Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?

Author(s):  
Leila Karimi ◽  
Seyyed Ahmad Javadi ◽  
Mohammad Ali Hadavi ◽  
Rasool Jalili
Keyword(s):  
2018 ◽  
Vol 1 (1) ◽  
pp. 6-21 ◽  
Author(s):  
I. K. Razumova ◽  
N. N. Litvinova ◽  
M. E. Shvartsman ◽  
A. Yu. Kuznetsov

Introduction. The paper presents survey results on the awareness towards and practice of Open Access scholarly publishing among Russian academics.Materials and Methods. We employed methods of statistical analysis of survey results. Materials comprise results of data processing of Russian survey conducted in 2018 and published results of the latest international surveys. The survey comprised 1383 respondents from 182 organizations. We performed comparative studies of the responses from academics and research institutions as well as different research areas. The study compares results obtained in Russia with the recently published results of surveys conducted in the United Kingdom and Europe.Results. Our findings show that 95% of Russian respondents support open access, 94% agree to post their publications in open repositories and 75% have experience in open access publishing. We did not find any difference in the awareness and attitude towards open access among seven reference groups. Our analysis revealed the difference in the structure of open access publications of the authors from universities and research institutes. Discussion andConclusions. Results reveal a high level of awareness and support to open access and succeful practice in the open access publications in the Russian scholarly community. The results for Russia demonstrate close similarity with the results of the UK academics. The governmental open access policies and programs would foster the practical realization of the open access in Russia.


2020 ◽  
Author(s):  
Manuel Tavares Gomes ◽  
Eduardo Santos ◽  
Sandra Gomes ◽  
Daniel Pansarelli ◽  
Donizete Mariano ◽  
...  

This book, consisting of nine chapters, is the result of multiple theoretical and empirical research carried out by students in the post-graduate program in education (PPGE) at Universidade Nove de Julho (UNINOVE). The object of the research was to carry out a study on the new models of higher education, implemented in Brazil between 2005 and 2013. The studies carried out focus, above all, on institutional principles, student access policies, the internationalization process, quota policies, and mechanisms for inclusion in higher education for public school students. These were studies that used, as a theoretical basis, epistemological models of a counter-hegemonic character and, from a methodological point of view, an essentially qualitative approach. The studies showed, generically, the possibility of building other models of higher education capable of overcoming the elitism, characteristic of traditional universities. The inclusion of students from public school reveals that it is possible to make higher education a right for everyone, democratizing it, in the sense of establishing social and cognitive justice. Keywords: higher education; new models; empirical research; Brazil; social and cognitive justice.


Author(s):  
Oguzhan Yilmaz ◽  
Matthew Frost ◽  
Andrew Timmis ◽  
Stephen Ison

Until recently, addressing the environmental externalities associated with the use of the private car and single occupancy vehicles has been the focus of the airport ground access policies worldwide. However, with the emerging unprecedented challenges of the COVID-19 pandemic, which have already changed the way we live, work, and travel, encouraging a change in commuter behavior has become even more important. This has necessitated that existing strategies be reconsidered in favor of adapting to a highly uncertain “COVID-19 world.” Historically, there has been a dearth of literature relating to airport employees’ ground access even though as a group employees represent an important segment of airport users with complex access requirements. This paper therefore focuses on airport employee related airport ground access strategies considering an emerging understanding of the future impacts of COVID-19 on global air travel. Pre-COVID strategies are investigated by conducting a documentary analysis of the most recent ground access strategies of 27 UK airports. The findings reveal that airport ground access strategies were mainly focused on setting targets and producing policy measures in favor of reducing car use and increasing the use of more sustainable transport modes including public transport, car sharing, and active travel (walking, cycling). However, measures encouraging public transport and car sharing will be more difficult to implement because of social distancing and fear of proximity to others. Instead, initiatives encouraging remote working, active travel, and improved staff awareness will be at the forefront of the future ground access strategy development.


Author(s):  
Fei Meng ◽  
Leixiao Cheng ◽  
Mingqiang Wang

AbstractCountless data generated in Smart city may contain private and sensitive information and should be protected from unauthorized users. The data can be encrypted by Attribute-based encryption (CP-ABE), which allows encrypter to specify access policies in the ciphertext. But, traditional CP-ABE schemes are limited because of two shortages: the access policy is public i.e., privacy exposed; the decryption time is linear with the complexity of policy, i.e., huge computational overheads. In this work, we introduce a novel method to protect the privacy of CP-ABE scheme by keyword search (KS) techniques. In detail, we define a new security model called chosen sensitive policy security: two access policies embedded in the ciphertext, one is public and the other is sensitive and hidden. If user's attributes don't satisfy the public policy, he/she cannot get any information (attribute name and its values) of the hidden one. Previous CP-ABE schemes with hidden policy only work on the “AND-gate” access structure or their ciphertext size or decryption time maybe super-polynomial. Our scheme is more expressive and compact. Since, IoT devices spread all over the smart city, so the computational overhead of encryption and decryption can be shifted to third parties. Therefore, our scheme is more applicable to resource-constrained users. We prove our scheme to be selective secure under the decisional bilinear Diffie-Hellman (DBDH) assumption.


2017 ◽  
Vol 38 (4) ◽  
pp. 439-448 ◽  
Author(s):  
Nicole Smith Dahmen ◽  
Erin K. Coyle

Through surveys and in-depth interviews with members of the White House News Photographers Association, this study indicates that visual journalists understand the value of the watchdog role and that current White House practices interfere with this critical function. Limiting news media access and attempting to control the visual narrative undermines the ability of the press to perform the watchdog function that is critical for democratic self-governance.


2021 ◽  
Vol 1 (2) ◽  
pp. 89
Author(s):  
Lutfia Rizkyatul Akbar ◽  
Gunadi Gunadi

This study aims to assess the implementation of the openness of banking data access policies to improving tax compliance in Indonesia. It cause by the implementation of tax collection using a self-assessment system, thus requiring taxpayer data and information through financial institutions, include banking. Researchers used qualitative descriptive methods. The results of this study are, first, there is support for the implementation of the policy on openness to access to banking data in increasing tax compliance in Indonesia in the form of the issuance of Law Number 9 of 2017 concerning Access to Financial Information. Second, the implementation of banking data disclosure policies to increase tax compliance in Indonesia, including the willingness of target groups to comply with policy outputs, in this case the reporting of customer data by banks to the DGT. Third, the policy of open banking data access does not impede or reduce the number of bank accounts and deposits. Fourth, there are technical obstacles both by the DGT and the banking sector, especially in the first year. Furthermore, there are several inhibiting factors in the implementation of this policy, namely IT factors, and resistance from some circles at the beginning of the emergence of regulations, limited financial resources to process data quickly, so it must be done gradually, in addition to lack of quantity and quality of human resources 


2021 ◽  
Vol 12 (9) ◽  
pp. 443-449
Author(s):  
D. S. Khleborodov ◽  

Micro-segmentation of local networks is an important element of network security. The main goal of micro-segmentation of network is to reduce a risk of compromising hosts during a cyber-attack. In micro-segmented networks, if one of the hosts has been compromised, the malicious code or attacker will be limited in the "horizontal" actions by the micro-segment to which the compromised host belongs. Existing methods of micro-segmentation of networks have operational drawbacks that impede their effective practical application. This article presents a new method of micro-segmentation of local wired and wireless networks based on downloadable and wireless access control lists, which allows to achieve a high level of granularity of network access policies by minimizing the microsegment, along with high operational characteristics.


2005 ◽  
Vol 24 (1) ◽  
pp. 9-11 ◽  
Author(s):  
Tony Horava

PurposeThis paper discusses the importance of incorporating licensing issues in access policies for electronic resources in research libraries. The implications for patron understanding of basic legal issues and the role of the library in managing and acquiring these resources are investigated and discussed.Design/methodology/approachA survey of various research libraries was undertaken to examine what is provided to patrons in terms of conditions of use for electronic resources. Literature relating to the management and provision of electronic resources was examined.FindingsIt was found that few libraries provide key licensing information to their patrons. This has important consequences in terms of the patron's lack of awareness of restrictions on use, as well as the costs, complexity, and consortial involvement in acquiring these resources.Research limitations/implicationsA comprehensive international review of the trends and practices of research libraries regarding access policies and licensing issues would build upon this paper's findings.Practical implicationsLibrary patrons are not receiving adequate information about the resources they are using. If more research libraries would consider what licensing information is made available to patrons, there could be changes in patron understanding and perception of the library. This will impact the profile of the library in academia, and the changing role of librarians in collection development in the digital environment.Originality/valueThe paper will be of value to research libraries involved in the acquisition, management and delivery of electronic resources to its patrons, and to librarians involved in collection development and management.


Science ◽  
2016 ◽  
Vol 353 (6301) ◽  
pp. 758-759
Author(s):  
I. Kapovich
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document