Technical Analysis of Microsoft Excel

Size: px
Start display at page:

Download "Technical Analysis of Microsoft Excel"

Transcription

1 A MULTI{LEVEL SECURE OBJECT-ORIENTED DATABASE MODEL Gerge B. Durham ; Knsanins Kalpakis Cmpuer Science and Elecrical Engineering Deparmen Universiy f Maryland Balimre Cuny 000 Hillp Circle Balimre MD 50 Absrac This mdel presens a muli-level secure (MLS) daabase using bjec-riened echnlgy. The mdel is based n, and exends he requiremens f he Deparmen f Defense STD, DD Trused Cmpuer Sysem Evaluain Crieria (TCSEC) daed December 985, cmmnly knwn as he Orange Bk. Currenly, here des n exis a daabase mdel in any echnlgy which mees he requiremens f he Orange Bk. There has been lile ineres uside f he U.S. Gvernmen and he academic cmmuniy because he Orange Bk is believed fcus n miliary needs raher han cmmercial needs. Since cmmercial espinage is grwing daily, and wihu prper precin, cmmercial infrmain will be pilfered bh nainally and inernainally, ur mdel is f ineres cmmercial users as well. Previus wrk has fcused n Discreinary Access Cnrls (DAC), Mandary Access Cnrls (MAC), r her securiy requiremens n included in he Orange Bk, bu n wrk includes all hree. We develp plicies fr access cnrls, inference cnrls, and implemenain sraegy based n he MAC, DAC, and her securiy requiremens. The access auhrizain mechanism is based n a cmbinain f DAC and MAC requiremens, and he prpsed mdel is easily exended include her access requiremens. We als presen an uline fr implemening ur mdel. Keywrds: Daabase securiy, bjec{riened daabases, mandary access cnrls, discreinary access cnrls, inference channels, muli{level securiy. I. Inrducin Many rganizains day wan disribue infrmain via he Inerne and Wrld Wide Web, ye hey als have les which hey wan resric access. Even wihin an rganizain, sme infrmain may be disribued all emplyees, while her infrmain need g nly selec grups f emplyees. These rganizains mus emply a Muli-Level Secure (MLS) daabase prvide fr variable access cnrls, ye have ecien access infrmain. Suppred in par by he Deparmen f Defense Advanced Sudies Prgram. gdurha@cs.umbc.edu Endrsing Advisr

2 Alhugh each rganizain will have is wn se f securiy requiremens based n is rganizain and purpse, here are cerain general plicies and requiremens which mus exis. Because here is n agreemen n, r deniin f a secure daabase mdel uside f he U.S. Gvernmen, his paper will emphasize he requiremens as se frh in he "Deparmen f Defense Trused Cmpuer Sysem Evaluain Crieria" (TCSEC), cmmnly knwn as he Orange Bk [5]. The mdel described in his paper ies geher many f he cnceps develped in earlier wrks, alng wih he Orange Bk requiremens, frm a base fr he mdel. I hen renes and exends he basic plicies and cnceps presen a cmpsie MLS daabase mdel which mees he needs f he miliary and cmmercial cusmers. 4 Such a mdel has n previusly been dened, since ms research has emphasized nly ne aspec f he securiy requiremens, raher han lking a all f hem simulaneusly. The remainder f his paper is rganized as fllws: In secin II, we presen a brief verview f he TCSEC divisins and classes, dene sme f he cnceps f secure daabases and infrmain securiy, and discuss previus wrk. In secin III, we develp he securiy plicies and implemenain sraegies fr ur mdel. In secin IV, we develp he daabase mdel. In secin V, we explain he implemenain f he securiy plicies and implemenain sraegies. In secin VI, we presen sme cnclusins abu ur mdel, and sugges areas fr fuure wrk. II. Preliminaries and Previus Wrk In his secin, we discuss securiy plicies and cnceps ha are essenial ur mdel. Furher, we review previus wrk in daabase securiy, relaed ur mdel. II-. DOD STD: The Orange Bk The requiremens fr his mdel are based n he TCSEC [5], which describes fur divisins f rus fr cmpuer sysems. The fur divisins, D hrugh A, wih A being he highes level f assurance, have subdivisins, knwn as classes. Each divisin and subdivisin wihin he TCSEC is dened by is requiremens fr implemenain and validain f eiher Discreinary Access Cnrl (DAC) r Mandary Access Cnrl (MAC), r bh. In general, DAC may be hugh f as resricing a user's access infrmain based n heir psiin r membership in a grup, and hus, is he user's "need--knw" he infrmain in rder fulll heir duies. MAC may be hugh f as resricing a user's access infrmain based n ha user's securiy clearance level as cmpared he assigned securiy level f he infrmain. The ineresed reader is referred he surce [5] fr furher deail. II-. Preliminaries We dene a secure daabase as ne which can be shwn auhrize r deny user access infrmain in accrdance wih he securiy plicies f an rganizain. The se f securiy plicies cvers hree areas: securiy clearance, securiy level, and need--knw rules. A securiy clearance is a measure f he level f rus given an individual. The securiy level is a label assigned infrmain, designaing he infrmain's classicain level as 4 The mdel assumes a Trused Cmpuing Base (TCB) which isinvulnerable uside aack.

3 ne f a se f hierarchical classicain labels, and pssibly, ne f a se f nn-hierarchical cmparmen labels. Need--knw rules are dynamic rules which dene he infrmain a persn needs knw in rder d heir jb. We als need inrduce he idea f access cnrls. Abrams and Smih [] describe access cnrl plicies fr daabases in reference a Generalized Framewrk fr Access Cnrl (GFAC), which cnains hree cmpnens: Access Cnrl Infrmain (ACI), Access Cnrl Rules (ACR), and Access Cnrl Auhriy (ACA). Abrams and Smih [] believe ha he radiinal MAC and DAC requiremens are resricive cver he brad specrum f access cnrl plicies, and hus, he sysem mus be able aumaically change daa classicain labels as he values r sysem aribues change. II-. Previus Wrk Bell and Lapadula [] frmally dene a cmpuer securiy mdel which is he defac sandard fr ms laer wrk, and include he *-prpery, which saes ha a subjec, which is an acive eniy, may access an bjec, which is a passive eniy, nly if he subjec's securiy level is equal r greaer han he securiy level f he bjec, and any nnhierarchical caegries f he bjec are included in he subjec's caegries. When a subjec represens a user, he subjec's securiy level equaes he securiy clearance f he user. The TCSEC [5], which relies heavily n he wrk f Bell and Lapadula [], was he rs frmal deniin fr Muli-Level Secure (MLS) cmpuing. Denning [4] prvides an inrducin cver channels and inference cnrl heries, which need be cnsidered when evaluaing a secure cmpuing sysem. Several research ers have fcused n DAC. Fernandez e al. [7, 8, 6] use frmal mdels describe access auhrizain in he frm f direced graphs based n inheried permissins beween superclasses and heir subclasses. Gudes e al. [0] exend he abve mdel include negaive auhrizain. Keler's mdel [, 4], based n access cnrl liss (ACL), prvides a ner level f granulariy, and mdels access cnrl f ypes as well as bjecs. The user-rle based mdel f Demurjian e al. [] prvides a hrugh presenain f auhrizain analysis. Oher ers have fcused n MAC requiremens. Garvey and Lun [9] prvide a unique apprach an MLS daabase wih a sudy f using knwledge base rules as access cnrls an bjec-riened daabase. Jajdia and Kgan [], Sandhu e al. [], and Schaefer e al. [] base heir sudies n a Trused Cmpuer Base (TCB) ler cnrlling access he daabase. The uniqueness f Schaefer e al. [] is ha i has been implemened as a prype. McCllum e al. [7] fcus n resricing access by allwing he riginar cnrl access auhrizain via an ACL, which is aached each bjec. Millen and Lun [8] fcus n he inference prblem. Their mdel des n allw a message direcly invke he mehd f an bjec, bu raher, a new subjec is creaed a he bjec fr he sle purpse f invking he prper mehd n behalf f he message. Marks e al. [6] and Mr e al. [9] presen ascheme fr slving he inference prblem in relainal daabases via a user access hisry lis and pre-dened hreshlds f aggregain. Keefe and Tsai [] prvide a cmparisn f hree bjec-riened mdels agains wha he auhrs dene as general principles fr "well frmed" mulilevel daabases. Their cnribuin is ha hey shw he srenghs and weakness f he hree mdels, and er insigh

4 in pssibiliies fr a jin DAC/MAC mdel. Thuraisingham [5] discusses a mulilevel mulimedia daabase sysem which reassembles a cmplex bjec frm is many pars a a requesed level. Sibley and Smih [4] prvide a sudy f secure behavir in which he sysem respnse incrrec acins varies depending n he plicy, r inerpreain f plicy f he paricular implemenain. III. Plicy Deniins and Descripins We prvide securiy deniins rs, hen plicies, and nally sraegies fr implemenain which will help ensure he securiy f ur mdel. III-. Deniins Level is dened be any ne f a se f securiy levels which frm a linear rder L = fl ;l ;:::; : l l g, frm lwes highes, and ha cnfrm he requiremens se frh fr MAC in he TCSEC. Access-Requiremen AR = far ; ar ;:::gis dened be any ne f a se f labels which dene he accessibiliy daa elemens required accmplish a dened ask. The se Access-Requiremens is an arbirary se f labels whse cmpsiin varies ver ime and can be expressed hrugh DAC as se frh in he TCSEC. Tasking T = f = (l; ar) : l L and ar AR g is dened be a pair f Level and Access-Requiremen such ha i delimis he access a a paricular securiy level which is needed fulll a dened jb funcin. We shw he mapping f users and bjecs Taskings in secin IV-. III-. Basic Securiy Plicies BP Daa bundaries depend n Tasking. Access daa is limied by bh Level and Access-Requiremen, he cmbinain f which frms he limiains required fr levels f securiy access, and implemens he plicy f leas privilege r need knw, hus cmplying wih bh DAC and MAC requiremens. BP Wrie auhrizain is nly fr he curren Tasking. A user can wrie nly heir curren Level and wihin heir curren Access-Requiremen. They mus exi he daabase and re-ener in he apprpriae Tasking in rder wrie a higher r lwer Level, r anher Access-Requiremen a heir curren Level. BP Read auhrizain is fr he curren Tasking and any auhrized lwer level bjecs which are in he Access-Requiremen dened fr he curren Tasking. Read up is n allwed. BP4 A user is graned nly ne daabase access a a ime. This plicy ensures ha here is n daa w beween w cncurren prcesses f a single user. BP5 Adminisrain is a Tasking. Adminisraive duies are dened in Taskings which allws fr sandardizain f user access, and als limis adminisrars wih he need knw requiremen. BP6 There is n aumaically inheried access auhrizain beween classes. T be auhrized access, a Tasking mus have explici auhrizain each bjec.

5 BP7 The granulariy f access auhrizain is variable; auhrizain may be an enire class, bjec, r aribue. This plicy allws fr he exibiliy needed dene Taskings which will exacly mee he needs f he users, bu n be in vilain f eiher MAC r DAC. III-. Implemenain Sraegies The fllwing sraegies exend he basic plicies beer rene he securiy mechanisms f he mdel. IS Tasking auhrizain is veried fr each acin. The sysem mus ensure ha n user can access daa based n an udaed auhrizain, and herefre, mus ake acin revalidae all users as sn as any user access is mdied. IS Full auhrizain all bjecs needed execue a query is required. This plicy limis inference channels. IS All daabase reques failures, wih limied excepin, reurn he same infrmain he user. This plicy eliminaes an inference channel. The limied excepins are sysem failures which are independen f he requesed acin; e.g., an peraing sysem failure. IS4 Reuse f a user bjec idenier frm a lwer Level, r a dieren Access- Requiremen will succeed. This plicy resuls in allwable plyinsaniain a he expense f daabase cmplexiy. I is necessary blck infrmain inference. IS5 There will n be muliple cpies f daa iems wihin he daabase. Access a daa iem frm muliple Taskings will reference he same acual daa iem. IS6 Once an bjec is creaed wihin he daabase, i will remain a is creain Level and Access-Requiremen fr he life f he daabase unless all acive references are deleed. When a user in ne Tasking delees an bjec, ha bjec cninues exis fr all her Taskings which reference i. IS7 N bjec may be aumaically reclassied. T mdify he Level f an bjec, ha bjec mus be deleed frm he daabase and re-creaed a is new Level. IV. Daabase Mdel The daabase mdel prvides a frmal descripin in erms f he daa as bjecs, and he funcins access he daa as mehds. The daabase securiy is implemened as access cnrl funcins. IV-. Daabase Objecs The erm "bjec-riened" evkes dieren hughs fr dieren peple. The erms assciaed wih bjec echnlgy are given varying inerpreains depending n he auhr and circumsances. Rishe [0], Rumbaugh e al. [], and Kim and Lchvsky [5] prvide furher explanain f bjec-riened cnceps and design inerpreains. By sric deniin, all elemens in an bjec-riened sysem are bjecs. Jajdia and Kgan [] use his ype f deniin in heir saemen ha heir mdel has nly bjecs, and n subjecs. We,

6 hwever, will use he erm bjec in he sense ha an bjec is a passive elemen sred in he daabase. A subjec is an acive elemen, usually invked n behalf f a user, which sends a message an bjec acivae a mehd fr ha bjec. A daabase is a riple DB = (U; S; O), where U = f (u ; s ); (u ; s );::: : u i is eiher a single user r a grup f users, and s i is he user saus f acive r inacive g (users), S = fs ;s ;:::g (subjecs), and O = f ; ;:::g (bjecs). An bjec Obj = (OID; Val; M) has an idenier, a value, and a se f mehds. The idenier (OID), is a sysem assigned unique label. The value (Val) may be an amic value, r i may be a cmplex value f muliple bjecs. Mehds (M) is a nn-empy se f mehds used access he values in Val. There is a se User ID cnaining uples (UOID, Tasking). The UOIDs are user generaed labels which are human readable, and he user uses reference he bjecs. The UOID mus be paired wih a Tasking because ne UOID may reference muliple bjecs frm dieren Access-Requiremens. We dene map bjec(u,) bea funcin which given a UOID and Tasking reurns he OID f he assciaed bjec. There may be a {{ r a {{many relainship beween UOID and OID. There may n be a many{{ r a many{{many relainship. Objecs are insaniains f classes, hus, each bjec is a member f a single class which is dened fr he daabase. Our bjec-riened daabase schema is a red direced acyclic graph. A he r, here is a class, knwn as a meaclass, which is he superclass f all her classes. There is a subclass{superclass relainship, beween he elemens f he se f classes C = fc ;c ;:::g in he daabase, which frms a parial rder. We wrie c i c j whenever c i is a subclass f c j. Therefre, her classes are eiher subclasses f he meaclass, r hey are subclasses f her subclasses f he meaclass. IV-. Access Vericain Vericain f a user access daa in he daabase is a {sep prcess. Afer sysem lgin, gain iniial enry in he daabase, user vericain Vu(u; ) mus ccur fr he user in a seleced Tasking. Le saus(u) be a funcin which given a user u, reurns rue if he user is n acive in he daabase, and false herwise. Als, le member(u; ) be a funcin which given a user u and a Tasking, reurns rue if he user is dened fr he Tasking, and false herwise. We dene Vu(u; ) reurn null, if he user r Tasking are invalid; acceped if saus(u) and member(u; ) are rue; and, rejeced herwise. The secnd sep is an perain vericain Vp(u,m; ) which ccurs whenever he user makes a reques he daabase. The user reques is parsed s ha curren auhrizain each bjec needed saisfy he reques is veried. Le map bjec(u,) be a funcin which akes a UOID u and a Tasking, and reurns he OID f he referenced bjec. Le allwed(; m; ) be a funcin which akes an bjec, amdem,andatasking, and reurns a mehd if he Tasking is dened fr mde m n bjec ; null herwise. Mde is dened be any ne f he se Mde = fread, Updae, Creae, Deleeg. Operain vericain is dened as reurning null if he bjec r mde m are n valid; a mehd if allwed(; m; ) reurns a mehd; and, rejeced herwise.

7 IV-. Reference Srucure An impran feaure f an MLS daabase is he capabiliy fr a user have read access he values f bjecs which are belw he user's level as well as access bjec values a he user's level. Our mdel uses a Muliple Objec Blck (MOB) implemen ha capabiliy. The MOB is a dynamically creaed lis f references bjecs, indexed in sme predened rder. In ur mdel, we dene he rder have he "primary reference" a he beginning f his lis. The her bjecs in his lis are in descending rder f heir assciaed Levels, cver sries rs, hen re-creaed bjecs. Tw assciaed mechanisms are he Muliple Objec Prmp (MOP) and he Deleed Objec Prmp (DOP). The MOP prmps he user whenever he sysem nds an MOB assciaed wih a uple (u,) enable he user designae which f he muliple referenced bjecs is desired. The DOP nies a user ha a lwer Level user has deleed he bjec, frm his r her space, which he curren user is requesing. The DOP allws he user cnrm he delee, reques he bjec persis, r re-creae he bjec a he curren user's Level. Take fr example a -- relainship beween UOID and OID where he UOID is dened fr muliple Taskings. In his circumsance, here are muliple references frm he UOID lis an OID, which references an bjec, as in Figure. UOID Tasking Ref. u u u OID Ref. u Figure : {{ Relainship The sae represened by Figure is ha where Tasking,, and all have he same Access-Requiremen, bu securiy levels unclassied, cndenial, and secre, respecively, fr example. Objecs and, herefre, represen bjecs a he unclassied Level. Nw, le a user in Tasking delee he bjec wih UOID u, and hen creae a new bjec using u as he UOID. A he same ime, he users in and may wan bjec persis. This sae is accmplished wih he use f a MOB, wih a lis f references muliple bjecs. The sysem creaes he MOB when i recgnizes he exisence f muliple bjecs being referenced frm wihin a cmmn Access-Requiremen. The resul is shwn in Figure. UOID Tasking Ref. OID u u u u Ref. Figure : New bjec a lwes level The assumpin we make here is ha unil a user delees an exising bjec, ha bjec

8 remains f primary ineres he user ver any newly creaed bjec a a lwer level. Ging back he riginal sae as in Figure, le a user in Tasking delee his r her reference, hen creae a new bjec using u. Cver sries can be creaed in his manner. The cmplexiy f his creae arises frm he fac ha alhugh his acin will n aec 's view, i will aec 's view since bh, and he newly creaed bjec will be wihin 's view, and fr ha maer, remains wihin 's view. An alernaive wuld be nly allw he user view he neares bjec, and require he user lgin a he apprpriae level see a cver sry bjec. The securiy aspecs are unaeced by he chice f implemenain. Figure shws he resul. UOID u u u u Tasking Ref. OID Ref. Figure : Cver Sry Implemenain We make he assumpin ha a user a any Level will be primarily ineresed in viewing he neares bjec, ha is, an bjec a he same, r nex lwer Level wihin ha user's view. Therefre, he primary bjec which is accessed by hrugh UOID u will be, n. V. Ouline fr Implemening Plicies in he Mdel We nw discuss he securiy requiremens in erms f he access cnrls shw ha he mdel implemens he requiremens as given in secin III. V-. Basic Plicy Implemenain BP, BP, BP, and BP5 rely n allwed(; m; ) reurning he crrec mehd. If an incrrec mehd is reurned, hen eiher allwed(; m; ) is in errr, r ne r mre f he her mapping funcins has an errr in hem, and he incrrec parameers were passed allwed. BP4 relies ally n saus(u) prvide a crrec mapping fr he specied user. BP6 is accmplished during class deniin alng wih BP7. In bh cases, he class mehds mus be prperly dened such ha hey will be accessible nly when Taskings are dened fr hem, and in he case f BP7, ha hey prperly access mehds f her bjecs. V-. Implemenain Sraegy Design IS and IS rely n crrec mappings wihin vericain perain such ha a crrec, curren mehd is reurned fr each bjec in he user reques. IS is accmplished wih excepin handlers. IS4 and IS5 bh require he crrec implemenain f MOBs. IS6 and IS7 rely n he MOBs as well, bu hey als require prper acin in respnse DOPs. VI. Cnclusins When implemened as previusly described, his mdel prvides an MLS daabase meeing he saed requiremens. Alhugh here is n aggregae plicy saed, he necessiy f ne is deermined by he implemenain. Als, sme rganizains may n require

9 such a high level f assurance fr heir paricular use. Variains f he mdel can easily be implemened because f he underlying bjec-riened echnlgy. The bjec access assumpins made in his mdel can easily be changed fr implemenains wih her requiremens. There may n be a requiremen, fr insance, ha a user be able read he value f all bjecs a lwer levels referenced by a UOID wihin an Access-Requiremen. The user may nly require access he neares bjec. Oher mdels [, 0] allw inheriance f access, and use dieren access cnrl mechanisms, such as negaive auhrizain, and class securiy hierarchy rules limi access via inheriance. We believe ha ur mdel, which des n allw inheriance f access, is far less cmplex, and has access cnrls which are mre veriable, and herefre is superir in is implemenain. Our nex sep is build a prype demnsraing he feasibiliy and prperies f ur mdel. We als plan incrprae aggregae plicies in ur mdel. Much f he basis f such plicies depends n semanic inerpreains being develped fr he daa. The securiy plicies f his mdel are designed mee he needs f he U.S. gvernmen. T make ur mdel mre aracive cmmercial users, ne migh relax sme f he securiy requiremens, and hereby prduce a mre user friendly and simpler sysem. Acknwledgmens I acknwledge wih deep graiude he echnical guidance, advice, and criique prvided by my Advisr, Dr. Knsanins Kalpakis, he mral suppr f Dr. Yelena Yesha, and he guidance f Dr. Charles Abzug. I wuld als like hank my c-wrker, Mr. Dnald Marks, fr he many discussins n securiy plicies and inerpreains. References [] M. D. Abrams and G. W. Smih. A rused basis fr daabase access cnrls. Technical repr, The Mire Crprain, McLean, VA, and Nainal Defense Universiy, Washingn, D.C., 99. [] D.E. Bell and L.J. LaPadula. Secure cmpuer sysems: Unied expsiin and mulics inerpreain. Technical repr, The Mire Crprain, Bedfrd, MA, 976. [] S.A. Demurjian, M.Y. Hu, T.C. Ting, and D. Kleinman. Twards an auhrizain mechanism fr user-rle based securiy in an bjec-riened design mdel. In Prceedings f he h Annual Inernainal Phenix Cnference n Cmpuers and Cmmunicains, pages 95{ 0, 99. [4] D. E. Denning. Crypgraphy and Daa Securiy. Addisn-Wesley Publishing Cmpany, Reading, MA, 98. [5] DD. Trused cmpuer sysem evaluain crieria. Technical Repr DD STD, Deparmen f Defense, Nainal Cmpuer Securiy Cener., 985. [6] E. B. Fernandez, R.B. France, and D. Wei. A frmal specicain f an auhrizain mdel fr bjec-riened daabases. In Prceedings f he IFIP WG. Ninh Annual Wrking Cnference n Daabase Securiy, pages 05{9, 995. [7] E. B. Fernandez, E. Gudes, and H. Sng. A securiy mdel fr bjec-riened daabases. In Prceedings f he 989 IEEE Sympsium n Securiy and Privacy, pages 0{5, 989.

10 [8] E. B. Fernandez, E. Gudes, and H. Sng. A mdel fr evaluain and adminisrain f securiy in bjec-riened daabases. IEEE Transacins n Knwledge and Daa Engineering, 6():75{9, 994. [9] T. D. Garvey and T. F. Lun. Mulilevel securiy fr knwledge based sysems. Technical Repr SRI-CSL-9-0, SRI Inernainal, Menl Park, CA, 99. [0] E. Gudes, H. Sng, and E. B. Fernandez. Evaluain f negaive, predicae, and insancebased auhrizain in bjec-riened daabases. Technical repr, Ben-Gurin Universiy, Beer-Sheva, Israel, and Flrida Alanic Universiy, Bca Ran, FL., 99. [] S. Jajdia and B. Kgan. Inegraing an bjec-riened daa mdel wih mulilevel securiy. In Prceedings f he 990 IEEE Sympsium n Research in Securiy and Privacy, pages 76{85, 990. [] T. F. Keefe and W. T. Tsai. Securiy mdel cnsisency in secure bjec-riened sysems. In Prceedings f he Fifh Annual Cmpuer Securiy Applicains Cnference, pages 90{ 98, 989. [] U. Keler. Grup-riened discreinary access cnrls fr disribued srucurally bjecriened daabase sysems. In Prceedings f he Eurpean Sympsium n Research n Cmpuer Securiy, pages {, 990. [4] U. Keler. Discreinary access cnrls in a high-perfrmance bjec managemen sysem. Technical repr, Fern Universia Hagen, Prakische Infrmaik V, Hagen, Germany, 99. [5] W. Kim and F. H. Lchvsky. Objec-Oriened Cnceps, Daabases and Applicains. ACM Press, New Yrk, NY, 989. [6] D. G. Marks, A. Mr, and S. Jajdia. Enhancing he cnrlled disclsure f sensiive infrmain. In Prceedings f Cmpuer Securiy - ESORICS 96, 4h Eurpean Sympsium n Research in Cmpuer Securiy, pages 90{0, 996. [7] C. J. McCllum, J. R. Messing, and L. Nargiacm. Beynd he pale f MAC and DAC - dening new frms f access cnrl. In Prceedings IEEE Sympsium n Securiy and Privacy, 990. [8] J. K. Millen and T. F. Lun. Securiy fr bjec-riened daabase sysems. In Prceedings f he 99 IEEE Cmpuer Sciey Sympsium n Securiy and Privacy, pages 60{7, 99. [9] A. Mr, D. G. Marks, and S. Jajdia. Aggregain in relainal daabases: Cnrlled disclsure f sensiive infrmain. In Prceedings f ESORICS-94, Third Eurpean Sympsium n Research in Cmpuer Securiy, pages 4{445, 994. [0] N. Rishe. Daabase Design. McGraw-Hill, Inc., New Yrk, NY, 99. [] J. Rumbaugh, M. Blaha, W. Premerlani, F. Eddy, and W. Lrensen. Objec-Oriened Mdeling and Design. Prenice-Hall, Inc., Englewd Clis, NJ, 99. [] R. Sandhu, R. Thmas, and S. Jajdia. A secure kernelized archiecure fr mulilevel bjecriened daabases. In Prceedings f he IEEE Cmpuer Securiy Fundains Wrkshp IV, pages 9{5, 99. [] M. Schaefer, P. Marel, T. Kanawai, and V. Lyns. Mulilevel daa mdel fr he Trused ONTOS Prype. In Prceedings f he IFIP WG. Ninh Annual Wrking Cnference n Daabase Securiy, pages {4, 995. [4] E. H. Sibley and G. W. Smih. On he behavir f mulilevel daabase sysems. Technical repr, Gerge Masn Universiy and Nainal Defense Universiy, 99. [5] B. Thuraisingham. Mulilevel securiy fr mulimedia daabase sysems. Technical repr, The Mire Crprain, Bedfrd, MA., 99.

Section 24 exemption application

Section 24 exemption application Fr ffice use nly Auhrisain number: Secin 24 exempin applicain This frm is fr persns applying fr an exempin under secin 24 f he Plumbers, Gasfiers, and Drainlayers Ac 2006. This exempin auhrises a persn

More information

1 CHAPTER 3 TEMPERATURE

1 CHAPTER 3 TEMPERATURE 1 CHAPTER 3 TEMPERATURE 3.1 Inrducin During ur sudies f hea and hermdynamics, we shall cme acrss a number f simple, easy-undersand erms such as enrpy, enhalpy, Gibbs free energy, chemical penial and fugaciy,

More information

The Derivative of a Constant is Zero

The Derivative of a Constant is Zero Sme Simple Algrihms fr Calculaing Derivaives The Derivaive f a Cnsan is Zer Suppse we are l ha x x where x is a cnsan an x represens he psiin f an bjec n a sraigh line pah, in her wrs, he isance ha he

More information

The Grantor Retained Annuity Trust (GRAT)

The Grantor Retained Annuity Trust (GRAT) WEALTH ADVISORY Esae Planning Sraegies for closely-held, family businesses The Granor Reained Annuiy Trus (GRAT) An efficien wealh ransfer sraegy, paricularly in a low ineres rae environmen Family business

More information

TERMS OF REFERENCE ADMINISTRATIVE CONDITIONS

TERMS OF REFERENCE ADMINISTRATIVE CONDITIONS TERMS OF REFERENCE FOR THE CONTRACTING OF THE SERVICES FOR THE EVALUATIÓN OF THE PROJECT SUPPORTING THE THIRD PHASE OF THE RABAT PROCESS: THE DAKAR STRATEGY ADMINISTRATIVE CONDITIONS. BACKGROUND FIIAPP

More information

Chapter 11. Industry Productivity Measures IN THIS CHAPTER. Background Studies of output per hour in individual industries have

Chapter 11. Industry Productivity Measures IN THIS CHAPTER. Background Studies of output per hour in individual industries have Chaper. Indusry Prduciviy Measures Backgrund Sudies f upu per hur in individual indusries have been par f he U.S. Bureau f Labr Saisics (BLS) prgram since he 800s. Prmped by cngressinal cncern ha human

More information

A Study on the role of Third Party Administrators in Health Insurance in India

A Study on the role of Third Party Administrators in Health Insurance in India A Sudy n he rle f Third Pary Adminisrars in Healh Insurance in India S.T. Krishnekumaar, Ph.D. Research Schlar, Sri Chandrasekharendra Saraswahi Viswa Maha Vidyalaya Universiy, Tamil Nadu, India. E-mail:

More information

DECOMPOSING THE BID-ASK SPREAD OF STOCK OPTIONS: A TRADE AND RISK INDICATOR MODEL

DECOMPOSING THE BID-ASK SPREAD OF STOCK OPTIONS: A TRADE AND RISK INDICATOR MODEL DECOMPOSING THE BID-ASK SPREAD OF STOCK OPTIONS: A TRADE AND RISK INDICATOR MODEL David Michayluk Schl f Finance and Ecnmics Universiy f Technlgy, Sydney Ausralia Phne: 61--9514-7761 Fax: 61--9514-7711

More information

Task is a schedulable entity, i.e., a thread

Task is a schedulable entity, i.e., a thread Real-Time Scheduling Sysem Model Task is a schedulable eniy, i.e., a hread Time consrains of periodic ask T: - s: saring poin - e: processing ime of T - d: deadline of T - p: period of T Periodic ask T

More information

Chapter 1.6 Financial Management

Chapter 1.6 Financial Management Chaper 1.6 Financial Managemen Par I: Objecive ype quesions and answers 1. Simple pay back period is equal o: a) Raio of Firs cos/ne yearly savings b) Raio of Annual gross cash flow/capial cos n c) = (1

More information

Succession Planning & Leadership Development: Your Utility s Bridge to the Future

Succession Planning & Leadership Development: Your Utility s Bridge to the Future Successin Planning & Leadership Develpment: Yur Utility s Bridge t the Future Richard L. Gerstberger, P.E. TAP Resurce Develpment Grup, Inc. 4625 West 32 nd Ave Denver, CO 80212 ABSTRACT A few years ag,

More information

Cyber Security Malicious Code

Cyber Security Malicious Code i-safe Lessn Plan Suggesed Grade Levels High Schl Cyber Securiy Malicius Cde Webcas Lessn Plan Descripin This webcas is designed increase suden awareness f he cncep ha here are dangers assciaed wih Inerne

More information

Option Put-Call Parity Relations When the Underlying Security Pays Dividends

Option Put-Call Parity Relations When the Underlying Security Pays Dividends Inernaional Journal of Business and conomics, 26, Vol. 5, No. 3, 225-23 Opion Pu-all Pariy Relaions When he Underlying Securiy Pays Dividends Weiyu Guo Deparmen of Finance, Universiy of Nebraska Omaha,

More information

FACT SHEET BORROWING THROUGH SUPER. Prepared by Brett Griffiths, Director Superannuation Consulting e bgriffiths@vincents.com.au

FACT SHEET BORROWING THROUGH SUPER. Prepared by Brett Griffiths, Director Superannuation Consulting e bgriffiths@vincents.com.au FACT SHEET BORROWING THROUGH SUPER Prepared by Brett Griffiths, Directr Superannuatin Cnsulting e bgriffiths@vincents.cm.au FACT SHEET Since September 2007 Self Managed Superannuatin Funds (SMSF s) can

More information

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Profi Tes Modelling in Life Assurance Using Spreadshees PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Erik Alm Peer Millingon 2004 Profi Tes Modelling in Life Assurance Using Spreadshees

More information

Performance Center Overview. Performance Center Overview 1

Performance Center Overview. Performance Center Overview 1 Performance Cener Overview Performance Cener Overview 1 ODJFS Performance Cener ce Cener New Performance Cener Model Performance Cener Projec Meeings Performance Cener Execuive Meeings Performance Cener

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information

Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613.

Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613. Graduae School of Business Adminisraion Universiy of Virginia UVA-F-38 Duraion and Convexiy he price of a bond is a funcion of he promised paymens and he marke required rae of reurn. Since he promised

More information

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1

More information

TRAINING GUIDE. Crystal Reports for Work

TRAINING GUIDE. Crystal Reports for Work TRAINING GUIDE Crystal Reprts fr Wrk Crystal Reprts fr Wrk Orders This guide ges ver particular steps and challenges in created reprts fr wrk rders. Mst f the fllwing items can be issues fund in creating

More information

Document Management Versioning Strategy

Document Management Versioning Strategy 1.0 Backgrund and Overview Dcument Management Versining Strategy Versining is an imprtant cmpnent f cntent creatin and management. Versin management is a key cmpnent f enterprise cntent management. The

More information

Multiprocessor Systems-on-Chips

Multiprocessor Systems-on-Chips Par of: Muliprocessor Sysems-on-Chips Edied by: Ahmed Amine Jerraya and Wayne Wolf Morgan Kaufmann Publishers, 2005 2 Modeling Shared Resources Conex swiching implies overhead. On a processing elemen,

More information

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative

More information

Health Care Reform Patient Protection Affordable Care Act (PPACA) Overview Key Principles

Health Care Reform Patient Protection Affordable Care Act (PPACA) Overview Key Principles Health Care Refrm Patient Prtectin Affrdable Care Act (PPACA) Overview Key Principles DESCRIPTION: Healthcare Refrm/Patient Prtectin & Affrdable Care Act (PPACA) were passed int law March 23. 2010. Hwever,

More information

BridgeValley Community and Technical College Financial Aid Office 2015-2016 Maximum Hour Financial Aid Suspension Appeal Process

BridgeValley Community and Technical College Financial Aid Office 2015-2016 Maximum Hour Financial Aid Suspension Appeal Process BridgeValley Cmmunity and Technical Cllege Financial Aid Office 2015-2016 Maximum Hur Financial Aid Suspensin Appeal Prcess T receive financial aid administered by BridgeValley Cmmunity and Technical Cllege,

More information

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005 FONDATION POUR LES ETUDES ET RERS LE DEVELOPPEMENT INTERNATIONAL Measuring macroeconomic volailiy Applicaions o expor revenue daa, 1970-005 by Joël Cariolle Policy brief no. 47 March 01 The FERDI is a

More information

Group Term Life Insurance: Table I Straddle Testing and Imputed Income for Dependent Life Insurance

Group Term Life Insurance: Table I Straddle Testing and Imputed Income for Dependent Life Insurance An American Benefits Cnsulting White Paper American Benefits Cnsulting, LLC 99 Park Ave, 25 th Flr New Yrk, NY 10016 212 716-3400 http://www.abcsys.cm Grup Term Life Insurance: Table I Straddle Testing

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

Chapter 8: Regression with Lagged Explanatory Variables

Chapter 8: Regression with Lagged Explanatory Variables Chaper 8: Regression wih Lagged Explanaory Variables Time series daa: Y for =1,..,T End goal: Regression model relaing a dependen variable o explanaory variables. Wih ime series new issues arise: 1. One

More information

GoRA. For more information on genetics and on Rheumatoid Arthritis: Genetics of Rheumatoid Arthritis. Published work referred to in the results:

GoRA. For more information on genetics and on Rheumatoid Arthritis: Genetics of Rheumatoid Arthritis. Published work referred to in the results: For more informaion on geneics and on Rheumaoid Arhriis: Published work referred o in he resuls: The geneics revoluion and he assaul on rheumaoid arhriis. A review by Michael Seldin, Crisopher Amos, Ryk

More information

Impact of scripless trading on business practices of Sub-brokers.

Impact of scripless trading on business practices of Sub-brokers. Impac of scripless rading on business pracices of Sub-brokers. For furher deails, please conac: Mr. T. Koshy Vice Presiden Naional Securiies Deposiory Ld. Tradeworld, 5 h Floor, Kamala Mills Compound,

More information

7/25/14 FAIRFAX COUNTY PUBLIC SCHOOLS SUPPORT EMPLOYEE PERFORMANCE ASSESSMENT HANDBOOK

7/25/14 FAIRFAX COUNTY PUBLIC SCHOOLS SUPPORT EMPLOYEE PERFORMANCE ASSESSMENT HANDBOOK 7/25/14 FAIRFAX COUNTY PUBLIC SCHOOLS SUPPORT EMPLOYEE PERFORMANCE ASSESSMENT HANDBOOK A Resurce Fr Supprt Emplyees Cpyright 2014, Fairfax Cunty Public Schls http://www.fcps.edu/hr/epd/evaluatins/supprt.shtml

More information

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999 TSG-RAN Working Group 1 (Radio Layer 1) meeing #3 Nynashamn, Sweden 22 nd 26 h March 1999 RAN TSGW1#3(99)196 Agenda Iem: 9.1 Source: Tile: Documen for: Moorola Macro-diversiy for he PRACH Discussion/Decision

More information

Inductance and Transient Circuits

Inductance and Transient Circuits Chaper H Inducance and Transien Circuis Blinn College - Physics 2426 - Terry Honan As a consequence of Faraday's law a changing curren hrough one coil induces an EMF in anoher coil; his is known as muual

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

Public consultation paper

Public consultation paper Public cnsultatin paper Nvember 2012 Public cnsultatin n guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners. Please prvide feedback by email t: nmbafeedback@ahpra.gv.au

More information

The Application of Multi Shifts and Break Windows in Employees Scheduling

The Application of Multi Shifts and Break Windows in Employees Scheduling The Applicaion of Muli Shifs and Brea Windows in Employees Scheduling Evy Herowai Indusrial Engineering Deparmen, Universiy of Surabaya, Indonesia Absrac. One mehod for increasing company s performance

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES M. PĘCIŁŁO Central Institute fr Labur Prtectin ul. Czerniakwska

More information

Course Syllabus PADM 6510 - Management of Health Care Agencies College of Public Service and Urban Affairs Tennessee State University

Course Syllabus PADM 6510 - Management of Health Care Agencies College of Public Service and Urban Affairs Tennessee State University Curse Syllabus PADM 6510 - Management f Health Care Agencies Cllege f Public Service and Urban Affairs Tennessee State University Chester A. Rbinsn, D.P.A. Spring, 2008 Office (615) 963-7242 Tuesdays,

More information

Counselor in Training Program

Counselor in Training Program Tukwila Parks and Recreatin Cunselr in Training Prgram D yu want t be a camp cunselr in the future? Then the Cunselr in Training (CIT) prgram is just fr yu! CITs wrk alng side camp cunselrs where they

More information

Conversations of Performance Management

Conversations of Performance Management Cnversatins f Perfrmance Management Perfrmance Management at Ohi State The Secnd Cnversatin ~ Develpment 2011 The Ohi State University Office f Human Resurces Cntents Intrductin Welcme t Develping Emplyees...

More information

Emulated Single-Sign-On in LISTSERV Rev: 15 Jan 2010

Emulated Single-Sign-On in LISTSERV Rev: 15 Jan 2010 Emulated Single-Sign-On in LISTSERV Rev: 15 Jan 2010 0. Nte that frm LISTSERV versin 15.5, LISTSERV supprts using an external LDAP directry (r Windws Active Directry) fr lgin authenticatin in additin t

More information

Oblique incidence: Interface between dielectric media

Oblique incidence: Interface between dielectric media lecrmagnec Felds Oblque ncdence: Inerface beween delecrc meda Cnsder a planar nerface beween w delecrc meda. A plane wave s ncden a an angle frm medum. The nerface plane defnes he bundary beween he meda.

More information

FOUNDATION SETTLEMENT

FOUNDATION SETTLEMENT FOUNDATION ETTLEMENT Dr.. K. Prasad Prfessr f Civil Engineering. J. Cllege f Engineering, Mysre 8.0 yllabus 1. elemen Analysis, Daa fr selemen analysis. Cmpuain f selemen 3. Cncep, Immediae, Cnslidain

More information

UK Interface Requirement 2004

UK Interface Requirement 2004 U Inerface Requiremen 2004 Privae Business Radio () Published: pril 2003 Versi:. 98/34/EC noificai number: 2000/070/U U Inerface Requiremen 2004 Blank Page U Inerface Requiremen 2004. Foreword. The Radio

More information

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS RICHARD J. POVINELLI AND XIN FENG Deparmen of Elecrical and Compuer Engineering Marquee Universiy, P.O.

More information

WHAT ARE OPTION CONTRACTS?

WHAT ARE OPTION CONTRACTS? WHAT ARE OTION CONTRACTS? By rof. Ashok anekar An oion conrac is a derivaive which gives he righ o he holder of he conrac o do 'Somehing' bu wihou he obligaion o do ha 'Somehing'. The 'Somehing' can be

More information

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1 Absrac number: 05-0407 Single-machine Scheduling wih Periodic Mainenance and boh Preempive and Non-preempive jobs in Remanufacuring Sysem Liu Biyu hen Weida (School of Economics and Managemen Souheas Universiy

More information

The Transport Equation

The Transport Equation The Transpor Equaion Consider a fluid, flowing wih velociy, V, in a hin sraigh ube whose cross secion will be denoed by A. Suppose he fluid conains a conaminan whose concenraion a posiion a ime will be

More information

australian nursing federation

australian nursing federation australian nursing federatin Submissin t the public cnsultatin n the Nursing and Midwifery Bard f Australia draft Guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners

More information

The Cost Benefits of the Cloud are More About Real Estate Than IT

The Cost Benefits of the Cloud are More About Real Estate Than IT y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn

More information

Systems Load Testing Appendix

Systems Load Testing Appendix Systems Lad Testing Appendix 1 Overview As usage f the Blackbard Academic Suite grws and its availability requirements increase, many custmers lk t understand the capability f its infrastructure. As part

More information

A Walk on the Human Performance Side Part I

A Walk on the Human Performance Side Part I A Walk n the Human Perfrmance Side Part I Perfrmance Architects have a license t snp. We are in the business f supprting ur client rganizatins in their quest fr results that meet r exceed gals. We accmplish

More information

Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners

Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners Guideline August 2013 Prfessinal indemnity insurance arrangements fr enrlled nurses, registered nurses and nurse practitiners Intrductin This guideline has been develped by the Nursing and Midwifery Bard

More information

Individual Health Insurance April 30, 2008 Pages 167-170

Individual Health Insurance April 30, 2008 Pages 167-170 Individual Healh Insurance April 30, 2008 Pages 167-170 We have received feedback ha his secion of he e is confusing because some of he defined noaion is inconsisen wih comparable life insurance reserve

More information

Market Analysis and Models of Investment. Product Development and Whole Life Cycle Costing

Market Analysis and Models of Investment. Product Development and Whole Life Cycle Costing The Universiy of Liverpool School of Archiecure and Building Engineering WINDS PROJECT COURSE SYNTHESIS SECTION 3 UNIT 11 Marke Analysis and Models of Invesmen. Produc Developmen and Whole Life Cycle Cosing

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Nikkei Stock Average Volatility Index Real-time Version Index Guidebook

Nikkei Stock Average Volatility Index Real-time Version Index Guidebook Nikkei Sock Average Volailiy Index Real-ime Version Index Guidebook Nikkei Inc. Wih he modificaion of he mehodology of he Nikkei Sock Average Volailiy Index as Nikkei Inc. (Nikkei) sars calculaing and

More information

Risk Modelling of Collateralised Lending

Risk Modelling of Collateralised Lending Risk Modelling of Collaeralised Lending Dae: 4-11-2008 Number: 8/18 Inroducion This noe explains how i is possible o handle collaeralised lending wihin Risk Conroller. The approach draws on he faciliies

More information

CSE 231 Fall 2015 Computer Project #4

CSE 231 Fall 2015 Computer Project #4 CSE 231 Fall 2015 Cmputer Prject #4 Assignment Overview This assignment fcuses n the design, implementatin and testing f a Pythn prgram that uses character strings fr data decmpressin. It is wrth 45 pints

More information

CAREER MAP HOME HEALTH AIDE

CAREER MAP HOME HEALTH AIDE CAREER MAP HOME HEALTH AIDE CAREER MAP HOME HEALTH AIDE Home healh aides are one of he fases growing jobs in New York Ciy. Wih more educaion, home healh aides can move ino many oher ypes of jobs in healh

More information

Disk Redundancy (RAID)

Disk Redundancy (RAID) A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.

More information

RFP Announcement. 5th ANNUAL United Way Youth Venture Seed Grant Competition. Available Grants. Dream It. Do It. Complete your application today!

RFP Announcement. 5th ANNUAL United Way Youth Venture Seed Grant Competition. Available Grants. Dream It. Do It. Complete your application today! RFP Annuncement 5th ANNUAL United Way Yuth Venture Seed Grant Cmpetitin SimplexGrinnell and TYCO Integrated Security are cmmitted t expanding the United Way Yuth Venture (UWYV) prgram thrughut the United

More information

I. Basic Concepts (Ch. 1-4)

I. Basic Concepts (Ch. 1-4) (Ch. 1-4) A. Real vs. Financial Asses (Ch 1.2) Real asses (buildings, machinery, ec.) appear on he asse side of he balance shee. Financial asses (bonds, socks) appear on boh sides of he balance shee. Creaing

More information

Present Value Methodology

Present Value Methodology Presen Value Mehodology Econ 422 Invesmen, Capial & Finance Universiy of Washingon Eric Zivo Las updaed: April 11, 2010 Presen Value Concep Wealh in Fisher Model: W = Y 0 + Y 1 /(1+r) The consumer/producer

More information

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline

More information

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012 Army DCIPS Emplyee Self-Reprt f Accmplishments Overview Revised July 2012 Table f Cntents Self-Reprt f Accmplishments Overview... 3 Understanding the Emplyee Self-Reprt f Accmplishments... 3 Thinking Abut

More information

Capital budgeting techniques

Capital budgeting techniques Capial budgeing echniques A reading prepared by Pamela Peerson Drake O U T L I N E 1. Inroducion 2. Evaluaion echniques 3. Comparing echniques 4. Capial budgeing in pracice 5. Summary 1. Inroducion The

More information

Writing a Compare/Contrast Essay

Writing a Compare/Contrast Essay Writing a Cmpare/Cntrast Essay As always, the instructr and the assignment sheet prvide the definitive expectatins and requirements fr any essay. Here is sme general infrmatin abut the rganizatin fr this

More information

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m Chaper 2 Problems 2.1 During a hard sneeze, your eyes migh shu for 0.5s. If you are driving a car a 90km/h during such a sneeze, how far does he car move during ha ime s = 90km 1000m h 1km 1h 3600s = 25m

More information

2.5 Life tables, force of mortality and standard life insurance products

2.5 Life tables, force of mortality and standard life insurance products Soluions 5 BS4a Acuarial Science Oford MT 212 33 2.5 Life ables, force of moraliy and sandard life insurance producs 1. (i) n m q represens he probabiliy of deah of a life currenly aged beween ages + n

More information

Lecture #13. Mutual Inductance

Lecture #13. Mutual Inductance ecure #3 ANNOUNCEMENTS Graded HW can be picked up in 78 Cry OUTNE Muual inducance Firs-rder circuis Naural respnse f an circui eang Chaper 6.4, Chaper 7. ecure 3, Slide Muual nducance Muual inducance ccurs

More information

The ad hoc reporting feature provides a user the ability to generate reports on many of the data items contained in the categories.

The ad hoc reporting feature provides a user the ability to generate reports on many of the data items contained in the categories. 11 This chapter includes infrmatin regarding custmized reprts that users can create using data entered int the CA prgram, including: Explanatin f Accessing List Screen Creating a New Ad Hc Reprt Running

More information

Longevity 11 Lyon 7-9 September 2015

Longevity 11 Lyon 7-9 September 2015 Longeviy 11 Lyon 7-9 Sepember 2015 RISK SHARING IN LIFE INSURANCE AND PENSIONS wihin and across generaions Ragnar Norberg ISFA Universié Lyon 1/London School of Economics Email: ragnar.norberg@univ-lyon1.fr

More information

Making a Faster Cryptanalytic Time-Memory Trade-Off

Making a Faster Cryptanalytic Time-Memory Trade-Off Making a Faser Crypanalyic Time-Memory Trade-Off Philippe Oechslin Laboraoire de Securié e de Crypographie (LASEC) Ecole Polyechnique Fédérale de Lausanne Faculé I&C, 1015 Lausanne, Swizerland philippe.oechslin@epfl.ch

More information

NAVIPLAN PREMIUM LEARNING GUIDE. Analyze, compare, and present insurance scenarios

NAVIPLAN PREMIUM LEARNING GUIDE. Analyze, compare, and present insurance scenarios NAVIPLAN PREMIUM LEARNING GUIDE Analyze, cmpare, and present insurance scenaris Cntents Analyze, cmpare, and present insurance scenaris 1 Learning bjectives 1 NaviPlan planning stages 1 Client case 2 Analyze

More information

CRISES AND THE FLEXIBLE PRICE MONETARY MODEL. Sarantis Kalyvitis

CRISES AND THE FLEXIBLE PRICE MONETARY MODEL. Sarantis Kalyvitis CRISES AND THE FLEXIBLE PRICE MONETARY MODEL Saranis Kalyviis Currency Crises In fixed exchange rae regimes, counries rarely abandon he regime volunarily. In mos cases, raders (or speculaors) exchange

More information

Double Entry System of Accounting

Double Entry System of Accounting CHAPTER 2 Double Enry Sysem of Accouning Sysem of Accouning \ The following are he main sysem of accouning for recording he business ransacions: (a) Cash Sysem of Accouning. (b) Mercanile or Accrual Sysem

More information

Secretary of Energy Steven Chu, U.S. Department of Energy. Acting Under Secretary David Sandalow, U.S. Department of Energy

Secretary of Energy Steven Chu, U.S. Department of Energy. Acting Under Secretary David Sandalow, U.S. Department of Energy T: Cc: Secretary f Energy Steven Chu, U.S. Department f Energy Acting Under Secretary David Sandalw, U.S. Department f Energy Frm: Steven Ashby, Deputy Directr fr Science & Technlgy, Pacific Nrthwest Natinal

More information

OPERATION MANUAL. Indoor unit for air to water heat pump system and options EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1

OPERATION MANUAL. Indoor unit for air to water heat pump system and options EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1 OPERAION MANUAL Indoor uni for air o waer hea pump sysem and opions EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1 EKHBRD011ABY1 EKHBRD014ABY1 EKHBRD016ABY1 EKHBRD011ACV1 EKHBRD014ACV1 EKHBRD016ACV1 EKHBRD011ACY1

More information

The Ohio Board of Regents Credit When It s Due process identifies students who

The Ohio Board of Regents Credit When It s Due process identifies students who Credit When It s Due/ Reverse Transfer FAQ fr students Ohi is participating in a natinal grant initiative, Credit When It s Due, designed t implement reverse-transfer, which is a prcess t award assciate

More information

1 GETTING STARTED. 5/7/2008 Chapter 1

1 GETTING STARTED. 5/7/2008 Chapter 1 5/7/2008 Chapter 1 1 GETTING STARTED This chapter intrduces yu t the web-based UIR menu system. Infrmatin is prvided abut the set up necessary t assign users permissin t enter and transmit data. This first

More information

OUR DISCIPLINARY POLICY

OUR DISCIPLINARY POLICY OUR DISCIPLINARY POLICY WHO is this plicy fr? Channel 4 emplyees wh ve passed their prbatinary perid Channel 4 managers This plicy des nt frm part f any emplyee s cntract f emplyment and we may amend it

More information

Small Business, Enterprise and Employment Bill: Insolvency fact sheets Contents

Small Business, Enterprise and Employment Bill: Insolvency fact sheets Contents 1 Small Business, Enterprise and Emplyment Bill: Inslvency fact sheets Cntents Directr Disqualificatin and Inslvency General Aims... 2 Administratin: sales t cnnected persns (prepack administratins)...

More information

Strategic Optimization of a Transportation Distribution Network

Strategic Optimization of a Transportation Distribution Network Sraegic Opimizaion of a Transporaion Disribuion Nework K. John Sophabmixay, Sco J. Mason, Manuel D. Rossei Deparmen of Indusrial Engineering Universiy of Arkansas 4207 Bell Engineering Cener Fayeeville,

More information

To Sponsor or Not to Sponsor: Sponsored Search Auctions with Organic Links and Firm Dependent Click-Through Rates

To Sponsor or Not to Sponsor: Sponsored Search Auctions with Organic Links and Firm Dependent Click-Through Rates To Sponsor or No o Sponsor: Sponsored Search Aucions wih Organic Links and Firm Dependen Click-Through Raes Michael Arnold, Eric Darmon and Thierry Penard June 5, 00 Draf: Preliminary and Incomplee Absrac

More information

Elmos Product Quartets

Elmos Product Quartets s elm @ r in ves de un rge ha f c ree df ere rd be an s c Th ee lm sp rd u c qu a.40 30 54 3. E r 00 E5 r: Q N C u e m b E m M u b l A er: l N r.5ma e V V: pp 8 ly L6Su er: epp ical C0urrBeinra b 3 m E5.

More information

CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions.

CONTENTS UNDERSTANDING PPACA. Implications of PPACA Relative to Student Athletes. Institution Level Discussion/Decisions. This dcument is intended t prvide NCAA member institutins with an infrmatinal guide regarding the ptential implicatins f the Patient Prtectin and Affrdable Care Act f 2010 (PPACA) when fully implemented

More information

Infor EAM Mobility Initiative

Infor EAM Mobility Initiative Infr EAM Mbility Initiative Overview Charles Cunty utilizes the Infr Enterprise Asset Management (EAM) system t prvide a pwerful, integrated tl t fully manage all aspects f the equipment and wrk rders

More information

What Does Specialty Own Occupation Really Mean?

What Does Specialty Own Occupation Really Mean? What Des Specialty Own Occupatin Really Mean? Plicy definitins are cnfusing, nt nly t cnsumers but als t many f the insurance prfessinals wh sell them. Belw we will try t prvide an understandable explanatin

More information

Situated vs. Global Aggregation Schemes for Autonomous Management Systems

Situated vs. Global Aggregation Schemes for Autonomous Management Systems 4h IFIP/IEEE Workshop on Disribued Auonomous Nework Managemen Sysems Siuaed vs. Global Aggregaion Schemes for Auonomous Managemen Sysems Rafik Makhloufi*, Guillaume Doyen*, Gregory Bonne and Dominique

More information

Instructions for Masters Thesis Preparation and Defense

Instructions for Masters Thesis Preparation and Defense Instructins fr Masters Thesis Preparatin and Defense The fllwing instructins are basic guidelines t be used in the preparatin f yur thesis. Please als review yur departmental handbk and cntact yur graduate

More information

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr

More information

UNDERSTANDING THE DEATH BENEFIT SWITCH OPTION IN UNIVERSAL LIFE POLICIES. Nadine Gatzert

UNDERSTANDING THE DEATH BENEFIT SWITCH OPTION IN UNIVERSAL LIFE POLICIES. Nadine Gatzert UNDERSTANDING THE DEATH BENEFIT SWITCH OPTION IN UNIVERSAL LIFE POLICIES Nadine Gazer Conac (has changed since iniial submission): Chair for Insurance Managemen Universiy of Erlangen-Nuremberg Lange Gasse

More information

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES Mehme Nuri GÖMLEKSİZ Absrac Using educaion echnology in classes helps eachers realize a beer and more effecive learning. In his sudy 150 English eachers were

More information

Syllabus Computer Science III: Data Structures and Algorithms Fall 2012 COMP 241 CRN: 13761

Syllabus Computer Science III: Data Structures and Algorithms Fall 2012 COMP 241 CRN: 13761 Syllabus Cmputer Science III: Data Structures and Algrithms Fall 2012 COMP 241 CRN: 13761 Basic Inf: Instructr: Tuesday/Thursday, 11:00am 12:15pm Buckman 222 Betsy (Williams) Sanders Office: Olendrf 419

More information

Developing Expertise as Coaches of Teachers

Developing Expertise as Coaches of Teachers Develping Expertise as Caches f Teachers Presented by: Elaine M. Bukwiecki, Ed.D. Assciate Prfessr f Literacy Educatin Presented at: 11 th Internatinal Writing Acrss the Curriculum Cnference Savannah,

More information

A One-Sector Neoclassical Growth Model with Endogenous Retirement. By Kiminori Matsuyama. Final Manuscript. Abstract

A One-Sector Neoclassical Growth Model with Endogenous Retirement. By Kiminori Matsuyama. Final Manuscript. Abstract A One-Secor Neoclassical Growh Model wih Endogenous Reiremen By Kiminori Masuyama Final Manuscrip Absrac This paper exends Diamond s OG model by allowing he agens o make he reiremen decision. Earning a

More information