; 95%CI 1.11-2.45), and servicing clients in public spaces (aOR = 1.52; CI 1.00-2.31) were independently associated with sleeping on the street. These findings indicate a critical need for safer environment interventions that mitigate the social and physical risks faced by homeless FSWs and increase access to safe, secure housing for women.
NASA Astrophysics Data System (ADS)
Masseroli, Marco; Pinciroli, Francesco
2000-12-01
To provide easy retrieval, integration and evaluation of multimodal cardiology images and data in a web browser environment, distributed application technologies and java programming were used to implement a client-server architecture based on software agents. The server side manages secure connections and queries to heterogeneous remote databases and file systems containing patient personal and clinical data. The client side is a Java applet running in a web browser and providing a friendly medical user interface to perform queries on patient and medical test dat and integrate and visualize properly the various query results. A set of tools based on Java Advanced Imaging API enables to process and analyze the retrieved cardiology images, and quantify their features in different regions of interest. The platform-independence Java technology makes the developed prototype easy to be managed in a centralized form and provided in each site where an intranet or internet connection can be located. Giving the healthcare providers effective tools for querying, visualizing and evaluating comprehensively cardiology medical images and records in all locations where they can need them- i.e. emergency, operating theaters, ward, or even outpatient clinics- the developed prototype represents an important aid in providing more efficient diagnoses and medical treatments.
ERIC Educational Resources Information Center
Barker, Narviar Cathcart
1979-01-01
Clients' and potential clients' evaluations of counselors are influenced by either sex or race. Concluded that although some difference did occur in the interaction effects between client race, client sex, counselor sex, and counselor race, race and sex of counselors are significant variables for some clients. (Author)
31 CFR 10.28 - Return of client's records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Return of client's records. 10.28... § 10.28 Return of client's records. (a) In general, a practitioner must, at the request of a client, promptly return any and all records of the client that are necessary for the client to comply with his or...
ERIC Educational Resources Information Center
Mallinckrodt, Brent
1991-01-01
Collected survey data from 102 client-counselor dyads with regard to client and counselor third-session working alliance ratings, quality of clients' current social relationships, and clients' representations of care and overprotection in memories of childhood emotional bonds with parents. Social support was significant predictor of client-rated…
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations.
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is “frankencerts,” synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired—a low-risk, often ignored error—but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations. PMID:25404868
Bandara, Sachini N; Daumit, Gail L; Kennedy-Hendricks, Alene; Linden, Sarah; Choksy, Seema; McGinty, Emma E
2018-04-01
Community mental health providers' attitudes toward criminal justice-involved clients with serious mental illness were examined. A total of 627 Maryland psychiatric rehabilitation program providers responded to a survey (83% response rate). Measures assessed providers' experience with, positive regard for, and perceptions of similarity, with their clients with serious mental illness. Chi-square tests were used to compare providers' attitudes toward clients with and without criminal justice involvement. Providers reported lower regard for criminal justice-involved clients than for clients without such involvement. Providers were less likely to report having a great deal of respect for clients with (79%) versus without (95%) criminal justice involvement. On all items that measured providers' perceived similarity with their clients, less than 50% of providers rated themselves as similar, regardless of clients' criminal justice status. Future research should explore how providers' attitudes toward criminal justice-involved clients influence service delivery for this group.
Laing, G L; Bruce, J L; Skinner, D L; Allorto, N L; Clarke, D L; Aldous, C
2014-06-01
The Pietermaritzburg Metropolitan Trauma Service previously successfully constructed and implemented an electronic surgical registry (ESR). This study reports on our attempts to expand and develop this concept into a multi-functional hybrid electronic medical record (HEMR) system for use in a tertiary level surgical service. This HEMR system was designed to incorporate the function and benefits of an ESR, an electronic medical record (EMR) system, and a clinical decision support system (CDSS). Formal ethical approval to maintain the HEMR system was obtained. Appropriate software was sourced to develop the project. The data model was designed as a relational database. Following the design and construction process, the HEMR file was launched on a secure server. This provided the benefits of access security and automated backups. A systematic training program was implemented for client training. The exercise of data capture was integrated into the process of clinical workflow, taking place at multiple points in time. Data were captured at the times of admission, operative intervention, endoscopic intervention, adverse events (morbidity), and the end of patient care (discharge, transfer, or death). A quarterly audit was performed 3 months after implementation of the HEMR system. The data were extracted and audited to assess their quality. A total of 1,114 patient entries were captured in the system. Compliance rates were in the order of 87-100 %, and client satisfaction rates were high. It is possible to construct and implement a unique, simple, cost-effective HEMR system in a developing world surgical service. This information system is unique in that it combines the discrete functions of an EMR system with an ESR and a CDSS. We identified a number of potential limitations and developed interventions to ameliorate them. This HEMR system provides the necessary platform for ongoing quality improvement programs and clinical research.
Controlling Infrastructure Costs: Right-Sizing the Mission Control Facility
NASA Technical Reports Server (NTRS)
Martin, Keith; Sen-Roy, Michael; Heiman, Jennifer
2009-01-01
Johnson Space Center's Mission Control Center is a space vehicle, space program agnostic facility. The current operational design is essentially identical to the original facility architecture that was developed and deployed in the mid-90's. In an effort to streamline the support costs of the mission critical facility, the Mission Operations Division (MOD) of Johnson Space Center (JSC) has sponsored an exploratory project to evaluate and inject current state-of-the-practice Information Technology (IT) tools, processes and technology into legacy operations. The general push in the IT industry has been trending towards a data-centric computer infrastructure for the past several years. Organizations facing challenges with facility operations costs are turning to creative solutions combining hardware consolidation, virtualization and remote access to meet and exceed performance, security, and availability requirements. The Operations Technology Facility (OTF) organization at the Johnson Space Center has been chartered to build and evaluate a parallel Mission Control infrastructure, replacing the existing, thick-client distributed computing model and network architecture with a data center model utilizing virtualization to provide the MCC Infrastructure as a Service. The OTF will design a replacement architecture for the Mission Control Facility, leveraging hardware consolidation through the use of blade servers, increasing utilization rates for compute platforms through virtualization while expanding connectivity options through the deployment of secure remote access. The architecture demonstrates the maturity of the technologies generally available in industry today and the ability to successfully abstract the tightly coupled relationship between thick-client software and legacy hardware into a hardware agnostic "Infrastructure as a Service" capability that can scale to meet future requirements of new space programs and spacecraft. This paper discusses the benefits and difficulties that a migration to cloud-based computing philosophies has uncovered when compared to the legacy Mission Control Center architecture. The team consists of system and software engineers with extensive experience with the MCC infrastructure and software currently used to support the International Space Station (ISS) and Space Shuttle program (SSP).
The D3 Middleware Architecture
NASA Technical Reports Server (NTRS)
Walton, Joan; Filman, Robert E.; Korsmeyer, David J.; Lee, Diana D.; Mak, Ron; Patel, Tarang
2002-01-01
DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid-dynamics) model executions. DARWIN captures, stores and indexes data; manages derived knowledge (such as visualizations across multiple datasets); and provides an environment for designers to collaborate in the analysis of test results. DARWIN is an interesting application because it supports high-volumes of data. integrates multiple modalities of data display (e.g., images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and views of data. Here we provide an overview of the architecture of D3, the third generation of DARWIN. Earlier versions of DARWIN were characterized by browser-based interfaces and a hodge-podge of server technologies: CGI scripts, applets, PERL, and so forth. But browsers proved difficult to control, and a proliferation of computational mechanisms proved inefficient and difficult to maintain. D3 substitutes a pure-Java approach for that medley: A Java client communicates (though RMI over HTTPS) with a Java-based application server. Code on the server accesses information from JDBC databases, distributed LDAP security services, and a collaborative information system. D3 is a three tier-architecture, but unlike 'E-commerce' applications, the data usage pattern suggests different strategies than traditional Enterprise Java Beans - we need to move volumes of related data together, considerable processing happens on the client, and the 'business logic' on the server-side is primarily data integration and collaboration. With D3, we are extending DARWIN to handle other data domains and to be a distributed system, where a single login allows a user transparent access to test results from multiple servers and authority domains.
Emotional congruence between clients and therapists and its effect on treatment outcome.
Atzil-Slonim, Dana; Bar-Kalifa, Eran; Fisher, Hadar; Peri, Tuvia; Lutz, Wolfgang; Rubel, Julian; Rafaeli, Eshkol
2018-01-01
The present study aimed to (a) explore 2 indices of emotional congruence-temporal similarity and directional discrepancy-between clients' and therapists' ratings of their emotions as they cofluctuate session-by-session; and (b) examine whether client/therapist emotional congruence predicts clients' symptom relief and improved functioning. The sample comprised 109 clients treated by 62 therapists in a university setting. Clients and therapists self-reported their negative (NE) and positive emotions (PE) after each session. Symptom severity and functioning level were assessed at the beginning of each session using the clients' self-reports. To assess emotional congruence, an adaptation of West and Kenny's (2011) Truth and Bias model was applied. To examine the consequences of emotional congruence, polynomial regression, and response surface analyses were conducted (Edwards & Parry, 1993). Clients and therapists were temporally similar in both PE and NE. Therapists experienced less intense PE on average, but did not experience more or less intense NE than their clients. Those therapists who experienced more intense NE than their clients were more temporally similar in their emotions to their clients. Therapist/client incongruence in both PE and NE predicted poorer next-session symptomatology; incongruence in PE was also associated with lower client next-session functioning. Session-level symptoms were better when therapists experienced more intense emotions (both PE and NE) than their clients. The findings highlight the importance of recognizing the dynamic nature of emotions in client-therapist interactions and the contribution of session-by-session emotional dynamics to outcomes. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Perceived Counselor Characteristics, Client Expectations, and Client Satisfaction with Counseling.
ERIC Educational Resources Information Center
Heppner, P. Paul; Heesacker, Martin
1983-01-01
Examined interpersonal influence process within counseling including relationship between perceived counselor expertness, attractiveness, and trustworthiness and client satisfaction; between client expectations on perceived counselor expertness, attractiveness, trustworthiness, and client satisfaction; and effects of actual counselor experience…
Mutual powerlessness in client participation practices in mental health care.
Broer, Tineke; Nieboer, Anna P; Bal, Roland
2014-04-01
Client participation has become a dominant policy goal in many countries including the Netherlands and is a topic much discussed in the literature. The success of client participation is usually measured in terms of the extent to which clients have a say in the participation process. Many articles have concluded that client participation is limited; professionals often still control the participation process and outcomes. The objective of this study is to gain insight into (i) the practice of client participation within a quality improvement collaborative in mental health care and (ii) the consequences of a Foucauldian conceptualization of power in analysing practices of client participation. We used an ethnographic design consisting of observations of national events and improvement team meetings and interviews with the collaborative's team members and programme managers. Contrary to many studies on client participation, we found both clients and service providers frequently felt powerless in its practice. Professionals and clients alike struggled with the contributions clients could make to the improvement processes and what functions they should fulfil. Moreover, professionals did not want to exert power upon clients, but ironically just for that reason sometimes struggled with shaping practices of client participation. This mutual powerlessness (partly) disappeared when clients helped to determine and execute specific improvement actions instead of participating in improvement teams. Recognizing that power is inescapable might allow for a more substantive discussion concerning the consequences that power arrangements produce, rather than looking at who is exerting how much power. © 2012 John Wiley & Sons Ltd.
An Application Server for Scientific Collaboration
NASA Astrophysics Data System (ADS)
Cary, John R.; Luetkemeyer, Kelly G.
1998-11-01
Tech-X Corporation has developed SciChat, an application server for scientific collaboration. Connections are made to the server through a Java client, that can either be an application or an applet served in a web page. Once connected, the client may choose to start or join a session. A session includes not only other clients, but also an application. Any client can send a command to the application. This command is executed on the server and echoed to all clients. The results of the command, whether numerical or graphical, are then distributed to all of the clients; thus, multiple clients can interact collaboratively with a single application. The client is developed in Java, the server in C++, and the middleware is the Common Object Request Broker Architecture. In this system, the Graphical User Interface processing is on the client machine, so one does not have the disadvantages of insufficient bandwidth as occurs when running X over the internet. Because the server, client, and middleware are object oriented, new types of servers and clients specialized to particular scientific applications are more easily developed.
Novel Advancements in Internet-Based Real Time Data Technologies
NASA Technical Reports Server (NTRS)
Myers, Gerry; Welch, Clara L. (Technical Monitor)
2002-01-01
AZ Technology has been working with MSFC Ground Systems Department to find ways to make it easier for remote experimenters (RPI's) to monitor their International Space Station (ISS) payloads in real-time from anywhere using standard/familiar devices. AZ Technology was awarded an SBIR Phase I grant to research the technologies behind and advancements of distributing live ISS data across the Internet. That research resulted in a product called "EZStream" which is in use on several ISS-related projects. Although the initial implementation is geared toward ISS, the architecture and lessons learned are applicable to other space-related programs. This paper presents the high-level architecture and components that make up EZStream. A combination of commercial-off-the-shelf (COTS) and custom components were used and their interaction will be discussed. The server is powered by Apache's Jakarta-Tomcat web server/servlet engine. User accounts are maintained in a My SQL database. Both Tomcat and MySQL are Open Source products. When used for ISS, EZStream pulls the live data directly from NASA's Telescience Resource Kit (TReK) API. TReK parses the ISS data stream into individual measurement parameters and performs on-the- fly engineering unit conversion and range checking before passing the data to EZStream for distribution. TReK is provided by NASA at no charge to ISS experimenters. By using a combination of well established Open Source, NASA-supplied. and AZ Technology-developed components, operations using EZStream are robust and economical. Security over the Internet is a major concern on most space programs. This paper describes how EZStream provides for secure connection to and transmission of space- related data over the public Internet. Display pages that show sensitive data can be placed under access control by EZStream. Users are required to login before being allowed to pull up those web pages. To enhance security, the EZStream client/server data transmissions can be encrypted to preclude interception. EZStream was developed to make use of a host of standard platforms and protocols. Each are discussed in detail in this paper. The I3ZStream server is written as Java Servlets. This allows different platforms (i.e. Windows, Unix, Linux . Mac) to host the server portion. The EZStream client component is written in two different flavors: JavaBean and ActiveX. The JavaBean component is used to develop Java Applet displays. The ActiveX component is used for developing ActiveX-based displays. Remote user devices will be covered including web browsers on PC#s and scaled-down displays for PDA's and smart cell phones. As mentioned. the interaction between EZStream (web/data server) and TReK (data source) will be covered as related to ISS. EZStream is being enhanced to receive and parse binary data stream directly. This makes EZStream beneficial to both the ISS International Partners and non-NASA applications (i.e. factory floor monitoring). The options for developing client-side display web pages will be addressed along with the development of tools to allow creation of display web pages by non-programmers.
Discrimination against Obese Exercise Clients: An Experimental Study of Personal Trainers.
Fontana, Fabio; Bopes, Jonathan; Bendixen, Seth; Speed, Tyler; George, Megan; Mack, Mick
2018-01-01
The aim of the study was to compare exercise recommendations, attitudes, and behaviors of personal trainers toward clients of different weight statuses. Fifty-two personal trainers participated in the study. The data collection was organized into two phases. In phase one, trainers read a profile and watched the video displaying an interview of either an obese or an average-weight client. Profiles and video interviews were identical except for weight status. Then, trainers provided exercise recommendations and rated their attitude toward the client. In phase two, trainers personally met an obese or an average-weight mock client. Measures were duration and number of advices provided by the trainer to a question posed by the client and sitting distance between trainer and client. There were no significant differences in exercise intensity ( p = .94), duration of first session ( p = .65), and total exercise duration of first week ( p = .76) prescribed to the obese and average-weight clients. The attitude of the personal trainers toward the obese client were not significantly different from the attitude of personal trainers toward the average-weight client ( p = .58). The number of advices provided ( p = .49), the duration of the answer ( p = .55), and the distance personal trainers sat from the obese client ( p = .68) were not significantly different from the behaviors displayed toward the average-weight client. Personal trainers did not discriminate against obese clients in professional settings.
Client Engagement Characteristics Associated with Problem Gambling Treatment Outcomes
ERIC Educational Resources Information Center
Dowling, Nicki A.; Cosic, Sanja
2011-01-01
Previous research examining the factors associated with problem gambling treatment outcomes has examined client factors and to date, treatment characteristics, therapist factors, and client-therapist interactions have essentially remained unexplored. This study aimed to investigate how client engagement variables (client-rated therapeutic…
Ziguras, Stephen; Klimidis, Steven; Lewis, James; Stuart, Geoff
2003-04-01
Research in the United States has indicated that matching clients from a minority group with clinicians from the same ethnic background increases use of community mental health services and reduces use of emergency services. This study assessed the effects of matching clients from a non-English-speaking background with bilingual, bicultural clinicians in a mental health system in Australia that emphasizes community-based psychiatric case management. In an overall sample of 2,935 clients served in the western region of Melbourne from 1997 to 1999, ethnic minority clients from a non-English-speaking background who received services from a bilingual, bicultural case manager were compared with ethnic minority clients who did not receive such services and with clients from an English-speaking background. The clients' engagement with three types of services-community care teams, psychiatric crisis teams, and psychiatric inpatient services-was assessed. Compared with ethnic minority clients who were not matched with a bilingual clinician, those who were matched generally had a longer duration and greater frequency of contact with community care teams and a shorter duration and lower frequency of contact with crisis teams. Clients born in Vietnam who were matched with a bilingual clinician had a shorter annual mean length of hospital stay and a lower annual mean frequency of hospital admission than Australian-born clients. The benefits of matching clients with psychiatric case managers on the basis of ethnic background include a lower level of need for crisis intervention and, for clients from some ethnic groups, fewer inpatient interventions. These Australian results support findings of the effectiveness of client-clinician ethnic matching in the United States.
NASA Astrophysics Data System (ADS)
Kadhem, Hasan; Amagasa, Toshiyuki; Kitagawa, Hiroyuki
Encryption can provide strong security for sensitive data against inside and outside attacks. This is especially true in the “Database as Service” model, where confidentiality and privacy are important issues for the client. In fact, existing encryption approaches are vulnerable to a statistical attack because each value is encrypted to another fixed value. This paper presents a novel database encryption scheme called MV-OPES (Multivalued — Order Preserving Encryption Scheme), which allows privacy-preserving queries over encrypted databases with an improved security level. Our idea is to encrypt a value to different multiple values to prevent statistical attacks. At the same time, MV-OPES preserves the order of the integer values to allow comparison operations to be directly applied on encrypted data. Using calculated distance (range), we propose a novel method that allows a join query between relations based on inequality over encrypted values. We also present techniques to offload query execution load to a database server as much as possible, thereby making a better use of server resources in a database outsourcing environment. Our scheme can easily be integrated with current database systems as it is designed to work with existing indexing structures. It is robust against statistical attack and the estimation of true values. MV-OPES experiments show that security for sensitive data can be achieved with reasonable overhead, establishing the practicability of the scheme.
Counselor Responsiveness to Client Religiousness.
ERIC Educational Resources Information Center
Kelly, Eugene W., Jr.
1990-01-01
Presents eight categories of client attitudes toward religion and suggests opportunities for religiously oriented counselor responses. Uses four categories to describes how religion may be associated with specific client issues. Contends that an informed appreciation of clients' religiousness and the religious dimensions of many client issues can…
ERIC Educational Resources Information Center
Kim, Bryan S. K.; Ng, Gladys F.; Ahn, Annie J.
2005-01-01
After assessing their expectation for counseling success, adherence to Asian cultural values, and adherence to European American cultural values, 88 Asian American volunteer clients with personal concerns engaged in single-session counseling with 1 of 11 female counselors who either matched or mismatched the client's worldview. Clients in the…
Public health nurses' supervision of clients in Norway.
Tveiten, S; Severinsson, E
2005-09-01
The aim of this study was to explore and describe what public health nurses (PHNs) understand by client supervision and how they perform it. The main principles of the health promotion discourse initiated by the World Health Organization (WHO) over the last 20-30 years are client participation and the view of the client as expert. Supervision is one relevant intervention strategy in the empowerment process, in which these principles play a central role. There is a lack of research pertaining to the intervention models employed by PHNs. Twenty-three transcribed audiotaped dialogues between PHNs and their clients were analysed by means of qualitative content analysis. What the PHNs understand by supervision and how they perform it can be described by three themes: continuity in relationships and reflexivity in the supervision approach, communicating with the client about his/her needs, problems and worries; and the organization of client supervision. The PHNs in this study understand client supervision as communication and relationships with clients on the subject of a healthy lifestyle, child development and coping with everyday life. The PHNs' approach to client supervision seemed to include aspects of empowerment by means of client participation and the view of the client as expert. However, the PHNs themselves had an expert role.
Companion animal veterinarians' use of clinical communication skills.
McArthur, M L; Fitzgerald, J R
2013-09-01
To describe the communication techniques used by clients and veterinarians during companion animal visits in Australia. A cross-sectional descriptive study. A total of 64 veterinary consultations were audiotaped and analysed with the Roter Interaction Analysis System (RIAS); clients completed appointment level measures, including their satisfaction and perceptions of relational communication. Participants were 24 veterinarians and 64 clients. Statements intended to reassure clients were expressed frequently in the consultations, but in 59% of appointments empathy statements were not expressed towards either the client or the patient. In 10% of appointments, veterinarians did not used any open-ended questions. Overall client satisfaction was high and veterinarians' expressions of empathy directed to the client resulted in higher levels of client satisfaction. Clients' perceptions of relational communication were related to several veterinarian and client nonverbal scales. A focus on developing evidence-based clinical communication skills is expected to further enhance the veterinarian-client-patient relationship and associated clinical outcomes. Particular recommendations include the development of a broader emotion-handling repertoire, increased emphasis on the use of open-ended enquiry, including assessment of the client's perspective, as well as attention to aspects of nonverbal communication. The study provides preliminary evidence for the importance of verbal expressions of empathy during the companion animal consultation. © 2013 Australian Veterinary Association.
Moors, François; Zech, Emmanuelle
2017-01-01
The purpose of this study was to examine the effects of psychotherapists' behaviors during a first simulated therapy session on clients' satisfaction, including their intention to pursue or drop out from therapy. The importance of psychotherapists' warmth on clients' satisfaction was examined to check previous findings stressing this determining factor. Examining the role of warm behaviors is however insufficient according to the interpersonal perspective. We therefore tested the role of the psychotherapist's agentic behaviors since only a few studies provide contradictory results about the role of this interpersonal dimension on clients' satisfaction and how it is influenced by matching up client and therapist's profiles. To test our hypotheses and control for alternative therapy-related explanatory variables, we used different videos as experimental conditions manipulating the therapist's behaviors. Seventy-five participants had to imagine themselves as potential clients arriving for a first therapy session. They successively watched a role-playing therapist behaving according to five randomized interpersonal profiles. Results confirmed that warmth was a major dimension predicting client satisfaction. They revealed that agency was also a determinant of client satisfaction and that its effects depended on the client's own interpersonal agentic profile. Dominant clients were found to be more satisfied with the dominant psychotherapist than the submissive one while submissive clients preferred only the warm psychotherapist. These findings are discussed and suggest that therapists may need to be flexible and adapt their behaviors according to their client's interpersonal profile to increase their client satisfaction and decrease drop outs. PMID:29163262
Mutual powerlessness in client participation practices in mental health care
Broer, Tineke; Nieboer, Anna P.; Bal, Roland
2012-01-01
Abstract Background Client participation has become a dominant policy goal in many countries including the Netherlands and is a topic much discussed in the literature. The success of client participation is usually measured in terms of the extent to which clients have a say in the participation process. Many articles have concluded that client participation is limited; professionals often still control the participation process and outcomes. Objective The objective of this study is to gain insight into (i) the practice of client participation within a quality improvement collaborative in mental health care and (ii) the consequences of a Foucauldian conceptualization of power in analysing practices of client participation. Design We used an ethnographic design consisting of observations of national events and improvement team meetings and interviews with the collaborative’s team members and programme managers. Results Contrary to many studies on client participation, we found both clients and service providers frequently felt powerless in its practice. Professionals and clients alike struggled with the contributions clients could make to the improvement processes and what functions they should fulfil. Moreover, professionals did not want to exert power upon clients, but ironically just for that reason sometimes struggled with shaping practices of client participation. This mutual powerlessness (partly) disappeared when clients helped to determine and execute specific improvement actions instead of participating in improvement teams. Conclusion Recognizing that power is inescapable might allow for a more substantive discussion concerning the consequences that power arrangements produce, rather than looking at who is exerting how much power. PMID:22390793
Van de Velde, Dominique; Devisch, Ignaas; De Vriendt, Patricia
2016-08-01
Purpose To explore the perspectives of male clients in a neurological rehabilitation setting with regard to the occupational therapy they have received and the client-centred approach. Method This study involved a qualitative research design based on the grounded theory tradition. Individual in-depth interviews were used to collect data. Data were analysed using a constant comparative method. Seven male participants from an inpatient neurological setting were included using a theoretical sampling technique. Results Three themes emerged to describe the approach of the therapists to client-centred practice: (a) a shared biomedical focus as the start of the rehabilitation process, (b) the un-simultaneous shift from a biomedical towards a psycho-social focus and (c) formal versus informal nature of gathering client information. Conclusion A client-centred approach entails a shift from the therapist focussing on recovery from the short-term neurological issues towards the long-term consequences of the disease. According to the client, this shift in reasoning must occur at a specific and highly subjective moment during the rehabilitation process. Identifying this moment could strengthen the client-centred approach. Implications for Rehabilitation Client-centred practice entails a shift from recovering the short-term neurological issues towards the long-term psycho-social consequences of the disease. To be effective in client-centred practice, the clients expect from the professional to be an authority with regard to biomedical issues and to be partner with regard to psycho-social issues. Client-centred practice is most likely to be successful when client is susceptible to discuss his psycho-social issues and finding this moment is a challenge for the professional. Using formal methods for goal setting do not necessarily cover all the information needed for a client-centred therapy programme. Rather, using informal methods could lead to a more valid image of the client.
49 CFR 1103.22 - Restraining clients from improprieties.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 8 2010-10-01 2010-10-01 false Restraining clients from improprieties. 1103.22... Practitioner's Duties and Responsibilities Toward A Client § 1103.22 Restraining clients from improprieties. A practitioner should see that his clients act with the same restraint that the practitioner himself uses...
37 CFR 10.65 - Limiting business relations with a client.
Code of Federal Regulations, 2010 CFR
2010-07-01
... with a client. 10.65 Section 10.65 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... a client. A practitioner shall not enter into a business transaction with a client if they have differing interests therein and if the client expects the practitioner to exercise professional judgment...
29 CFR 402.11 - Attorney-client communications exempted.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 2 2010-07-01 2010-07-01 false Attorney-client communications exempted. 402.11 Section 402... LABOR-MANAGEMENT STANDARDS LABOR ORGANIZATION INFORMATION REPORTS § 402.11 Attorney-client... communicated to such attorney by any of his clients in the course of a legitimate attorney-client relationship. ...
34 CFR 370.40 - What are allowable costs?
Code of Federal Regulations, 2010 CFR
2010-07-01
... AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION CLIENT ASSISTANCE PROGRAM What Post-Award... in § 370.4, the cost of travel in connection with the provision to a client or client applicant of... if the attendant must accompany the client or client applicant. (d) The State and the designated...
14 CFR 1261.317 - Attorney-client privilege.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Attorney-client privilege. 1261.317 Section... Injury or Death-Accruing On or After January 18, 1967 § 1261.317 Attorney-client privilege. (a) Attorneys... traditional attorney-client relationship with the employee with respect to application of the attorney-client...
49 CFR 1103.15 - The practitioner's duty to clients, generally.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 8 2010-10-01 2010-10-01 false The practitioner's duty to clients, generally... Practitioner's Duties and Responsibilities Toward A Client § 1103.15 The practitioner's duty to clients... all clients to observe the statutory law to the best of his knowledge or as interpreted by competent...
34 CFR 370.44 - What reporting requirement applies to each designated agency?
Code of Federal Regulations, 2010 CFR
2010-07-01
... (Continued) OFFICE OF SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION CLIENT... designated agency from clients or client applicants; (d) The number of the requests for advocacy services from clients or client applicants that the designated agency was unable to serve; (e) The reasons that...
37 CFR 10.68 - Avoiding influence by others than the client.
Code of Federal Regulations, 2010 CFR
2010-07-01
... than the client. 10.68 Section 10.68 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... the client. (a) Except with the consent of the practitioner's client after full disclosure, a practitioner shall not: (1) Accept compensation from one other than the practitioner's client for the...
32 CFR 776.4 - Attorney-client relationships.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Attorney-client relationships. 776.4 Section 776... General § 776.4 Attorney-client relationships. (a) The executive agency to which assigned (DON in most cases) is the client served by each covered USG attorney unless detailed to represent another client by...
29 CFR 403.9 - Attorney-client communications exempted.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 2 2010-07-01 2010-07-01 false Attorney-client communications exempted. 403.9 Section 403... LABOR-MANAGEMENT STANDARDS LABOR ORGANIZATION ANNUAL FINANCIAL REPORTS § 403.9 Attorney-client... communicated to such attorney by any of his clients in the course of a legitimate attorney-client relationship. ...
32 CFR 776.33 - Client under a disability.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Client under a disability. 776.33 Section 776.33... of Professional Conduct § 776.33 Client under a disability. (a) Client under a disability: (1) When a client's ability to make adequately considered decisions in connection with the representation is...
29 CFR 404.5 - Attorney-client communications exempted.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 2 2010-07-01 2010-07-01 false Attorney-client communications exempted. 404.5 Section 404... LABOR-MANAGEMENT STANDARDS LABOR ORGANIZATION OFFICER AND EMPLOYEE REPORTS § 404.5 Attorney-client... communicated to such attorney by any of his clients in the course of a legitimate attorney-client relationship. ...
Silver, Ken
2005-06-01
Nurses make a bureaucracy work on behalf of clients. Occupational health nurses who are already versed in basic concepts applicable to EEOICPA--confidence intervals, occupational histories, exposure assessment, and dose response--can play constructive, caring roles in assisting claimants in securing benefits under this landmark program. Occupational health nurses know that chronically ill employees have a finite number of hours a week to make phone calls, visit providers, and advocate on their own behalf. Thoughtful referrals to occupational health providers who are both experienced and supportive can come from an occupational health nurse or a family physician. Involvement of university-based programs in projects to empower organizations representing EEOICP claimants would be a welcome development.
NASA Astrophysics Data System (ADS)
Zhao, Ben; Garbacki, Paweł; Gkantsidis, Christos; Iamnitchi, Adriana; Voulgaris, Spyros
After a decade of intensive investigation, peer-to-peer computing has established itself as an accepted research eld in the general area of distributed systems. Peer-to- peer computing can be seen as the democratization of computing over throwing traditional hierarchical designs favored in client-server systems largely brought about by last-mile network improvements which have made individual PCs rst-class citizens in the network community. Much of the early focus in peer-to-peer systems was on best-effort le sharing applications. In recent years, however, research has focused on peer-to-peer systems that provide operational properties and functionality similar to those shown by more traditional distributed systems. These properties include stronger consistency, reliability, and security guarantees suitable to supporting traditional applications such as databases.
EZStream: Distributing Live ISS Experiment Telemetry via Internet
NASA Technical Reports Server (NTRS)
Myers, Gerry; Welch, Clara L. (Technical Monitor)
2002-01-01
This paper will present the high-level architecture and components of the current version of EZStream as well as the product direction & enhancements to be incorporated through a Phase II grant. Security will be addressed such as data encryption and user login. Remote user devices will be discussed including web browsers on PC's and displays on PDA's and smart cell phones. The interaction between EZStream and TReK will be covered as well as the eventuality of EZStream to receive and parse binary data streams directly. This makes EZStream beneficial to both the International Partners and non-NASA applications. The options of developing client-side display web pages will be addressed and the development of new tools to allow creation of display web pages by non-programmers.
International trade and waste and fuel managment issue, 2008
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agnihotri, Newal
The focus of the January-February issue is on international trade and waste and fuel managment. Major articles/reports in this issue include: A global solution for clients, by Yves Linz, AREVA NP; A safer, secure and economical plant, by Andy White, GE Hitachi Nuclear; Robust global prospects, by Ken Petrunik, Atomic Energy of Canada Limited; Development of NPPs in China, by Chen Changbing and Li Huiqiang, Huazhong University of Science and Technology; Yucca Mountain update; and, A class of its own, by Tyler Lamberts, Entergy Nuclear. The Industry Innovation articles in this issue are: Fuel assembly inspection program, by Jim Lemons,more » Tennessee Valley Authority; and, Improved in-core fuel shuffle for reduced refueling duration, by James Tusar, Exelon Nuclear.« less
77 FR 17367 - Permissible Sharing of Client Records by Customs Brokers
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-26
...-0038] RIN 1651-AA80 Permissible Sharing of Client Records by Customs Brokers AGENCY: U.S. Customs and... would allow brokers, upon the client's consent in a written authorization, to share client information... services to the broker's clients. Although the proposed rule was prepared in response to a request from a...
34 CFR 377.1 - What is the Demonstration Projects to Increase Client Choice Program?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 34 Education 2 2010-07-01 2010-07-01 false What is the Demonstration Projects to Increase Client... PROJECTS TO INCREASE CLIENT CHOICE PROGRAM General § 377.1 What is the Demonstration Projects to Increase Client Choice Program? The Demonstration Projects to Increase Client Choice Program is designed to...
32 CFR 776.28 - Conflict of interest: Former client.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Conflict of interest: Former client. 776.28... ADVOCATE GENERAL Rules of Professional Conduct § 776.28 Conflict of interest: Former client. (a) Conflict of interest: Former client. A covered attorney who has represented a client in a matter shall not...
34 CFR 370.20 - What must be included in a request for a grant?
Code of Federal Regulations, 2010 CFR
2010-07-01
... SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION CLIENT ASSISTANCE PROGRAM How Does... rights of clients or client applicants within the State. (2) The authority to pursue remedies described... in the State will advise all clients and client applicants of the existence of the CAP, the services...
31 CFR 10.21 - Knowledge of client's omission.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Knowledge of client's omission. 10.21... § 10.21 Knowledge of client's omission. A practitioner who, having been retained by a client with respect to a matter administered by the Internal Revenue Service, knows that the client has not complied...
37 CFR 10.57 - Preservation of confidences and secrets of a client.
Code of Federal Regulations, 2011 CFR
2011-07-01
... and secrets of a client. 10.57 Section 10.57 Patents, Trademarks, and Copyrights UNITED STATES PATENT... confidences and secrets of a client. (a) “Confidence” refers to information protected by the attorney-client or agent-client privilege under applicable law. “Secret” refers to other information gained in the...
37 CFR 10.57 - Preservation of confidences and secrets of a client.
Code of Federal Regulations, 2012 CFR
2012-07-01
... and secrets of a client. 10.57 Section 10.57 Patents, Trademarks, and Copyrights UNITED STATES PATENT... confidences and secrets of a client. (a) “Confidence” refers to information protected by the attorney-client or agent-client privilege under applicable law. “Secret” refers to other information gained in the...
37 CFR 10.57 - Preservation of confidences and secrets of a client.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and secrets of a client. 10.57 Section 10.57 Patents, Trademarks, and Copyrights UNITED STATES PATENT... confidences and secrets of a client. (a) “Confidence” refers to information protected by the attorney-client or agent-client privilege under applicable law. “Secret” refers to other information gained in the...
Use of ISDN video-phones for clients receiving palliative and antenatal home care.
Miyazaki, Masako; Stuart, Michelle; Liu, Lili; Tell, Sharon; Stewart, Marianne
2003-01-01
We examined the use of ISDN video-phones by health professionals and two types of home care clients: those receiving palliative care and those receiving antenatal care. In the palliative care group, there were four female clients and 15 health professionals; these clients on average had the video-phones at home for six weeks and made 12.5 calls per week. The antenatal care group consisted of six female clients and eight female registered nurses; these clients on average also had the video-phones at home for six weeks and made 12.5 calls per week. Exit interviews were conducted with three clients and eight staff in the palliative care group, and with six clients and three staff in the antenatal care group. Palliative care clients and their families commented that the visual feature of the phone enhanced the care that they received. In the antenatal group, the video-phone was used mainly for booking appointments and arranging home visits. In general, the technology was well received by clients and care providers.
Case report: a work simulation program for a manual worker with a fracture injury.
Chan, Chi-Chung; Chow, Jonathan H.W.
2000-01-01
Work rehabilitation programs targeting different client groups are available in nearly all major hospital occupational therapy departments in Hong Kong. Clients receiving work rehabilitation are referred from various out-patient clinics and other occupational therapists. Those clients experience limitation in work after their injuries or diseases and plan to return to work after rehabilitation. Program objectives are 1) to assist clients to reach maximum work capacity as rapidly as possible 2) to ensure clients return to work safely 3) to improve clients' work readiness. This case report describes an individualized work simulation program at a general hospital in Hong Kong provided for a typical client who is preparing to return to his worker role. Specific job analysis, goals and program rationale for the client are discussed.
Measurement and Analysis Infrastructure Diagnostic, Version 1.0: Method Definition Document
2010-08-01
to facilitate the conduct of MAID at the client’s site Client SME client M & A subject matter experts ( SMEs ) who are knowledgeable about the M & A...22 | CMU/SEI-2010-TR-035 Key roles, cont. Client SME client M & A subject matter experts ( SMEs ) who are knowledgeable about the M & A...vacation days, days not available, % time available for the MAID evaluation). 1b Client POC Identifies the client SME for each of the areas that
IPG Job Manager v2.0 Design Documentation
NASA Technical Reports Server (NTRS)
Hu, Chaumin
2003-01-01
This viewgraph presentation provides a high-level design of the IPG Job Manager, and satisfies its Master Requirement Specification v2.0 Revision 1.0, 01/29/2003. The presentation includes a Software Architecture/Functional Overview with the following: Job Model; Job Manager Client/Server Architecture; Job Manager Client (Job Manager Client Class Diagram and Job Manager Client Activity Diagram); Job Manager Server (Job Manager Client Class Diagram and Job Manager Client Activity Diagram); Development Environment; Project Plan; Requirement Traceability.
Stracuzzi, Thomas I; Mohr, Jonathan J; Fuertes, Jairo N
2011-07-01
A recurring question in multicultural counseling is whether client-counselor similarity on sociodemographic characteristics benefits counseling. A related issue is how counselor orientation to diversity relates to counseling process and outcome, both as a main effect and in interaction with counselor-client sociodemographic match. This cross-sectional study investigated these questions in relation to gay and bisexual male clients' counseling experiences by examining clients' perceived similarity to their counselor in sexual orientation, as well as counselors' self-reported orientation to diversity (assessed in terms of level of universal-diverse orientation [UDO]). Data were from 83 male-male client-counselor dyads recruited from lesbian/gay/bisexual-affirming counseling practices, where clients identified as gay or bisexual and counselors identified as gay, bisexual, or heterosexual. Counselor UDO was positively and uniquely associated with client ratings of the working alliance, session depth, and session smoothness. Perceived sexual orientation similarity was not directly related to any of the counseling-related criterion variables. Moreover, when counselors reported low levels of UDO, perceived similarity was negatively associated with the client-rated alliance and perceived improvement. Client religious commitment-a control variable in all analyses--was uniquely and negatively associated with client ratings of perceived improvement in counseling.
Saying good goodbyes to your clients: A functional analytic psychotherapy (FAP) perspective.
Tsai, Mavis; Gustafsson, Tore; Kanter, Jonathan; Plummer Loudon, Mary; Kohlenberg, Robert J
2017-03-01
Functional analytic psychotherapy (FAP) promotes client growth by shaping clients' daily life problems that also show up in session with their therapists. FAP therapists create evocative contexts within therapy that afford clients the opportunity to practice, refine, and be reinforced for new, more adaptive behaviors which then can be generalized into their outside lives. In FAP, the termination process will vary from client to client depending on the nature of the client's problems and targets. For many clients, the process can be a rich, multifaceted, final opportunity to evoke, reinforce, and promote generalization of clients' in-session improvements, particularly improvements related to vulnerable self-expression in the service of intimate and close relationships. By making explicit agreements at the outset of therapy to participate in an intentional termination process, and by later providing an evocative structure for ending therapy with vulnerable emotional expression, clients have the opportunity to develop more adaptive behaviors in the context of relationship endings which can be a painful part of the human experience. Equipped with the skills of open-hearted communication developed from an authentic relationship with their therapist, clients can leave therapy on a trajectory of further growth in interpersonal connection and living more boldly. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
ERIC Educational Resources Information Center
Speight, Suzette L.; Vera, Elizabeth M.
2005-01-01
This archival study explored patterns of client preferences from a randomized sample of 881 clients at a Midwestern university counseling center. Information from client intake forms was collected for a four year time frame. Results showed that 61% of the clients did not express preferences for particular types of counselors when asked on intake…
Moving beyond Consultation and into Action with a Client Project
ERIC Educational Resources Information Center
Ewing, Sara; Dover, Howard F.
2012-01-01
Attempting to implement client-based projects within a single semester often overwhelms students and underwhelms the client and grading professor. In this paper, we share results from a two-year pilot project in which the components of a client project were split between several classes. We discuss the client project model as a valuable teaching…
ERIC Educational Resources Information Center
Young, Tabitha L.; Gutierrez, Daniel; Hagedorn, W. Bryce
2013-01-01
This study investigated the relationships between motivational interviewing (MI) and client symptoms, attendance, and satisfaction. Seventy-nine clients attending a university-based counseling center were purposefully assigned to treatment or control conditions. Statistical analyses revealed client symptoms in both groups improved. However,…
Meeting the Needs of Clients with Dissociative Identity Disorder: Considerations for Psychotherapy
ERIC Educational Resources Information Center
Ringrose, Jo L.
2011-01-01
Psychotherapy for clients with Dissociative Identity Disorder (DID) is different to therapy with most clients because these clients are multiple, comprising one or more host, and one or more alter personalities. The necessary components to be addressed in order that clients can live successfully either as a multiple or as an integrated person are…
49 CFR 1103.19 - Advising upon the merits of a client's cause.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 8 2010-10-01 2010-10-01 false Advising upon the merits of a client's cause. 1103... Practitioner's Duties and Responsibilities Toward A Client § 1103.19 Advising upon the merits of a client's cause. A practitioner shall try to obtain full knowledge of his client's cause before advising thereon...
37 CFR 10.112 - Preserving identity of funds and property of client.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and property of client. 10.112 Section 10.112 Patents, Trademarks, and Copyrights UNITED STATES PATENT... funds and property of client. (a) All funds of clients paid to a practitioner or a practitioner's firm... therein. (2) Funds belonging in part to a client and in part presently or potentially to the practitioner...
32 CFR 776.32 - Department of the Navy as client.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Department of the Navy as client. 776.32 Section... Rules of Professional Conduct § 776.32 Department of the Navy as client. (a) Department of Navy as client: (1) Except when representing an individual client pursuant to paragraph (a)(6) of this section, a...
34 CFR 377.31 - What information must a grantee provide to eligible clients?
Code of Federal Regulations, 2010 CFR
2010-07-01
... clients? 377.31 Section 377.31 Education Regulations of the Offices of the Department of Education... PROJECTS TO INCREASE CLIENT CHOICE PROGRAM What Post-Award Conditions Must Be Met by a Grantee? § 377.31 What information must a grantee provide to eligible clients? Each grantee shall advise all clients and...
1968-1973: A Trend Analysis. Student Development Report, Volume 11, No. 5, 1973-74.
ERIC Educational Resources Information Center
Bryer, James
Colorado State University Counseling Center (UCC) direct service activities over the last five years were reviewed. The variables examined were: number of clients seen, client load by quarter, number of interviews per client, clients' type of problem, sex, class, college and marital status. Results indicated that UCC doubled its client load during…
Counselor-Client Diagnostic Agreement and Perceived Outcomes of Counseling: A Progress Report.
ERIC Educational Resources Information Center
Hurst, James C.; And Others
This study was designed to investigate the effect of congruity of counselor and client diagnoses upon client-perceived success in counseling. The Missouri Diagnostic Classification Plan (MDCP) was used as the basic diagnostic method. Agreement in the 15 categories was related to client-perceived success of counseling. Subjects, all clients at the…
Barlow, Ingrid G; Liu, Lili; Sekulic, Angela
2009-01-01
This study compared outcomes of wheelchair seating and positioning interventions provided by telerehabilitation (n=10) and face-to-face (n=20; 10 in each of two comparison groups, one urban and one rural). Comparison clients were matched to the telerehabilitation clients in age, diagnosis, and type of seating components received. Clients and referring therapists rated their satisfaction and identified if seating intervention goals were met. Clients recorded travel expenses incurred or saved, and all therapists recorded time spent providing service. Wait times and completion times were tracked. Clients seen by telerehabilitation had similar satisfaction ratings and were as likely to have their goals met as clients seen face-to-face; telerehabilitation clients saved travel costs. Rural referring therapists who used telerehabilitation spent more time in preparation and follow-up than the other groups. Clients assessed by telerehabilitation had shorter wait times for assessment than rural face-to-face clients, but their interventions took as long to complete. PMID:25945159
Faught, Gayle G; Conners, Frances A; Barber, Angela B; Price, Hannah R
2016-11-01
Phonological memory (PM) plays a significant role in language development but is impaired in individuals with Down syndrome (DS). Without formal recommendations on how to address PM limitations in clients with DS, it is possible speech-language pathologists (SLPs) find ways to do so in their practices. This study asked if and how SLPs address PM in language therapy with clients who have DS. It also asked about SLPs' opinions of the importance, practicality and difficulty of addressing PM in clients with DS. SLPs participated in an online survey that asked if they address PM in clients with DS and, if so, how often and with which techniques. The survey also asked SLPs to rate their opinions of addressing PM in clients with DS with Likert scales. To contrast clients with DS, SLPs were asked about their practices and opinions with clients who have specific language impairment (SLI) and autism spectrum disorders (ASD). SLPs were recruited through e-mails sent from state organizations and researchers. To compare SLPs' practices and opinions across client types, frequency analyses and analyses of variance (ANOVAs) were run. In all, 290 SLPs from 28 states completed the survey. Nearly all SLPs were currently practising at the time data were collected, and all worked with at least one of the three client types. Findings indicated SLPs less often addressed PM and used less variety when addressing PM with clients who have DS compared with clients who have SLI or ASD. Further, SLPs considered it less important, less practical and more difficult to address PM in clients who have DS when compared with clients who have SLI, whereas a similar pattern was found with clients who have ASD. SLPs' opinions could be one reason they under-address PM with clients who have DS. Other reasons include there are no evidence-based practice (EBP) guidelines on this topic, and there is not enough familiarity with the DS phenotype among SLPs. Future research on ways to address PM in clients with DS successfully are essential so that EBP guidelines can be established and language therapy can be made more effective. © 2016 Royal College of Speech and Language Therapists.
Faught, Gayle G.; Conners, Frances A.; Barber, Angela B.; Price, Hannah R.
2018-01-01
Background Phonological memory (PM) plays a significant role in language development but is impaired in individuals with Down syndrome (DS). Without formal recommendations on how to address PM limitations in clients with DS, it is possible speech–language pathologists (SLPs) find ways to do so in their practices. Aims This study asked if and how SLPs address PM in language therapy with clients who have DS. It also asked about SLPs’ opinions of the importance, practicality and difficulty of addressing PM in clients with DS. Methods & Procedures SLPs participated in an online survey that asked if they address PM in clients with DS and, if so, how often and with which techniques. The survey also asked SLPs to rate their opinions of addressing PM in clients with DS with Likert scales. To contrast clients with DS, SLPs were asked about their practices and opinions with clients who have specific language impairment (SLI) and autism spectrum disorders (ASD). SLPs were recruited through e-mails sent from state organizations and researchers. To compare SLPs’ practices and opinions across client types, frequency analyses and analyses of variance (ANOVAs) were run. Outcomes & Results In all, 290 SLPs from 28 states completed the survey. Nearly all SLPs were currently practising at the time data were collected, and all worked with at least one of the three client types. Findings indicated SLPs less often addressed PM and used less variety when addressing PM with clients who have DS compared with clients who have SLI or ASD. Further, SLPs considered it less important, less practical and more difficult to address PM in clients who have DS when compared with clients who have SLI, whereas a similar pattern was found with clients who have ASD. Conclusions & Implications SLPs’ opinions could be one reason they under-address PM with clients who have DS. Other reasons include there are no evidence-based practice (EBP) guidelines on this topic, and there is not enough familiarity with the DS phenotype among SLPs. Future research on ways to address PM in clients with DS successfully are essential so that EBP guidelines can be established and language therapy can be made more effective. PMID:27150499
31 CFR 8.34 - Knowledge of client's omission.
Code of Federal Regulations, 2013 CFR
2013-07-01
... client's omission. Each attorney, certified public accountant, or enrolled practitioner who knows that a..., affidavit, or other paper which the law requires the client to execute, shall advise the client promptly of...
31 CFR 8.34 - Knowledge of client's omission.
Code of Federal Regulations, 2012 CFR
2012-07-01
... client's omission. Each attorney, certified public accountant, or enrolled practitioner who knows that a..., affidavit, or other paper which the law requires the client to execute, shall advise the client promptly of...
31 CFR 8.34 - Knowledge of client's omission.
Code of Federal Regulations, 2014 CFR
2014-07-01
... client's omission. Each attorney, certified public accountant, or enrolled practitioner who knows that a..., affidavit, or other paper which the law requires the client to execute, shall advise the client promptly of...
31 CFR 8.34 - Knowledge of client's omission.
Code of Federal Regulations, 2011 CFR
2011-07-01
... client's omission. Each attorney, certified public accountant, or enrolled practitioner who knows that a..., affidavit, or other paper which the law requires the client to execute, shall advise the client promptly of...