Cassandra: Distributed Access Control Policies with Tunable Expressiveness
|
|
- Loreen Parks
- 6 years ago
- Views:
Transcription
1 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer Laboratory, University of Cambridge, U.K.
2 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 2/12 Cassandra: Yet Another PSL? Cassandra distributed Trust Management rule-based policy specification language (PSL) role-based: activation, deactivation, actions distributed: credential management
3 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 2/12 Cassandra: Yet Another PSL? Cassandra distributed Trust Management rule-based policy specification language (PSL) role-based: activation, deactivation, actions distributed: credential management Why YAPSL? wide range of applications need tunable expressiveness formal semantics: language and dynamics distributed query evaluation with guaranteed termination practical foundation: real-life case study
4 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 3/12 Cassandra Overview perform action activate role deactivate role request credential Interface Cassandra Entity Access Control Engine invoke modify grant access C remote query Policy Evaluator Policy (rules & credentials) Resources (Actions) query
5 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 4/12 Access Control Semantics (1/2) What: specifies dynamic meaning of 4 requests Why: makes subtle design decisions explicit
6 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 4/12 Access Control Semantics (1/2) What: specifies dynamic meaning of 4 requests Why: makes subtle design decisions explicit can perform action on s service? deduce permits
7 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 4/12 Access Control Semantics (1/2) What: specifies dynamic meaning of 4 requests Why: makes subtle design decisions explicit can perform action deduce permits on s service? can activate role deduce canactivate add hasactivated on to s service? s policy
8 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 5/12 Access Control Semantics (2/2) can deactivate s role deduce candeactivate on under the assumption isdeactivated deduce all isdeactivated on s service? remove all corresponding hasactivated, from s policy
9 !! & & & & & " " # ' ' 56 7 $ ) * '* ( % % ' ) ) * '* ( 6 % 7 % Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 5/12 Access Control Semantics (2/2) can deactivate s role deduce candeactivate on ) $ # ( "( under the assumption isdeactivated deduce all isdeactivated on s service? remove all corresponding hasactivated, ) $ # ( from s policy can request credential deduce canreqcred deduce +,..0 ) ' ,/..0 +,..0 "( ) '243 1 ) '243 1 from to get?
10 8 8 8 A F : F E F O 9 : O O Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 6/12 Policy Specification entities control access to their resources with a Cassandra policy a policy is a set of rules based on Datalog rules are of the form E =>4? GHJI BDCE M =>? I OK GHJI I FLK ; =>4? :<; (where, are entities and constraint domain) BDCE P HJI I P is a constraint from the
11 Q Q Q Q Y ] \ c R ca S c c Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 6/12 Policy Specification entities control access to their resources with a Cassandra policy a policy is a set of rules based on Datalog rules are of the form a XNb \ UV4W ^_J` ` ZD[\ b aa XNb ] UV W S ] ]La ^_J` ` ZD[\ X T UV4W S<T (where, are entities and constraint domain) ZD[\ d _J` ` d is a constraint from the predicates with special access control meaning: permits, hasactivated, canactivate, candeactivate, isdeactivated, canreqcred
12 e e e e e y r m q i g p t g q p m q w f i g p t g w w Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 6/12 Policy Specification entities control access to their resources with a Cassandra policy a policy is a set of rules based on Datalog rules are of the form u lnv p ij4k rsjt ndop v uu lnv ij k t wu rsjt t qlu ndop l h ij4k g<h (where, are entities and constraint domain) ndop x sjt t x is a constraint from the predicates with special access control meaning: permits, hasactivated, canactivate, candeactivate, isdeactivated, canreqcred Example: suppose a hospital s policy contains canactivate vdoctor NHS vcertifieddoctor izy u canactivate i y l l {} y l l v {} Alice ~
13 ˆˆ ˆˆ Š Œ Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 7/12 Constraint Domains for Tuning Expressiveness ƒ /, The simplest constraint domain: Œ Ž true false < <
14 Ÿ Ÿ «ª «Ÿ «Ÿ ª Ÿ ³³³ À ¼ ¾ Â Ä ª ³³³ Constraint Domains for Tuning Expressiveness, The simplest constraint domain: /ž œ š ª ª ª ª Ÿ< false true, a useful one for complex policies: ²± š ««µ Ÿ ž ³³ Ÿ< Ÿ ž ³³ Ÿ< L ½» º ¹ «Ÿ< Ÿ< Ÿ< Ÿ ž ³³ Ÿ< L Ÿ ž ³³ Ÿ< L ŸÁ à ŸÁ ŸÁ ŸÁ Ÿ< Ÿ< Ÿ< Ÿ< ŸÁ ŸÁ Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 7/12
15 ÔÊ Ó Ó Ò Ò Í Ê Ö Û Ú Õ Ö Ù Ê Ö È Ù Ê Õ Ñ Ê ÝÝÝ é å è ç ê ì Õ Ì ÝÝÝ Å í í í Å Constraint Domains for Tuning Expressiveness, The simplest constraint domain: È/É Æ Ç Å Ï Ñ Ð Ï ËËÌ Ù Õ Ø Õ Õ Ø Õ Ê<Ø Ì Ê< false true ËËÌ, a useful one for complex policies: Æ²Ü Å Ù Ö á Ö à Ù ß Ê É ÞÝÝ Ê< Þ Ê É ÞÝÝ Ê< LÞ ËËÌ æ ä ã Ù â Ö Ê<Ø Ê< Ê<Ø Ê< Ê<Ø Ê< Ê É ÞÝÝ Ê< LÞ Ê É ÞÝÝ Ê< LÞ ÊÁØ ÊÁ ÊÁØ ë ÊÁ ÊÁØ ÊÁ ËËÌ Constraint domains must support satisfiability checking projection subsumption checking For guaranteed termination, constraint domains have to be constraint compact Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 7/12
16 î î ö ö ï ö ø ø ø ö ö Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 8/12 Policy Idioms in Cassandra (1/2) appointment canactivate ïzð hasactivated canactivate ï õ ð hasactivated ñòôó ïzð AppointEmployee Manager ñòó óemployee ý õ òôó û ü úö ö ï ù appointment revocation isdeactivated óemployee isdeactivated ïzõ ð ý õ òôó û ü úö ö ï ù ïzõ ð ý õ ò ûjü úö ö ïzù AppointEmployee ý õ ò û ü úö ö ïzù AppointEmployee ï õ ð ï õ ð
17 þ þ þ ÿ ÿ ÿ ÿ Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 9/12 Policy Idioms in Cassandra (2/2) grant-dependent vs grant-independent appointment revocation candeactivate ÿ AppointEmployee ÿ candeactivate hasactivated ÿ Manager AppointEmployee cascading appointment revocation isdeactivated isdeactivated AppointEmployee ÿ ÿ AppointManager others: role hierarchy, role delegation, separation of duties, role validity dates, cardinality/manifold constraints, trust negotiation,... ÿ
18 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 10/12 National EHR in UK NHS planning ICRS with online EHR for clinicians and patients Difficulties: huge: 100m records, 400m episodes/yr, 1bn accesses/yr changing requirements distributed policies patient confidentiality requirements access control can be configured by patients/clinicians Our three layer approach: Master Patient Index (1), EHR servers (100s), health orgs (1000s) Cassandra policies for all layers: 310 rules, 58 roles, 10 actions patient consent, third-party consent, personal AC configuration, legal agents, staff appointment, clinician certification
19 !! -. " - $ /, +*! "! %! " ' ", +* Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 11/12 An Example from the EHR Policy Prerequisite for Treating-clinician canactivate & canactivate ( Treating-clinician Group-treating-clinician NHS-health-org-cred & hasactivated ) NHS-registration-authorities Current-time $ $ $ # $$ $$ #
20 Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 12/12 Conclusion Cassandra s expressiveness is tunable; very expressive with high-level enough for concise and readable policies low-level enough to express wide range of policies formal foundation substantial case study prototype implementation 132
Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker, and Peter Sewell, 5 th IEEE POLICY, 2004
Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker, and Peter Sewell, 5 th IEEE POLICY, 2004 Yue Zhang yzhang@sis.pitt.edu September 16, 2009 What s wrong with
More informationPointers & Arrays. CS2023 Winter 2004
Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this
More informationPointers. CS2023 Winter 2004
Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able
More informationLecture 5 C Programming Language
Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the
More informationThis file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.
Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts
More informationPersonal Conference Manager (PCM)
Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her
More informationCartons (PCCs) Management
Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,
More informationAPPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC
APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date
More informationConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing
ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide
More informationBanner 8 Using International Characters
College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating
More informationModules. CS2023 Winter 2004
Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules
More informationERNST. Environment for Redaction of News Sub-Titles
ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or
More informationState of Connecticut Workers Compensation Commission
State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,
More informationClaimSpotter: an Environment to Support Sensemaking with Knowledge Triples
ClaimSpotter: an Environment to Support Sensemaking with Knowledge Triples Bertrand Sereno, Simon Buckingham Shum & Enrico Motta Knowledge Media Institute The Open University Milton Keynes MK7 6AA, UK
More information) $ G}] }O H~U. G yhpgxl. Cong
» Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã
More informationASCII Code - The extended ASCII table
ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage
More informationAdorn. Serif. Smooth. v22622x
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs
More informationCommunication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:
More informationBUCKLEY. User s Guide
BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make
More informationCMPT 470 Based on lecture notes by Woshun Luk
* ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM
More informationTo provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.
200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015
More information124 DISTO pro 4 / pro 4 a-1.0.0zh
0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationAdorn. Slab Serif Smooth R E G U LAR. v22622x
s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,
More informationHoneyBee User s Guide
HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is
More informationAppendix C. Numeric and Character Entity Reference
Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your
More informationIII. CLAIMS ADMINISTRATION
III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800
More informationVersion /10/2015. Type specimen. Bw STRETCH
Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a
More informationAdorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on
More informationCommunication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 201 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/01 G2: ESC 02/14 06/01 G3: ESC 02/15 06/01 C0: -- C1: -- NAME:
More information1. Oracle Mobile Agents? 2. client-agent-server client-server
1. Oracle Mobile Agents?!"#$ application software system%. &'( )'*+, -. */0 1 23 45 678 9:; >?, %@ +%. - 6A(mobility) : B? CDE@ F GH8!" * channel #I 1 = / 4%. ()'*, &', LAN) - * application
More informationContrast. user s guide
N Contrast chu U77777777V user s guide c P font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.
More informationOOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement
OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment
More informationO Type of array element
! " #! $ % % # & : ; a ontiguous sequene of variables. all of the sae type. Eah variable is identified by its index. Index values are integers. Index of first entry is. ' ( ) * + May /,. - ( & ( ( J K
More informationDENIC Domain Guidelines
The English translation of the DENIC Eszett Domain Guidelines is provided for the convenience of our non-german-speaking customers. Regardless of this, only the original German-language version is legally
More informationOracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.
More informationESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange
TYPE: 9-character graphic character set REGISTRATION NUMBER: 9 DATE OF REGISTRATION: ESCAPE SEQUENCE G: ESC /8 / G: ESC /9 / G: ESC / / G: ESC / / C: C: NAME Extended African Latin alphabet coded character
More informationModels, Notation, Goals
Scope Ë ÕÙ Ò Ð Ò ÐÝ Ó ÝÒ Ñ ÑÓ Ð Ü Ô Ö Ñ Ö ² Ñ ¹Ú ÖÝ Ò Ú Ö Ð Ö ÒÙÑ Ö Ð ÔÓ Ö ÓÖ ÔÔÖÓÜ Ñ ÓÒ ß À ÓÖ Ð Ô Ö Ô Ú ß Ë ÑÙÐ ÓÒ Ñ Ó ß ËÑÓÓ Ò ² Ö Ò Ö Ò Ô Ö Ñ Ö ÑÔÐ ß Ã ÖÒ Ð Ñ Ó ÚÓÐÙ ÓÒ Ñ Ó ÓÑ Ò Ô Ö Ð Ð Ö Ò Ð ÓÖ Ñ
More informationProbabilistic analysis of algorithms: What s it good for?
Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like
More informationUSB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual
USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product
More informationSheila. Regular Bold. User s Guide
Sheila Regular Bold User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your
More information1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI
' þ ³ š ³ œ ³ 2006 1 Swing! " # &%' ()+-,./0 1 2 45-6 &8% 9 : ; < = >@? 2006A 5 B? 18 C@D E F : G HJILK-M!NPO-Q R S-I!T R!U V-W X Y!Z[N GUI\ ] ^ O-Q R S _a` b-w!c dje!f g Swing Wh i Z j k l m n N VisualEditor
More informationAdorn. Slab Serif BOLD. v x. user s gu ide
Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions
More informationBold U S E R S G U I D E
Yana Regular Bold Italic USER S GUIDE S S S font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.
More informationA Flexible Agent-Based Framework for Process Management
A Flexible Agent-Based Framework for Process Management Gregor Joeris, Christoph Klauck, Holger Wache University of Bremen FB 3, TZI / AG KI P.O. Box 330 440 D-28334 Bremen Germany joeris klauck wache@informatik.uni-bremen.de
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationGetting round your Mac with Shortcut Keys
The Mac has many useful keyboard shortcuts but these do depend on you knowing the difference between the following keys: Shift Fn Ctrl Alt (Also referred to as Option) Command (Also referred to as the
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationMAT 22B-001: Differential Equations
MAT 22B-001: Differential Equations Final Exam Solutions Note: There is a table of the Laplace transform in the last page Name: SSN: Total Score: Problem 1 (5 pts) Solve the following initial value problem
More informationA Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1
A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1 Fernanda Baião Department of Computer Science - COPPE/UFRJ Abstract Federal University of Rio de Janeiro - Brazil baiao@cos.ufrj.br
More informationDescription AX5805. Default values for the permissible motors. Version: Date:
Description values for the permissible motors Version: 1.3.0 Date: 2017-06-01 Table of contents Table of contents 1 Foreword 2 1.1 Notes on the manual 2 1.1.1 Intendent audience 2 1.1.2 Origin of the
More informationBanks Tupas Certification Service for Service Providers
Banks Tupas Certification Service for Service Providers Service description and guidelines Version 2.1 3 October 2005 SERVICE DESCRIPTION 2 (21) CHANGE LOG Version Page Comment V2.0 All Message structure
More informationBanks' TUPAS certification service for service providers
Banks' TUPAS certification service for service providers service provider's FK Federation of Finnish Financial Services for service providers CHANGE LOG Version Page Comment V2.0 All Message structures
More informationADORN. Roman. v x. user s gu ide
ADORN f Roman t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to
More informationAdorn. Serif. v x. user s gu ide
Adorn f Serif t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to
More informationSecond Year March 2017
Reg. No. :... Code No. 5052 Name :... Second Year March 2017 Time : 2 Hours Cool-off time : 15 Minutes Part III COMPUTER APPLICATION (Commerce) Maximum : 60 Scores General Instructions to Candidates :
More informationInfusion Pump CODAN ARGUS 717 / 718 V - Release Notes. Firmware V
Infusion Pump CODAN ARGUS 717 / 718 V - Release Notes Firmware V5.06.20165 Version Firmware V.5.06.20165 Release Date 28-May-2014 Update Type Optional Recommended Required (Field Safety Notice 1/2014 and
More informationFor information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs
Juicy User s Guide opent ype faq: For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make it possible
More informationIPv6 Servic es. LONG Net w ork
IP Servic es in LONG Net w ork Carlos Ralli Ucendo Telefonica Research & Development Overview IP Distributed Labs LONG: Building a distributed IP Lab. LONG Backbone LONG Global View LONG IP Services Examples
More information]a a. ] v. A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts (3rd Edition), The McGraw Hill Company, 1997.
]a a î íf= áõâfé ] v = A. Silberschatz, H. Korth and S. Sudarshan, Database System Concepts (3rd Edition), The McGraw Hill Company, 1997. C. Batini, S.Ceri, and S. Navathe, Conceptual Database Design -
More informationMyriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,.
Myriad Pro Light Latin capitals A B C D E F G H I J K L M N O P Q R S T U V W X Y Z & Æ Ł Ø Œ Þ Ð Á Â Ä À Å Ã Ç É Ê Ë È Í Î Ï Ì İ Ñ Ó Ô Ö Ò Õ Š Ú Û Ü Ù Ý Ÿ Ž Ă Ā Ą Ć Č Ď Đ Ě Ė Ē Ę Ğ Ģ Ī Į Ķ Ĺ Ľ Ļ Ń Ň Ņ
More informationKbdKaz 500 layout tables
a ao a ao a o o o o o a a oo A o a a o a a oa ao oo A o a a o oa ao A a o a oa oa ao o a a a a o a A a a A ˆ a a A ˇ ao a a A a a A o Ao a a A Ao a o a a A ao a o a a A α a A a a a A o o a a A A a a A
More information{c,} c 00E7 ç ç LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è è LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é é LATIN SMALL
Non-ASCII Symbols in the SCA Armorial Database by Iulstan Sigewealding, updated by Herveus d'ormonde 4 January 2014 PDF Version by Yehuda ben Moshe, 16 February 2014 Since January 1996, the SCA Ordinary
More informationChemistry Hour Exam 2
Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total
More informationUser Guide for Greek GGT-Fonts Revision date: 23 May, 2011
User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 by Graham G Thomason Copyright Graham G Thomason, 2009. Permission is granted to copy or publish this document, provided this complete notice
More informationUNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614. DATE: 5 March 2015 MARKS: 100 SECTION A (36)
UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614 DATE: 5 March 2015 MARKS: 100 ASSESSOR: Prof. P.J. Blignaut TIME: 180 minutes MODERATOR: Dr. L. de Wet SECTION A (36)
More information7DONSODQ. ƒ We called our platform 9 D-II TG: Distributed Internet Traffic Generator
',7*'LVWULEXWHG,QWHUQHW7UDIILF *HQHUDWRU Antonio Pescapè,, Donato Emma, Stefano Avallone,, Alessio Botta, and Giorgio Ventre { pescape@unina.it @unina.it} Dipartimento Informatica e Sistemistica Università
More informationEditors: prof. Ing. Iveta Ubrežiová, CSc., Ing. Drahoslav Lančarič, PhD., Ing. Ingrida Košičiarová, PhD. ISBN
Proceedings from international scientific conference Corporate Social Responsibility and Human Resource Management in V4 Countries. Organised by the Department of Management, Faculty of Economy and Management,
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationA Survey of Current CLOS MOP Implementations
A Survey of Current CLOS MOP Implementations Raymond de Lacaze Artificial Intelligence Center SRI International 333 Ravenswood Ave. Menlo Park, CA 9402 delacaze@ai.sri.com Tim Bradshaw Cley Limited 6 East
More informationPe h-ōe-jī Unicode Correspondence Table
Pe h-ōe-jī Correspondence Table This document contains the code points and font examples for characters needed to write Pe h-ōe-jī for Taiwanese (Hoklo). Standard latin capital and small letters are not
More informationUsing SmartXplorer to achieve timing closure
Using SmartXplorer to achieve timing closure The main purpose of Xilinx SmartXplorer is to achieve timing closure where the default place-and-route (PAR) strategy results in a near miss. It can be much
More informationA COMPARISON BETWEEN OBJECT-ORIENTED DATABASE SYSTEMS AND INFORMATION SYSTEM SHELLS
A COMPARISON BETWEEN OBJECT-ORIENTED DATABASE SYSTEMS AND INFORMATION SYSTEM SHELLS ABSTRACT The work makes an overview of the main characteristics of object-oriented database systems (OODBS) and information
More informationThe linear transformation X À Ä given by XÐBÑ œ EB is invertible À that is, there
What do we know about an invertible ( 8 8) matrix E? E is invertible Í E rref ÐEÑ œ M 8 X is invertible X À Ä (where XÐBÑ œ EB) is onto for every, in 8, EB œ, has at least " solution The columns of E span
More informationsuas das maior do o simples soma é que todo a partes
suas das maior do o simples soma é que todo a partes Aquino Aquino is a display calligraphic stencil typeface inspired by a liturgic book made by portuguese friar Tomás Aquino in 1735 Collectaneum Sacri
More informationUNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614
UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614 DATE: 7 May 2015 MARKS: 130 ASSESSOR: Prof. P.J. Blignaut (Bonus marks: 5) MODERATOR: Dr. L. de Wet TIME: 180 minutes
More informationYou 2 Software
PrismaCards Enter text for languages with exotic fonts You 2 Software http://www.you2.de info@you2.de Introduction To work in PrismaCards and other programs with complex fonts for different languages you
More informationUsing non-latin alphabets in Blaise
Using non-latin alphabets in Blaise Rob Groeneveld, Statistics Netherlands 1. Basic techniques with fonts In the Data Entry Program in Blaise, it is possible to use different fonts. Here, we show an example
More informationIntroduction to operation
Introduction to operation C 70 The status of the system is visualized in real time and shows a synoptic of both the transfer chamber and the main components of the machine sheet C 70A A number of different
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationoptions (alternatives)
)! "!#$% #!&! '#($ * +,-./012-3/,-/ 452363/,7,89:636 ; ?@ABCDE=F@GGH>IJ@KLGMLBH=>JL>LGNCHC ; O@?HCH=> PQ=RG@EST=GKH>IDTBLI@C ; U@GLBH=> =V O W B= C=E@ =BX@Q O H C?HAGH>@C * 452363/,YZ8[3,\ 1,05. ],25.-83,-:
More informationChap. 3. Chap. 3. Recall and Precision Alternative Measures. TREC Collection CACM and ISI Collections CFC (Cystic Fibrosis Collection)
b!"$#%&'(!) *,+.-0/1-0/2 3547698;:'=?@A8;BC
More informationHow to Implement DOTGO Engines. CMRL Version 1.0
How to Implement DOTGO Engines CMRL Version 1.0 Copyright c 2009 DOTGO. All rights reserved. Contents 1 Introduction 3 2 A Simple Example 3 2.1 The CMRL Document................................ 3 2.2 The
More informationmdput for mathematical typesetting with Adobe Utopia Paul Pichaureau January 29, 2006
mdput for mathematical typesetting with Adobe Utopia Paul Pichaureau January 29, 2006 Contents 1 Introduction 1 1.1 Requirements.................................................... 1 1.2 The name of the
More informationAlfred Aho Brian Kernighan Peter Weinberger gawk awk GUN. GNU linux. gawk
awk linux/unix awk linux/unix ( ) awk Alfred AhoBrian KernighanPeter Weinbergergawk awk GUN awk gawk GNU linux Bell awk GNU awk gawk awk [options] 'script' var=value file(s) awk [options] -f scriptfile
More informationKBD-SFTCFG. Instruction Manual Software for the IntuiKey Series Digital Keyboard Software Version 1.80
KBD-SFTCFG EN Instruction Manual Software for the IntuiKey Series Digital Keyboard Software Version 1.80 KBD-SFTCFG Instruction Manual Contents EN 2 Table of Contents 1.0 INTRODUCTION...3 2.0 REQUIREMENTS...3
More informationQuantum. Name: Quantum. Classification: Display Sans Serif. Designer: Hitesh Malaviya (Rocky) Designed in: Styles: 5.
Quantum Name: Quantum Classification: Display Sans Serif Designer: Hitesh Malaviya (Rocky) Designed in: 2015 Styles: 5 A very friendly-looking sans, Quantum Latin is Hitesh Malaviya s first published typeface
More informationCrystal Structure and Superhydrophilic Property of TiO 2 Thin Film Coated on Si(100) Wafer
Krean J. Crystallgraphy Vl. 12, N. 3, pp.177~181, 2001 Si(100) TiO 2 * *, * Crystal Structure and Superhydrphilic Prperty f TiO 2 Thin Film Cated n Si(100) Wafer Sarah Kim, Wn-J Ch*, Jae-Gwan Park* and
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationV Y. Fragment Pro. Fragment Pro. 1 Copyright 2013 Vít Šmejkal All rights reserved
& V Y Fragment Pro 1 Copyright 2013 Vít Šmejkal All rights reserved www.vtypo.com VY 2 Copyright 2013 Vít Šmejkal All rights reserved www.vtypo.com exa cos uvz 3 Copyright 2013 Vít Šmejkal All rights reserved
More informationThe course that gives CMU its Zip! Web Services Nov 26, Topics HTTP Serving static content Serving dynamic content
15-213 The course that gives CMU its Zip! Web Services Nov 26, 2002 Topics HTTP Serving static content Serving dynamic content Web History 1945: 1989: 1990: Vannevar Bush, As we may think, Atlantic Monthly,
More informationFrom Tableaux to Automata for Description Logics
Fundamenta Informaticae XX (2003) 1 33 1 IOS Press From Tableaux to Automata for Description Logics Franz Baader, Jan Hladik, and Carsten Lutz Theoretical Computer Science, TU Dresden, D-01062 Dresden,
More informationThis proposal is limited to the addition and rearrangement of some of the Korean character part of ISO/IEC (UCS2).
JTC1/SC2/WG2 N 2170 DATE: 2000-02-10 THE TECHNICAL JUSTIFICATION OF THE PROPOSAL TO AMEND THE KOREAN CHARACTER PART OF ISO/IEC 10646-1 TO BE PROPOSED BY D.P.R. OF KOREA AT 38TH MEETING OF ISO/JIC1/SC2/WG2
More informationCalligraphic Packing. Craig S. Kaplan. Computer Graphics Lab David R. Cheriton School of Computer Science University of Waterloo. GI'07 May 28, 2007
Calligraphic Packing Jie Xu Craig S. Kaplan Computer Graphics Lab David R. Cheriton School of Computer Science University of Waterloo GI'07 May 28, 2007 Outline 1 Background of NPR Packing Artistic Packing
More informationEffective Sequential Pattern Mining Algorithms for Dense Database
DEWS2006 3A-o4 Abstract Effective Sequential Pattern Mining Algorithms for Dense Database Zhenglu YANG, Yitong WANG, and Masaru KITSUREGAWA Institute of Industrial Science, The Univeristy of Tokyo Komaba
More informationMeta-Policies for Distributed Role-Based Access Control Systems
Meta-Policies for Distributed Role-Based Access Control Systems András Belokosztolszki and Ken Moody University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge, United Kingdom andras.belokosztolszki,
More informationFUNERAL HOMES SYSTEM ADMINISTRATOR MAINTENANCE TOOLS
FUNERAL HOMES SYSTEM ADMINISTRATOR MAINTENANCE TOOLS Table of Content Version 2 REV 08/2018 How to Log Into TxEVER 5 Library Maintenance 5 Common Navigation Buttons 6 Death Module 7 Funeral Homes & Local
More informationInformation Retrieval. Lecture 3: Evaluation methodology
Information Retrieval Lecture 3: Evaluation methodology Computer Science Tripos Part II Lent Term 2004 Simone Teufel Natural Language and Information Processing (NLIP) Group sht25@cl.cam.ac.uk Today 2
More informationSMS API TECHNICAL SPECIFICATION
SMS API TECHNICAL SPECIFICATION Version 2.1 Provision of the Click SMS Gateway Service is dependent upon compliance with the specifications contained in this document. Although Click SMS has taken reasonable
More informationSklonar. Number of fonts in a family: 3 (Light, Medium, Bold) Number of glyphs per font: 411 Release date: 2016
BC Sklonar Introduction 1/5 Sklonar Definition The Sklonar typeface was originally designed exclusively for Zdeněk Sklenář s S Gallery corporate identity, conceived by Studio Najbrt in 2011. Two years
More information