3GPP TSG SA WG3 Security S3#23 S May 2002, Victoria, Canada CR-Form-v5.1 CHANGE REQUEST
|
|
- Mae Antonia Hensley
- 7 years ago
- Views:
Transcription
1 1 TSG SA WG3 Security S3#23 S My 2002, Victori, Cnd CR-Form-v5.1 CHANGE REQUEST CR CRNum rev - Current version: For HELP on using this form, see bottom of this pge or look t the pop-up text over the symbols. Proposed chnge ffects: (U)SIM ME/UE Rdio Access Network Core Network Title: Source: Support for certifictes Noki Work item code: Dte: 7. My 2002 Ctegory: B Relese: 6 Use one of the following ctegories: Use one of the following releses: F (correction) 2 (GSM Phse 2) A (corresponds to correction in n erlier relese) R96 (Relese 1996) B (ddition of feture), R97 (Relese 1997) C (functionl modifiction of feture) R98 (Relese 1998) D (editoril modifiction) R99 (Relese 1999) Detiled explntions of the bove ctegories cn REL-4 (Relese 4) be found in TR REL-5 (Relese 5) Reson for chnge: Adding feture ccording to the corresponding work item Summry of chnge: Adding the description of the feture in section 5.4; dding the desciption of the corresponding mechnism in section 6.7; dding description of certifictes in Annex D Consequences if not pproved: The plnned feture is not specified. Cluses ffected: 5.4.2, 6.7, Annex D Other specs X Other core specifictions ffected: Test specifictions O&M Specifictions Other comments: 5.4 Appliction security Secure messging between the USIM nd the network USIM Appliction Toolkit, s specified in 3G TS [15], provides the cpbility for opertors or third prty providers to crete pplictions which re resident on the USIM (similr to SIM Appliction Toolkit in GSM). There exists need to secure messges which re trnsferred over the network to pplictions on the USIM, with the level of security chosen by the network opertor or the ppliction provider. Security fetures for USIM Appliction Toolkit re implemented by mens of the mechnisms described ints [7]. These mechnisms ddress the security requirements identified in GSM [16].
2 Void Support for certifictes There exists need for globl scle uthoriztion infrstructure for vrious pplictions nd services. This my be bsed on the system security rchitecture. Mny of these emerging services will be provided by prties tht re not necessrily trusted by the cellulr opertors nor by cellulr subscribers. Therefore technicl mens to del with, nd preferbly minimize, disputes between subscribers nd service providers is necessry. Authoriztion of such services my be bsed on credentils like digitl signtures. The service provider shll use subscriber certifictes in verifying credentils. The UE my lso use certifictes of opertors (opertor certifictes) nd other certifictes issued by opertors in verifying credentils supplied by service providers. The core network shll provide support for issuing certifictes to the UE over the uthenticted network connection between the ME nd the core network. Cluse 6.7 describes mechnisms to provide this support Void Void ****** NEXT MODIFIED SECTION******* Support for delivering certifictes The delivery of certifictes shll be performed s follows. There re two seprte procedures: one for issuing subscriber certificte nd nother for delivering opertor certifictes. Both re run between the UE nd thecn of the visited network. The CN contins the Certifiction Authority (CA) functionlity. The certificte messges re uthenticted becuse they re sent over integrity protected signlling chnnels. Subscriber certifictes issued in this mnner re uthoristion certifictes. They do not necessrily certify identities. UE RAN SGSN CA Request Response Figure 1. Certificte retrievl. In the cse of requesting subscriber certificte, the request shll contin informtion bout wht needs to be certified (e.g., public key). The response shll contin one of the following: subscriber certificte itself, or
3 3 n ddress from which the UE shll obtin the subscriber certificte, or n ddress which the service provider my use in verifying the credentils supplied by UE, or n error messge. In the cse of retrieving the opertor certificte, the request my contin informtion tht explicitly identifies prticulr opertor which my be different from the visited opertor. The response shll contin one of the following: the opertor certificte itself, or informtion needed to verify the opertor certificte, nd n ddress from which the UE shll obtin the opertor certificte, or n error messge. Further detils see nnex D. e use tunderlinedunless nother reference is explicitely specified. McKey()mustmustmust ***** NEXT MODIFIED SECTION ***** Annex D: (normtive) Support for certifictes This nnex defines the certificte relted prmeters used in procedures of cluse 6.7. The following typogrphic convention: Nmes of informtion element fields in protocol messges re bold itlic. Nmes of types re itlic. Optionl fields re mrked (OPTIONAL) Messge prts mrked (CRITICAL) require integrity protection. Messge prts mrked (NON-CRITICAL) do not require integrity protection. See more discussion on this spect below. Definitions of composite types mentioned in this section cn be found in [CERT-FORMAT]. Both protocols re of simple request/response type s shown in cluse 6.7. D.1 Subscriber Certifiction Request: (CRITICAL) key-info: choice of o public key: SubjectPublicKeyInfo (lgorithm identifier, nd bitstring) o pk_hsh: KeyIdentifier (octet string; lgorithm is SHA-1)
4 4 Response: (NON-CRITICAL) D.2 Opertor certificte retrievl o mc_key: octet string. If used, key-origin shll be 3 nd nd cert-info shll be subscriber certificte URL. This is needed if MAC-bsed credentils re used insted of certifictes. key-origin: byte, with e.g. the following reserved vlues o 0 = from UICC, 1 = from nother security module on UE, 2 = from outside UE, 3 = from UE own memory intended-key-usge: Boolen flg describing which usges re proposed, with the following vlues: 0 = utomtic signing llowed 1 = signing with explicit user confirmtion only user-plne-continution-cpbility: Boolen flg. Should be set to true only if the terminl cn ccept continution URL (see the Response definition below). device-certificte: Certificte (OPTIONAL); certificte issued by the mnufcturer of the device where the privte key resides (e.g., smrtcrd). cert-info: choice of o subscriber certificte: Certificte, WAPCertificte [WAPCert] o subscriber certificte URL: URL formtted s specified in [WPKI, section 7.3] from which the certificte cn be retrieved. The UE will give this URL to the verifier insted of its certificte o filure: sequence of ƒ error: byte, with e.g. the following reserved vlues 1. unknown cuse 2. continution requested (continution URL shll be present below) 3. service not vilble (this network does not issue certifictes) 4. service not vilble now (try lter) 5. service not possible without user-plne continution (if terminl indicted user-plne-continution-cpbility=flse) 6. key-origin not cceptble 7. device certificte required (resend certificte request with the device certificte ttched). 8. device certificte invlid (e.g., expired, incorrect, or otherwise invlid) o continution URL: URL (OPTIONAL) When successful response for the subscriber certifiction request is received, UE will find the Issuer Nme of the opertor CA. It cn use this to check if it lredy hs vlid certificte for the opertor CA s public key. If not, it cn initite the opertor certificte retrievl protocol below. A second scenrio for opertor certificte retrievl is when service provider specifies the opertor (by e.g. specifying the hsh of the opertor CA s public key) in ppliction-lyer signlling. In this cse, the UE will know the key hsh of the opertor but my not know the Issuer Nme.
5 5 The opertor certificte retrievl protocol is s follows: Request: (NON-CRITICAL) trget: (OPTIONAL) choice of o Nme. Distinguished nme of the issuing opertor. o KeyIdentifier (octet string, lgorithm is SHA-1) of the opertor CA s public key user-plne-continution-cpbility: Boolen flg indicting if the terminl cn ccept URL of the opertor certificte or not. Response: (CRITICAL) opertor-cert: X.509v3 certificte filure: sequence of o error: byte, with the following reserved vlues 1. unknown cuse 2. no mtching certificte 3. service not vilble now (try lter) opertor cert-info: (OPTIONAL) sequence of 4. service not possible without user-plne continution (if terminl indicted user-plne-continution-cpbility=flse) o hsh: KeyIdentifier (octet string, lgorithm is SHA-1) o url: URL of the opertor certificte D.3 References [CERT-FORMAT] Internet X.509 Public Key Infrstructure Certificte nd CRL Profile, RFC [WAPCert] WAP Certificte nd CRL Profiles, WAP-211-WAPCert, Version 22-My-2001.
6 6
7 7
Network Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationCRs to R99 and older releases on Work Item GPRS
3GPP TSG CN Plenry Meeting #10, Bngkok, Thilnd 6 th 8 th December 2000 Tdoc NP-000670 Source: TSG CN WG 1 Title: Agend item: 7.13 Document for: CRs to R99 nd older releses on Work Item GPRS APPROVAL Introduction:
More informationTSG-RAN Meeting #10 RP-000585 Bangkok, Thailand, 6-8 December 2000
TSG-RAN Meeting #10 RP-000585 Bngkok, Thilnd, 6-8 December 2000 Title: Agreed CRs to TS 25.101 Source: TSG RAN WG4 Agend Item:5.4.3 CR Tdoc Num TS number Title Type Sttus Cur Ver New Ver R4-000885 25.101
More informationTSG-RAN Meeting #10 RP-000591 Bangkok, Thailand, 6-8 December 2000
TSG-RAN Meeting #10 RP-000591 Bngkok, Thilnd, 6-8 December 2000 Title: Agreed CRs to TS 25.133 Source: TSG RAN WG4 Agend Item:5.4.3 CR Tdoc Num TS number Title Type Sttus Cur Ver New Ver R4-000805 25.133
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationVersion X3450. Version X3510. Features. Release Note Version X3510. Product: 24online Release Number: X3510
Relese Note Version X3510 Version X3510 Product: 24online Relese Number: X3510 Customer Support: For more informtion or support, plese visit us t www.24onlinebilling.com or emil support@24onlinebilling.com
More informationPre-Approval Application
Pre-Approvl Appliction In tody s rel estte mrket, Pre-Approved mortgge provides you the buyer with powerful tool in the home purchse process! Once you hve received your Pre-Approvl, you cn shop for your
More informationtrademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007
trdemrk nd symbol guidelines trdemrk guidelines The trdemrk Cn be plced in either of the two usul configurtions but horizontl usge is preferble. Wherever possible the trdemrk should be plced on blck bckground.
More informationTHE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION
KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationTest Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationELECTRONIC DEVELOPMENT APPLICATION (EDA) SYSTEM
ELECTRONIC DEVELOPMENT APPLICATION (EDA) SYSTEM OPERATIONS MANUAL Version : 1.7 Lst Updte : 24 th Aug 2005 URBAN REDEVELOPMENT AUTHORITY EDA Opertions mnul Ver 1.6 (01042004) pg 1 Tle of Contents Section
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationE-Commerce Comparison
www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationEuropean Convention on Certain International Aspects of Bankruptcy
Europen Trety Series - No. 136 Europen Convention on Certin Interntionl Aspects of Bnkruptcy Istnul, 5.VI.1990 Premle The memer Sttes of the Council of Europe, signtories hereto, Considering tht the im
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More information1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
More informationIaaS Configuration for Virtual Platforms
IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To
More informationCOMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials
COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development,
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More informationl,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -
rrsrgfqmrreremrers I Publiction dte: My 2g,Z01S Pilol Progrm tof g_llpqtg Resilience: Building Resilience to Climte Retted Hzrds-AMtS (ppcr: BRCH-AM S) Project ld No.: P1275Ao Vj.nplry of Agriculturl Development
More informationEE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown
EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros
More information3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N1-021455 Budapest, Hungary, 13. 17.
3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. NP-020155 Title: Liaison Statement on 3GPP Network Domain Name usage for IMS Source: CN1 Agenda item: 5.1 Document for: INFORMATION
More informationArchitecture and Data Flows Reference Guide
Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge
More informationMorgan Stanley Ad Hoc Reporting Guide
spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationTemplate convertible loan agreement. User notes
Templte convertile lon greement User notes This is simple convertile lon greement intended to e used when shreholder lends money to compny, generlly s form of ridging finnce until n expected event tkes
More informationKofax Reporting. Administrator's Guide 2.0.0 2013-09-19
Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationYour car insurance policy
Your cr insurnce policy If you hve n ccident...cll us stright wy on 0844 891 5391. For our joint protection, clls my be recorded nd/or monitored. Welcome. We ve got you covered. Together with your policy
More informationAdvanced Service Designer Configuration
Advnced Service Designer Configurtion vcloud Automtion Center 6.0 vcenter Orchestrtor 5.5 This document supports the version of ech product listed nd supports ll susequent versions until the document is
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationRotating DC Motors Part II
Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors
More informationOutline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)
Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationProject 6 Aircraft static stability and control
Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationThe Morgan Stanley FTSE Protected Growth Plan. Investor Pack
The Morgn Stnley FTSE Protected Growth Pln Investor Pck The Morgn Stnley FTSE Protected Growth Pln Introduction The current investment environment with its extreme levels of uncertinty nd voltility, mkes
More informationIndustrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen
Tutoril Industril informtion system security Prt 3 Stndrds for securing industril utomtion systems Mrtin Nedele, Dick Oyen Prt 2 of this three-prt tutoril on informtion system security in industril networks
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationUNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE
UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE Tble of Contents 1 Home Pge 1 2 Pge 2 3 Your Control Pnel 3 4 Add New Job (Three-Step Form) 4-6 5 Mnging Job Postings (Mnge Job Pge) 7-8 6 Additionl
More informationASG Techniques of Adaptivity
ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny
More informationAccording to Webster s, the
dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly
More informationPay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details
With CreCredit... Strt cre immeditely Py over time with low monthly pyments For yourself nd your fmily Types of Promotionl Options tht my be vilble: Not ll enrolled helthcre prctices offer ll specil finncing
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationHomework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationThank you for requesting a Trade Account with Exertis (UK) Ltd.
Thnk you for requesting Trde Account with Exertis (UK) Ltd. Plese complete the following Trde Account Appliction Form fully nd return to: ACCOUNT APPLICATIONS Exertis (UK) Ltd Shorten Brook Wy Althm Business
More informationQuick Reference Guide: Reset Password
Quick Reference Guide: Reset Pssword How to reset pssword This Quick Reference Guide shows you how to reset your pssword if you hve forgotten it. There re three wys to reset your SingPss pssword: 1) Online
More informationBlackbaud The Raiser s Edge
Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com
More informationUnderstanding Basic Analog Ideal Op Amps
Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).
More informationUNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510.
UNITED STATES DEPARTMENT OF AGRICULTURE Wshington, D.C. 20250 ACTION BY: All Divisions nd Offices FGIS Directive 2510.1 12-11-73 FEDERAL TORT CLAIMS I PURPOSE This Instruction: A Sets forth the bsic provisions
More informationN A M E A N D A D D R E S S. WORK TELEPHONE (Provide only one including area code): CITY STATE ZIP CODE: OTHER (include area code):
KOREN WOMEN S SSOCITION EMPLOYMENT PPLICTION Please complete the application by typing or clearly printing in dark ink. Submit a separate application (photocopy TYPE or PRINT in INK acceptable) for each
More information802.16e requirements from an operator s perspective
802.16e requirements from n opertor s perspective IEEE 802.16 Presenttion Submission Templte (Rev. 8.3) Document Number: IEEE S802.16e-03/23 Dte Submitted: 2003-03-10 Source: Anthony (Tony) Klinkert Voice:
More informationTechnical Specifications (GPGPU)
TS 131 116 V6.7.0 (2005-03) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Remote APDU Structure for (Universal) Subscriber
More informationJava CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:
Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code
More informationSource Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix
Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt
More informationGENERAL APPLICATION FOR FARM CLASSIFICATION
SCHEDULE 1 (section 1) Plese return to: DEADLINE: Plese return this form to your locl BC Assessment office y Octoer 31. Assessment Roll Numer(s) GENERAL APPLICATION FOR FARM CLASSIFICATION Section 23 (1)
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationCallPilot 100/150 Upgrade Addendum
CllPilot 100/150 Relese 3.0 Softwre Upgrde Addendum Instlling new softwre onto the CllPilot 100/150 Feture Crtridge CllPilot 100/150 Upgrde Addendum Prerequisites lptop or desktop computer tht cn ccept
More informationTSGS#27(05)0115. Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan
Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan TSGS#27(05)0115 Source: TSG SA WG2 Title: CR(s) to 23.981 Agenda item: 7.2.3 Document for: APPROVAL
More informationINJURY MANAGEMENT & REHABILITATION
OBJECTIVES To estblish systemtic pproch to injury mngement nd rehbilittion throughout the City immeditely following work relted illness, injury nd disbility. To estblish tht it is the responsibility of
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationVectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More information5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.
5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued
More informationPROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationThe LENA TM Language Environment Analysis System:
FOUNDATION The LENA TM Lnguge Environment Anlysis System: Audio Specifictions of the DLP-0121 Michel Ford, Chrles T. Ber, Dongxin Xu, Umit Ypnel, Shrmi Gry LENA Foundtion, Boulder, CO LTR-03-2 September
More informationPortfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This
More informationPS/GO COMM #1 July 18,2013 MEMORANDUM. Update: Public Safety System Modernization. (1) Fire Station Alerting System (FSA) July 16,2013
PS/GO COMM #1 July 18,213 MEMORANDUM July 16,213 TO: Public Sfety Committee Government Opertions nd Fiscl Policy Committee, FROM: SUBJECT: Updte: Public Sfety System Moderniztion Expectedfor this session:
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationRecognition Scheme Forensic Science Content Within Educational Programmes
Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More informationSecure routing for structured peer-to-peer overlay networks
Secure routing for structured peer-to-peer overly networks Miguel Cstro 1, Peter Druschel 2, Aylvdi Gnesh 1, Antony Rowstron 1 nd Dn S. Wllch 2 1 Microsoft Reserch Ltd., 7 J J Thomson Avenue, Cmbridge,
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More information9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes
The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors
More informationImproving secure storage of data in Android
1 Improving secure storge of dt in Android Fysl Boukyou, Jorn Lpon, Brt De Decker nd Vincent Nessens Abstrct Android devices re incresingly used in corporte settings. Although openness nd cost re key fctors
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationSTRM Log Manager Installation Guide
Security Thret Response Mnger Relese 2012.0 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Pulished: 2012-09-12 Copyright Notice Copyright 2012 Juniper
More informationHow To Be A Successful Mobile Ppliction And Regression Tester
July/August 2009 Volume 3 SOFTWARE This issue of Softwre Testing delves into mobile ppliction nd regression testing. HOTSPOTS 1 Mobile pplictions nd regression testing p WANT JOB SECURITY? This issue of
More informationPHY 222 Lab 8 MOTION OF ELECTRONS IN ELECTRIC AND MAGNETIC FIELDS
PHY 222 Lb 8 MOTION OF ELECTRONS IN ELECTRIC AND MAGNETIC FIELDS Nme: Prtners: INTRODUCTION Before coming to lb, plese red this pcket nd do the prelb on pge 13 of this hndout. From previous experiments,
More information