CINXE.COM
Search results for: authorization
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: authorization</title> <meta name="description" content="Search results for: authorization"> <meta name="keywords" content="authorization"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="authorization" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="authorization"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 52</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: authorization</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> Easily Memorable Strong Password Generation and Retrieval</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shatadru%20Das">Shatadru Das</a>, <a href="https://publications.waset.org/abstracts/search?q=Natarajan%20Vijayarangan"> Natarajan Vijayarangan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=easy%20authentication" title="easy authentication">easy authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20retrieval" title=" key retrieval"> key retrieval</a>, <a href="https://publications.waset.org/abstracts/search?q=memorable%20passwords" title=" memorable passwords"> memorable passwords</a>, <a href="https://publications.waset.org/abstracts/search?q=strong%20password%20generation" title=" strong password generation"> strong password generation</a> </p> <a href="https://publications.waset.org/abstracts/17238/easily-memorable-strong-password-generation-and-retrieval" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17238.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">400</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maruf%20Farhan">Maruf Farhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Salih"> Abdul Salih</a>, <a href="https://publications.waset.org/abstracts/search?q=Sikandar%20Ali%20Tahir"> Sikandar Ali Tahir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iot" title="Iot">Iot</a>, <a href="https://publications.waset.org/abstracts/search?q=DID" title=" DID"> DID</a>, <a href="https://publications.waset.org/abstracts/search?q=authorization" title=" authorization"> authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=verifiable%20credentials" title=" verifiable credentials"> verifiable credentials</a> </p> <a href="https://publications.waset.org/abstracts/168049/securing-internet-of-things-devices-in-healthcare-industry-an-investigation-into-efficient-and-effective-authorization-procedures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168049.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Koyangbo%20Guere%20Monguia%20Michel%20Alex%20Emmanuel">Koyangbo Guere Monguia Michel Alex Emmanuel </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing%20network" title="cloud computing network">cloud computing network</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20management%20systems" title=" identity management systems"> identity management systems</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20key%20encryption" title=" public key encryption"> public key encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20and%20authorization" title=" access control and authorization"> access control and authorization</a> </p> <a href="https://publications.waset.org/abstracts/50648/central-african-republic-government-recruitment-agency-based-on-identity-management-and-public-key-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamil%20Ahmed">Jamil Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorization" title="authorization">authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control%20model" title=" access control model"> access control model</a>, <a href="https://publications.waset.org/abstracts/search?q=role%20based%20access%20control" title=" role based access control"> role based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control" title=" attribute based access control"> attribute based access control</a> </p> <a href="https://publications.waset.org/abstracts/129022/rapdac-role-centric-attribute-based-policy-driven-access-control-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129022.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Violations of Press Freedom</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khalid%20Achaat">Khalid Achaat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is difficult to speak about freedom of the press in Algeria without first talking to fifty-seven journalists killed in the country between 1993 and 1997 and the five missing journalists. No serious investigation was conducted to find the culprits. When a State is not able to guarantee law, there is no justice and violations of the law become "systematic". How to claim the freedom of press in Algeria, when death becomes "banal"? In these circumstances, can we talk of rights of the Algerian press? It is impossible to understand the problems of the press in Algeria, focusing solely legal issues. Take into account technical, financial and political. Their respective roles varies depending on whether one focuses on the collection of information, the regime of the newspaper company or publication and dissemination. Can we say that the Algerian press is "the freest in the Arab world", while the latter reflects only partially the real problems facing the country? While any newspaper company is subject, de facto, to an authorization scheme, permanently subjected to the constant threat of withdrawal of the authorization, suspension, prohibition or closure without it has the right to a remedy? Can it be free when the majority of "media owners", head of the largest daily newspapers are derived from the single party in power since independence? Some of this release does not it serves the interests of the Algerian power? <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=freedom" title="freedom">freedom</a>, <a href="https://publications.waset.org/abstracts/search?q=press" title=" press"> press</a>, <a href="https://publications.waset.org/abstracts/search?q=power" title=" power"> power</a>, <a href="https://publications.waset.org/abstracts/search?q=closure" title=" closure"> closure</a>, <a href="https://publications.waset.org/abstracts/search?q=suspension" title=" suspension"> suspension</a> </p> <a href="https://publications.waset.org/abstracts/37146/violations-of-press-freedom" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37146.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">350</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gampel%20Alexander">Gampel Alexander</a>, <a href="https://publications.waset.org/abstracts/search?q=Mazzuchi%20Thomas"> Mazzuchi Thomas</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarkani%20Shahram"> Sarkani Shahram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorization-to-operate%20%28ATO%29" title="authorization-to-operate (ATO)">authorization-to-operate (ATO)</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20control%20systems%20%28ICS%29" title=" industrial control systems (ICS)"> industrial control systems (ICS)</a>, <a href="https://publications.waset.org/abstracts/search?q=model-based%20system%E2%80%99s%20engineering%20%28MBSE%29" title=" model-based system’s engineering (MBSE)"> model-based system’s engineering (MBSE)</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management%20framework%20%28RMF%29" title=" risk management framework (RMF)"> risk management framework (RMF)</a> </p> <a href="https://publications.waset.org/abstracts/166874/streamlining-cybersecurity-risk-assessment-for-industrial-control-and-automation-systems-leveraging-the-national-institute-of-standard-and-technologys-risk-management-framework-rmf-using-model-based-system-engineering-mbse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166874.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> Identity Management in Virtual Worlds Based on Biometrics Watermarking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Bader">S. Bader</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Essoukri%20Ben%20Amara"> N. Essoukri Ben Amara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20management" title="identity management">identity management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=biometrics%20authentication%20and%20authorization" title=" biometrics authentication and authorization"> biometrics authentication and authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=avatar" title=" avatar"> avatar</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20world" title=" virtual world"> virtual world</a> </p> <a href="https://publications.waset.org/abstracts/50268/identity-management-in-virtual-worlds-based-on-biometrics-watermarking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> A Multiple Case Study of How Bilingual-Bicultural Teachers' Language Shame and Loss Affects Teaching English Language Learners</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lisa%20Winstead">Lisa Winstead</a>, <a href="https://publications.waset.org/abstracts/search?q=Penny%20Congcong%20Wang"> Penny Congcong Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This two-year multiple case study of eight Spanish-English speaking teachers explores bilingual-bicultural Latino teachers’ lived experiences as English Language Learners and, more recently, as adult teachers who work with English Language Learners in mainstream schools. Research questions explored include: How do bilingual-bicultural teachers perceive their native language use and sense of self within society from childhood to adulthood? Correspondingly, what are bilingual teachers’ perceptions of how their own language learning experience might affect teaching students of similar linguistic and cultural backgrounds? This study took place in an urban area in the Pacific Southwest of the United States. Participants were K-8 teachers and enrolled in a Spanish-English bilingual authorization program. Data were collected from journals, focus group interviews, field notes, and class artifacts. Within case and cross-case analysis revealed that the participants were shamed about their language use as children which contributed to their primary language loss. They similarly reported how experiences of mainstream educator and administrator language shaming invalidated their ability to provide support for Latino heritage ELLs, despite their bilingual-bicultural expertise. However, participants reported that counter-narratives from the bilingual authorization program, parents, community and church organizations, and cultural responsive teachers were effective in promoting their language retention, pride, and feelings of well-being. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=teacher%20education" title="teacher education">teacher education</a>, <a href="https://publications.waset.org/abstracts/search?q=bilingual%20education" title=" bilingual education"> bilingual education</a>, <a href="https://publications.waset.org/abstracts/search?q=English%20language%20learners" title=" English language learners"> English language learners</a>, <a href="https://publications.waset.org/abstracts/search?q=emergent%20bilinguals" title=" emergent bilinguals"> emergent bilinguals</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20justice" title=" social justice"> social justice</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20shame" title=" language shame"> language shame</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20loss" title=" language loss"> language loss</a>, <a href="https://publications.waset.org/abstracts/search?q=translanguaging" title=" translanguaging"> translanguaging</a> </p> <a href="https://publications.waset.org/abstracts/89760/a-multiple-case-study-of-how-bilingual-bicultural-teachers-language-shame-and-loss-affects-teaching-english-language-learners" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> The Right to Family Reunification of Immigrants in Spain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mar%C3%ADa%20Jos%C3%A9%20Benitez%20Jimenez">María José Benitez Jimenez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study seeks to make clear the importance of family reunification in order to establish consolidated habits of coexistence of immigrants, directly favoring the relationship of the family nucleus and indirectly the social integration of foreigners. In addition to the theoretical analysis of the subject, information has been reviewed by the National Institute of Statistics and Reports of Spanish organizations that compile data on immigrants and specifically on family reunification. The Spanish regulations on foreigners include the right of foreigners legally residing in Spain to regroup their families. The general conditions required to exercise this right are having legally resided in Spain for one year and having obtained authorization to reside for one more year. There are exceptions to the requirement of having resided for one year in our country. Article 39 of the Spanish Constitution, although it does not express what is to be understood as a family, does refer to the fact that ‘the public authorities ensure the social, economic and legal protection of the family’. Therefore for the Spanish State, the family institution, in a broad sense, enjoys a privileged treatment that is revealed in the Supreme Norm and that reflects the interest of our society to address the relationships that subjects have in their immediate environment. Although we are aware of the reluctant position of the Spanish Constitutional Court to consider as a fundamental right the right to family life despite being enshrined in Article 8 of the European Convention on Human Rights, it is questionable whether access to authorization for family reunification should be more uniform in terms of requirements related to nationality, employment or training of applicants in order to have an egalitarian character. The requirement of having resided one year in Spain to be able to request successful family reunification seems dispensable because if foreigners can obviate this requirement by having a certain status, its abolition would be feasible by equating all situations and benefiting foreigners in general. The achievement of this proposal would help to strengthen the family life of immigrants from the beginning of their life in Spain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=family" title="family">family</a>, <a href="https://publications.waset.org/abstracts/search?q=immigrants" title=" immigrants"> immigrants</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20integration" title=" social integration"> social integration</a>, <a href="https://publications.waset.org/abstracts/search?q=reunification" title=" reunification"> reunification</a> </p> <a href="https://publications.waset.org/abstracts/85200/the-right-to-family-reunification-of-immigrants-in-spain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85200.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Evaluation of Adequacy of Caspofungin Prescription in a Tunisian Hospital Cohort</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mariem%20Meddeb%20Sidhom">Mariem Meddeb Sidhom</a>, <a href="https://publications.waset.org/abstracts/search?q=Souhayel%20Hedfi"> Souhayel Hedfi</a>, <a href="https://publications.waset.org/abstracts/search?q=Rjaibia%20Houda"> Rjaibia Houda</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehdi%20Dridi"> Mehdi Dridi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Ali%20Yousfi"> Mohamed Ali Yousfi</a>, <a href="https://publications.waset.org/abstracts/search?q=S%C3%A2adia%20Gargouri"> Sâadia Gargouri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Considering the important increase in costs of caspofungin treatments and ahead the evolution of its indication, pharmacy department was prompted to realize a review of the adequacy of prescriptions in the medical intensive care units (ICU). A retrospective observational study was conducted in Tunis military hospital concerning ICU prescriptions of caspofungin from 2008 until 2013. A pharmacist had returned to the patient’s medical records to collect data and to the microbiology department for parasitological results. The adequacy of prescriptions was evaluated by a pharmacist and an infectiologist parasitologist, referring to predefined scale of criteria resuming the indications of the marketing authorization (MA) and grade AI-AII of the guidelines of the Infectious Diseases Society of America (IDSA). Sixty two ICU patients have been treated with caspofungin during the period of study; however, 8 files were lost. Thus, 54 patients were included in the study having received 55 prescriptions of caspofungin. Males were a majority with 64.8% of the population. Mean age was 51 years. Caspofungin was indicated in accordance with the IDSA recommendations in 43.6% of the cases. The most case of non respect to the guidelines was the indication of caspofungin as empirical treatment in non neutropenic patients. Caspofungin was utilized as a first line treatment in 9 cases where it was possible to give fluconazole first, as germs were fluconazole- sensitive. Caspofungin was indicated in 2 patients with good renal function and in which nor amphotericin B, liposomal ampho B neither itraconazole had been previously used, as indicates the MA. The posology of caspofungin was respected in all prescriptions with a loading dose of 70 mg in the first day and a maintenance dose of 50 mg daily. Seven patients had received a daily dose of 70 mg, the recommended dose for people weighing more than 80 Kg. Caspofungin prescriptions are far to be adequately done. There is a clear need of optimization in indicating this molecule and that must be done in collaboration between the pharmacy department, the ICUs and parasitology department. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=caspofungin" title="caspofungin">caspofungin</a>, <a href="https://publications.waset.org/abstracts/search?q=prescription" title=" prescription"> prescription</a>, <a href="https://publications.waset.org/abstracts/search?q=intensive%20care%20units" title=" intensive care units"> intensive care units</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing%20authorization" title=" marketing authorization"> marketing authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=Tunisian%20hospital%20cohort" title=" Tunisian hospital cohort"> Tunisian hospital cohort</a> </p> <a href="https://publications.waset.org/abstracts/20758/evaluation-of-adequacy-of-caspofungin-prescription-in-a-tunisian-hospital-cohort" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20758.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> A Robust Implementation of a Building Resources Access Rights Management System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eugen%20Neagoe">Eugen Neagoe</a>, <a href="https://publications.waset.org/abstracts/search?q=Victor%20Balanica"> Victor Balanica</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20building%20controller" title="smart building controller">smart building controller</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20security" title=" software security"> software security</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20rights" title=" access rights"> access rights</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20authorization" title=" access authorization"> access authorization</a> </p> <a href="https://publications.waset.org/abstracts/25907/a-robust-implementation-of-a-building-resources-access-rights-management-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25907.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Modulation of the Europay, MasterCard, and VisaCard Authentications by Using Avispa Tool</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ossama%20Al-Maliki">Ossama Al-Maliki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Europay, MasterCard, and Visa (EMV) is the transaction protocol for most of the world and especially in Europe and the UK. EMV protocol consists of three main stages which are: card authentication, cardholder verification methods, and transaction authorization. This paper details in full the EMV card authentications. We have used AVISPA and SPAN tools to do our modulization for the EMV card authentications. The code for each type of the card authentication was written by using CAS+ language. The results showed that our modulations were successfully addressed all the steps of the EMV card authentications and the entire process of the EMV card authentication are secured. Also, our modulations were successfully addressed all the main goals behind the EMV card authentications according to the EMV specifications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EMV" title="EMV">EMV</a>, <a href="https://publications.waset.org/abstracts/search?q=card%20authentication" title=" card authentication"> card authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=contactless%20card" title=" contactless card"> contactless card</a>, <a href="https://publications.waset.org/abstracts/search?q=SDA" title=" SDA"> SDA</a>, <a href="https://publications.waset.org/abstracts/search?q=DDA" title=" DDA"> DDA</a>, <a href="https://publications.waset.org/abstracts/search?q=CDA%20AVISPA" title=" CDA AVISPA"> CDA AVISPA</a> </p> <a href="https://publications.waset.org/abstracts/89595/modulation-of-the-europay-mastercard-and-visacard-authentications-by-using-avispa-tool" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> Evolution of Propiconazole and Tebuconazole Residues through the Post-Harvest Application in 'Angeleno' Plum</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20J.%20Rodr%C3%ADguez">M. J. Rodríguez</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20M.%20S%C3%A1nchez"> F. M. Sánchez</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Velardo"> B. Velardo</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Calvo"> P. Calvo</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20J.%20Serradilla"> M. J. Serradilla</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Delgado"> J. Delgado</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20M.%20L%C3%B3pez"> J. M. López</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main problems in storage and later transport of fruits, are the decays developed that reduce the quality on destination’s markets. Nowadays, there is an increasing interest in the use of compounds to avoid decays in post-harvest. Triazole fungicides are agrochemicals widely used in the agricultural industry due to their wide spectrum of actions, and in some case, they are used in citrus fruit post-harvest. Moreover, its use is not authorized in plum post-harvest, but in order to a future possible authorization, the evolutions of propiconazole and tebuconazole residues are studied after its post-harvest application in ‘Angeleno’ plum. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=maximum%20residue%20limit%20%28MRL%29" title="maximum residue limit (MRL)">maximum residue limit (MRL)</a>, <a href="https://publications.waset.org/abstracts/search?q=triazole%20fungicides" title=" triazole fungicides"> triazole fungicides</a>, <a href="https://publications.waset.org/abstracts/search?q=decay" title=" decay"> decay</a>, <a href="https://publications.waset.org/abstracts/search?q=Prunus%20salicina" title=" Prunus salicina"> Prunus salicina</a> </p> <a href="https://publications.waset.org/abstracts/46899/evolution-of-propiconazole-and-tebuconazole-residues-through-the-post-harvest-application-in-angeleno-plum" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46899.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Quick Response(QR) Code for Vehicle Registration and Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Malarvizhi">S. Malarvizhi</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Sadiq%20Basha"> S. Sadiq Basha</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Santhosh%20Kumar"> M. Santhosh Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Saravanan"> K. Saravanan</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Sasikumar"> R. Sasikumar</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Satheesh"> R. Satheesh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=QR%20code" title="QR code">QR code</a>, <a href="https://publications.waset.org/abstracts/search?q=QR%20reader" title=" QR reader"> QR reader</a>, <a href="https://publications.waset.org/abstracts/search?q=registration" title=" registration"> registration</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=idenfication" title=" idenfication"> idenfication</a> </p> <a href="https://publications.waset.org/abstracts/1704/quick-responseqr-code-for-vehicle-registration-and-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1704.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">494</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> Fast Authentication Using User Path Prediction in Wireless Broadband Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gunasekaran%20Raja">Gunasekaran Raja</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajakumar%20Arul"> Rajakumar Arul</a>, <a href="https://publications.waset.org/abstracts/search?q=Kottilingam%20Kottursamy"> Kottilingam Kottursamy</a>, <a href="https://publications.waset.org/abstracts/search?q=Ramkumar%20Jayaraman"> Ramkumar Jayaraman</a>, <a href="https://publications.waset.org/abstracts/search?q=Sathya%20Pavithra"> Sathya Pavithra</a>, <a href="https://publications.waset.org/abstracts/search?q=Swaminathan%20Venkatraman"> Swaminathan Venkatraman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless Interoperability for Microwave Access (WiMAX) utilizes the IEEE 802.1X mechanism for authentication. However, this mechanism incurs considerable delay during handoffs. This delay during handoffs results in service disruption which becomes a severe bottleneck. To overcome this delay, our article proposes a key caching mechanism based on user path prediction. If the user mobility follows that path, the user bypasses the normal IEEE 802.1X mechanism and establishes the necessary authentication keys directly. Through analytical and simulation modeling, we have proved that our mechanism effectively decreases the handoff delay thereby achieving fast authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=authorization" title=" authorization"> authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20accounting%20%28AAA%29" title=" and accounting (AAA)"> and accounting (AAA)</a>, <a href="https://publications.waset.org/abstracts/search?q=handoff" title=" handoff"> handoff</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20path%20prediction%20%28UPP%29%20and%20user%20pattern" title=" user path prediction (UPP) and user pattern"> user path prediction (UPP) and user pattern</a> </p> <a href="https://publications.waset.org/abstracts/48859/fast-authentication-using-user-path-prediction-in-wireless-broadband-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48859.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Authorization of Commercial Communication Satellite Grounds for Promoting Turkish Data Relay System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Celal%20Dudak">Celal Dudak</a>, <a href="https://publications.waset.org/abstracts/search?q=Asl%C4%B1%20Utku"> Aslı Utku</a>, <a href="https://publications.waset.org/abstracts/search?q=Burak%20Ya%C4%9Flio%C4%9Flu"> Burak Yağlioğlu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Uninterrupted and continuous satellite communication through the whole orbit time is becoming more indispensable every day. Data relay systems are developed and built for various high/low data rate information exchanges like TDRSS of USA and EDRSS of Europe. In these missions, a couple of task-dedicated communication satellites exist. In this regard, for Turkey a data relay system is attempted to be defined exchanging low data rate information (i.e. TTC) for Earth-observing LEO satellites appointing commercial GEO communication satellites all over the world. First, justification of this attempt is given, demonstrating duration enhancements in the link. Discussion of preference of RF communication is, also, given instead of laser communication. Then, preferred communication GEOs – including TURKSAT4A already belonging to Turkey- are given, together with the coverage enhancements through STK simulations and the corresponding link budget. Also, a block diagram of the communication system is given on the LEO satellite. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication" title="communication">communication</a>, <a href="https://publications.waset.org/abstracts/search?q=GEO%20satellite" title=" GEO satellite"> GEO satellite</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20relay%20system" title=" data relay system"> data relay system</a>, <a href="https://publications.waset.org/abstracts/search?q=coverage" title=" coverage"> coverage</a> </p> <a href="https://publications.waset.org/abstracts/45926/authorization-of-commercial-communication-satellite-grounds-for-promoting-turkish-data-relay-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45926.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Signature Verification System for a Banking Business Process Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Rahaf">A. Rahaf</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Liyakathunsia"> S. Liyakathunsia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s world, unprecedented operational pressure is faced by banks that test the efficiency, effectiveness, and agility of their business processes. In a typical banking process, a person’s authorization is usually based on his signature on most all of the transactions. Signature verification is considered as one of the highly significant information needed for any bank document processing. Banks usually use Signature Verification to authenticate the identity of individuals. In this paper, a business process model has been proposed in order to increase the quality of the verification process and to reduce time and needed resources. In order to understand the current process, a survey has been conducted and distributed among bank employees. After analyzing the survey, a process model has been created using Bizagi modeler which helps in simulating the process after assigning time and cost of it. The outcomes show that the automation of signature verification process is highly recommended for a banking business process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20process%20management" title="business process management">business process management</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20modeling" title=" process modeling"> process modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=quality" title=" quality"> quality</a>, <a href="https://publications.waset.org/abstracts/search?q=Signature%20Verification" title=" Signature Verification"> Signature Verification</a> </p> <a href="https://publications.waset.org/abstracts/67664/signature-verification-system-for-a-banking-business-process-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67664.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gang%20Liu">Gang Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Huimin%20Song"> Huimin Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Can%20Wang"> Can Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Runnan%20Zhang"> Runnan Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Lu%20Fang"> Lu Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=access%20control" title="access control">access control</a>, <a href="https://publications.waset.org/abstracts/search?q=attribute%20based%20access%20control" title=" attribute based access control"> attribute based access control</a>, <a href="https://publications.waset.org/abstracts/search?q=granting%20authorizations" title=" granting authorizations"> granting authorizations</a>, <a href="https://publications.waset.org/abstracts/search?q=privilege" title=" privilege"> privilege</a>, <a href="https://publications.waset.org/abstracts/search?q=revoking%20authorizations" title=" revoking authorizations"> revoking authorizations</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20security" title=" system security"> system security</a> </p> <a href="https://publications.waset.org/abstracts/65275/an-attribute-based-access-control-model-with-pol-module-for-dynamically-granting-and-revoking-authorizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65275.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ivan%20Stanev">Ivan Stanev</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Koleva"> Maria Koleva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=service%20oriented%20architecture" title="service oriented architecture">service oriented architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20based%20automated%20software%20engineering" title=" knowledge based automated software engineering"> knowledge based automated software engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=common%20platform%20for%20automated%20programming" title=" common platform for automated programming"> common platform for automated programming</a>, <a href="https://publications.waset.org/abstracts/search?q=e-customs" title=" e-customs"> e-customs</a> </p> <a href="https://publications.waset.org/abstracts/83167/knowledge-based-automated-software-engineering-platform-used-for-the-development-of-bulgarian-e-customs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">373</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> The Importance of Affinity Groups for Organizations and Employees</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Helio%20Arthur%20Reis%20Irigaray">Helio Arthur Reis Irigaray</a>, <a href="https://publications.waset.org/abstracts/search?q=Fabricio%20Stocker"> Fabricio Stocker</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to discover the extent to which affinity groups effectively act to combat inequalities, promote diversity, and contribute to the inclusion of non-hegemonic groups in the work environment. To this end, we have built empirical research, in which we interviewed 36 leaders and members of the collectives of non-hegemonic groups, namely women, blacks, and LGBTQ. With the proper authorization of the participants, their interviews were transcribed and submitted for critical analysis of the discourse. The field revealed that collectives are the result of the articulation of non-hegemonic groups, which create and participate in legitimate and institutional spaces to promote diversity. We also identified that diversity actions have happened as a market trend and reproduced mimetically. As the largest companies implement these actions, they become benchmarking and thus create a flow that is reproduced by other companies. However, there is no effective change in the structures that could promote inclusion and belonging. We state that a diverse group of employees are not enough to claim that the organization is diverse and inclusive. There remains much more to discuss and delve into deeply, including gender, diversity, and intersectionality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diversity" title="diversity">diversity</a>, <a href="https://publications.waset.org/abstracts/search?q=inclusion" title=" inclusion"> inclusion</a>, <a href="https://publications.waset.org/abstracts/search?q=collectives" title=" collectives"> collectives</a>, <a href="https://publications.waset.org/abstracts/search?q=affinity%20groups" title=" affinity groups"> affinity groups</a>, <a href="https://publications.waset.org/abstracts/search?q=employee%20resource%20groups" title=" employee resource groups"> employee resource groups</a> </p> <a href="https://publications.waset.org/abstracts/160397/the-importance-of-affinity-groups-for-organizations-and-employees" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160397.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=grid%20computing" title="grid computing">grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=onion%20routing" title=" onion routing"> onion routing</a>, <a href="https://publications.waset.org/abstracts/search?q=ECC" title=" ECC"> ECC</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a> </p> <a href="https://publications.waset.org/abstracts/28834/performance-analysis-of-elliptic-curve-cryptography-using-onion-routing-to-enhance-the-privacy-and-anonymity-in-grid-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> A Progressive Techno-Legal Framework for Digital Evidence Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ayobami%20P.%20Olatunji">Ayobami P. Olatunji</a>, <a href="https://publications.waset.org/abstracts/search?q=Saadat%20Ibiyeye"> Saadat Ibiyeye</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdulaziz%20Ibiyeye"> Abdulaziz Ibiyeye</a>, <a href="https://publications.waset.org/abstracts/search?q=Tahir%20M.%20Khan"> Tahir M. Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=evidence%20presentation" title="evidence presentation">evidence presentation</a>, <a href="https://publications.waset.org/abstracts/search?q=warrant" title=" warrant"> warrant</a>, <a href="https://publications.waset.org/abstracts/search?q=digital-forensic" title=" digital-forensic"> digital-forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=certificate%20of%20compliance" title=" certificate of compliance"> certificate of compliance</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20procedures" title=" legal procedures"> legal procedures</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crime" title=" computer crime"> computer crime</a>, <a href="https://publications.waset.org/abstracts/search?q=violation" title=" violation"> violation</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation%20cybercrime" title=" investigation cybercrime"> investigation cybercrime</a> </p> <a href="https://publications.waset.org/abstracts/188837/a-progressive-techno-legal-framework-for-digital-evidence-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188837.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">32</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> IAM Smart – A Sustainable Way to Reduce Plastics in Organizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Krithika%20Kumaragurubaran">Krithika Kumaragurubaran</a>, <a href="https://publications.waset.org/abstracts/search?q=Mannu%20Thareja"> Mannu Thareja</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Saving our planet Earth is the responsibility of every human being. Global warming and carbon emissions are killing our planet. We must adopt sustainable practices to give our future generations an equal opportunity to enjoy this planet Earth, our home. One of the most used unsustainable materials is plastic. Plastics are used everywhere. They are cheap, durable, strong, waterproof, non-corrosive with a long life. So longthat it makes plastic unsustainable. With this paper, we want to bring awareness on the usage of plastic in the organizations and how to reduce it by adopting sustainable practices powered by technology. We have taken a case study on the usage of photo ID cards, which are commonly used for authentication and authorization. These ID cards are used by employees or visitors to get access to the restricted areas inside the office buildings. The scale of these plastic cards can be in thousands for a bigger organization. This paper proposes smart alternatives to Identity and Access Management (IAM) which could replace the traditional method of using plastic ID cards. Further, the proposed solution is secure with multi-factor authentication (MFA), cost effective as there is no need to manage the supply chain of ID cards, provides instant IAM with self-service, and has the convenience of smart phone. Smart IAM is not only user friendly however also environment friendly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sustainability" title="sustainability">sustainability</a>, <a href="https://publications.waset.org/abstracts/search?q=reduce%20plastic" title=" reduce plastic"> reduce plastic</a>, <a href="https://publications.waset.org/abstracts/search?q=IAM%20%28Identity%20and%20Access%20Management%29" title=" IAM (Identity and Access Management)"> IAM (Identity and Access Management)</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-factor%20authentication" title=" multi-factor authentication"> multi-factor authentication</a> </p> <a href="https://publications.waset.org/abstracts/153407/iam-smart-a-sustainable-way-to-reduce-plastics-in-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153407.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> Epidemiology of Primary Bronchopulmonary Cancer in Tunisia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Melliti%20Rihab">Melliti Rihab</a>, <a href="https://publications.waset.org/abstracts/search?q=Zaeid%20Sonia"> Zaeid Sonia</a>, <a href="https://publications.waset.org/abstracts/search?q=Khechine%20Wiem"> Khechine Wiem</a>, <a href="https://publications.waset.org/abstracts/search?q=Daldoul%20Amira"> Daldoul Amira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Lung cancer is the leading cause of cancer death. Its incidence is increasing, and its prognosis remains pejorative. We present the clinical, pathological, and therapeutic characteristics of bronchopulmonary cancer (BPC) in Tunisia. Methods: Retrospective study including patients followed in the oncology department of the University Hospital of Monastir between April 2014 and December 2021 suffering from lung cancer. Results: These are 117 patients, including 86.3% men and 13.7% women (sex ratio 6.3). The average age was 64 years ± 9 (37-83), with 95.7% being over 50 years old. Patients were smokers in 82% of cases. The clinical signs were dominated by chest pain (27.5%) and dyspnea in 21.1% of cases. In 6 patients, an episode of COVID-19 infection revealed the diagnosis. Half of the patients had a PS between 0 and 1. Small cell lung cancer was present in 18 patients (15.4%). The majority of non small cell lung cancer was of the adenocarcinoma type (68.7%). The diagnosis was late (stage IV) in 62.4% of cases. BPC was metastatic to bone (52%), contralateral lung (25.9%), and brain (27.3%). Patients were oligometastatic in 26% of cases. Surgery and radiotherapy were performed respectively in 14.5% and 23.1% of cases. Three-quarters of the patients had had nutrition (75.2%). The ROS1 mutation was present in 1 patient. PDL-1 expression was >40% in 2 patients. Survival was mean eight months ± 7.4. Conclusion: Lung cancer is diagnosed at a late stage in Tunisia. The lack of molecular study for non-small cell PBC and the lack of marketing authorization for tyrosine kinase inhibitors in Tunisia make the management incomplete. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SCLC" title="SCLC">SCLC</a>, <a href="https://publications.waset.org/abstracts/search?q=NCSLC" title=" NCSLC"> NCSLC</a>, <a href="https://publications.waset.org/abstracts/search?q=ROS1" title=" ROS1"> ROS1</a>, <a href="https://publications.waset.org/abstracts/search?q=PDL1" title=" PDL1"> PDL1</a> </p> <a href="https://publications.waset.org/abstracts/146831/epidemiology-of-primary-bronchopulmonary-cancer-in-tunisia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146831.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teo%20Hao%20Jing">Teo Hao Jing</a>, <a href="https://publications.waset.org/abstracts/search?q=Shane%20Ho%20Ken%20Wae"> Shane Ho Ken Wae</a>, <a href="https://publications.waset.org/abstracts/search?q=Lee%20Jin%20Yu"> Lee Jin Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain%20technology" title="blockchain technology">blockchain technology</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20management%20applications" title=" data management applications"> data management applications</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=interoperability" title=" interoperability"> interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=delegated%20proof%20of%20stake" title=" delegated proof of stake"> delegated proof of stake</a> </p> <a href="https://publications.waset.org/abstracts/145592/consortium-blockchain-based-model-for-data-management-applications-in-the-healthcare-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145592.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Nurses' Knowledge and Attitudes about Clinical Governance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sedigheh%20Salemi">Sedigheh Salemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahnaz%20Sanjari"> Mahnaz Sanjari</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Aalaa"> Maryam Aalaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Mirzabeigi"> Mohammad Mirzabeigi </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Clinical governance is the framework within which the health service provider is required to ongoing accountability and improvement of the quality of their services. This cross-sectional study was conducted in 661 nurses who work in government hospitals from 35 hospitals of 9 provinces in Iran. The study was approved by the Nursing Council and was carried out with the authorization of the Research Ethics Committee. The questionnaire included 24 questions in which 4 questions focused on clinical governance defining from the nurses' perspective. The reliability was evaluated by Cronbach's alpha (α=0/83). Statistical analyzes were performed, using SPSS version 16. Approximately 40% of nurses correctly answered that clinical governance is not "system of punishment and rewards for the staff". The most nurses believed that "clinical efficacy" is one of the main components of clinical governance. A few of nurses correctly responded that "Evidence Based Practice" and "management" is not part of clinical governance. The small number of nurses correctly answered that the "maintenance of patient records" and "to recognize the adverse effects" is not the role of nurse in clinical governance. Most "do not know" answer was to the "maintenance of patient records". The most nurses unanimously believed that the implementation of clinical governance led to "promoting the quality of care". About a third of nurses correctly stated that the implementation of clinical governance will not lead to "an increase in salaries and benefits of the medical team". As a member of the health team, nurses are responsible in terms of participation in quality improvement and it is necessary to create an environment in which clinical care will flourish and serve to preserve the high standards. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clinical%20governance" title="clinical governance">clinical governance</a>, <a href="https://publications.waset.org/abstracts/search?q=nurses" title=" nurses"> nurses</a>, <a href="https://publications.waset.org/abstracts/search?q=salary" title=" salary"> salary</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20team" title=" health team"> health team</a> </p> <a href="https://publications.waset.org/abstracts/21076/nurses-knowledge-and-attitudes-about-clinical-governance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21076.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">430</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> A Practice of Zero Trust Architecture in Financial Transactions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Liwen%20Wang">Liwen Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuting%20Chen"> Yuting Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Tong%20Wu"> Tong Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shaolei%20Hu"> Shaolei Hu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=zero%20trust" title="zero trust">zero trust</a>, <a href="https://publications.waset.org/abstracts/search?q=trading%20terminal" title=" trading terminal"> trading terminal</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a> </p> <a href="https://publications.waset.org/abstracts/160939/a-practice-of-zero-trust-architecture-in-financial-transactions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Post Covid-19 Landscape of Global Pharmaceutical Industry</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abu%20Zafor%20Sadek">Abu Zafor Sadek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Pharmaceuticals were one of the least impacted business sectors during the corona pandemic as they are the center point of Covid-19 fight. Emergency use authorization, unproven indication of some commonly used drugs, self-medication, research and production capacity of an individual country, capacity of producing vaccine by many countries, Active Pharmaceutical Ingredients (APIs) related uncertainty, information gap among manufacturer, practitioners and user, export restriction, duration of lock-down, lack of harmony in transportation, disruption in the regulatory approval process, sudden increased demand of hospital items and protective equipment, panic buying, difficulties in in-person product promotion, e-prescription, geo-politics and associated issues added a new dimension to this industry. Although the industry maintains a reasonable growth throughout Covid-19 days; however, it has been characterized by both long- and short-term effects. Short-term effects have already been visible to so many countries, especially those who are import-dependent and have limited research capacity. On the other hand, it will take a few more time to see the long-term effects. Nevertheless, supply chain disruption, changes in strategic planning, new communication model, squeezing of job opportunity, rapid digitalization are the major short-term effects, whereas long-term effects include a shift towards self-sufficiency, growth pattern changes of certain products, special attention towards clinical studies, automation in operations, the increased arena of ethical issues etc. Therefore, this qualitative and exploratory study identifies the post-covid-19 landscape of the global pharmaceutical industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=covid-19" title="covid-19">covid-19</a>, <a href="https://publications.waset.org/abstracts/search?q=pharmaceutical" title=" pharmaceutical"> pharmaceutical</a>, <a href="https://publications.waset.org/abstracts/search?q=businees" title=" businees"> businees</a>, <a href="https://publications.waset.org/abstracts/search?q=landscape" title=" landscape"> landscape</a> </p> <a href="https://publications.waset.org/abstracts/148535/post-covid-19-landscape-of-global-pharmaceutical-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148535.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Effects of Carbon Black/Graphite Ratio for Electrical Conduction and Frictional Resistance of Nanocomposite Sol-Gel Coatings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Julien%20Acquadro">Julien Acquadro</a>, <a href="https://publications.waset.org/abstracts/search?q=Sophie%20Noel"> Sophie Noel</a>, <a href="https://publications.waset.org/abstracts/search?q=Fr%C3%A9d%C3%A9ric%20Houze"> Frédéric Houze</a>, <a href="https://publications.waset.org/abstracts/search?q=Philippe%20Teste"> Philippe Teste</a>, <a href="https://publications.waset.org/abstracts/search?q=Pascal%20Chretien"> Pascal Chretien</a>, <a href="https://publications.waset.org/abstracts/search?q=Cl%C3%A9ment%20Genet"> Clément Genet</a>, <a href="https://publications.waset.org/abstracts/search?q=Edouard%20Breniaux"> Edouard Breniaux</a>, <a href="https://publications.waset.org/abstracts/search?q=Marie-Jo%C3%ABl%20Menu"> Marie-Joël Menu</a>, <a href="https://publications.waset.org/abstracts/search?q=Florence%20Ansart"> Florence Ansart</a>, <a href="https://publications.waset.org/abstracts/search?q=Marie%20Gressier"> Marie Gressier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the study results of the electrical and tribological properties of nanocomposite hybrid sol-gel coatings developed for industrial applications on electrical connector housings. The electrical properties of coatings are provided by conductive fillers. The coatings presented in this study are formulated with different types of conductive carbon fillers, in this case carbon black and graphite particles. The coatings are deposited on a high-phosphorous nickel substrate by a dip-coating process. The authors have investigated the effects of the carbon black/graphite ratio on the coating's electrical and tribological properties. Electrical characterizations with a 4-probe method and AFM measurements as well as tribological tests by micro-friction shed light on the role of the black carbon/graphite ratio on the final properties of the sol-gel nanocomposite coatings. This study shows that the amount of carbon black mainly drives the coatings' electrical conduction property, while graphite's lubrication properties bring interest to reduce the values of friction coefficients (at a contact pressure of 800 MPa). In the industrial field of electrical connectors, such coatings aim at replacing cadmium and chromium (VI) protection, as recommended by REACH (Registration, Evaluation and Authorization of Chemicals) and RoHS (Restriction of Hazardous Substances in electrical and electronic equipment) regulations (Annex XVII of REACH). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=carbon%20conductive%20fillers" title="carbon conductive fillers">carbon conductive fillers</a>, <a href="https://publications.waset.org/abstracts/search?q=electrical%20conduction" title=" electrical conduction"> electrical conduction</a>, <a href="https://publications.waset.org/abstracts/search?q=sol-gel%20coatings" title=" sol-gel coatings"> sol-gel coatings</a>, <a href="https://publications.waset.org/abstracts/search?q=tribology" title=" tribology"> tribology</a> </p> <a href="https://publications.waset.org/abstracts/167788/effects-of-carbon-blackgraphite-ratio-for-electrical-conduction-and-frictional-resistance-of-nanocomposite-sol-gel-coatings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167788.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> The Factors Affecting on Promoting Productivity from Nurses' View</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahnaz%20Sanjari">Mahnaz Sanjari</a>, <a href="https://publications.waset.org/abstracts/search?q=Sedigheh%20Salemi"> Sedigheh Salemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Mirzabeigi"> Mohammad Mirzabeigi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, the world is facing a crisis of workforce and one of the most striking examples is the shortage of nurses. Nursing workforce productivity is related by various factors such as absenteeism, professional effectiveness and quality care. This cross-sectional study was conducted in 700 nurses who work in government hospitals from 35 hospitals of 9 provinces in Iran. The study was approved by the Nursing Council and was carried out with the authorization of the Research Ethics Committee. The questionnaire included 33 questions and 4 sub categories such as human resource, education and management. The reliability was evaluated by Cronbach's alpha (α=0/85). Statistical analyzes were performed, using SPSS version 16. The result showed that nurses emphasized on "respect to nurse-to-bed ratio" and less importance item was "using less experienced nurse". In addition, another important factor in clinical productivity is "Proper physical structure and amenities","good communication with colleagues" and "having good facilities". Also, "human resources at all levels of standard", "promoting on merit" and "well defined relationship in health system" are another important factors in productivity from nurse` view. The main managerial factor is "justice between employees" and the main educational component of productivity is “updating nursing knowledge”. The results show that more than half of the participants emphasized on the management and educational factors. Productivity as one of the main part of the health care quality leads to appropriate use of human and organizational resources, reduce cost services, and organizational development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=productivity" title="productivity">productivity</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20services" title=" nursing services"> nursing services</a>, <a href="https://publications.waset.org/abstracts/search?q=workforce" title=" workforce"> workforce</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20services" title=" cost services "> cost services </a> </p> <a href="https://publications.waset.org/abstracts/21075/the-factors-affecting-on-promoting-productivity-from-nurses-view" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21075.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authorization&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authorization&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>