for Key Escrow Encryption Systems

Size: px
Start display at page:

Download "for Key Escrow Encryption Systems"

Transcription

1 This taxonomy helps desribe and ategorize the esrow mehanisms of omplete systems along with various design options. ATaxonomy for ey Esrow Enryption ystems Dorothy E. Denning and Dennis. Branstad A key esrow enryption system (or esrowed enryption system) is an enryption system with a bakup deryption apability that allows authorized persons s, offiers of an organization, and government offiials under ertain presribed onditions, to derypt iphertext with the help of information supplied by one or more trusted parties holding speial reovery keys. The reovery keys are not normally the same as those used to enrypt and derypt the, but rather provide a means of determining the enryption/deryption keys. The term key esrow is used to refer to the safeguarding of these reovery keys. Other terms used inlude key arhive, key bakup, and reovery system. This artile presents a taxonomy for key esrow enryption systems, providing a struture for desribing and ategorizing the esrow mehanisms of omplete systems as well as various design options. Table applies the taxonomy to several key esrow uts or proposals. The sidebar, lossary and oures, identifies key terms, ommerial uts, and proposed systems. omponents An esrowed enryption system an be divided logially into three main omponents: ser eurity omponent (). The is a hardware devie or software program that provides enryption and deryption apabilities as well as support for the key esrow funtion. This support an inlude attahing a reovery field (DF) to enrypted. The DF may be part of the normal key distribution mehanism. 34 Marh 996/Vol. 39, No. 3 OMMNIATION OF TE AM

2 ow to se ey Esrow ey Esrow omponent (E). The E, whih is operated by key esrow agents, mages the storage and release or use of reovery keys. It may be part of a li key ertifiate magement system or part of a general key magement infrastruture. Data eovery omponent (D). The D onsists of the algorithms, protools, and equipment needed to obtain the plaintext from the iphertext plus information ontained in the DF and provided by the E. It is ative only as needed to perform a speifi authorized reovery. These logial omponents are highly interrelated, and the design hoies for one affet the others. Figure shows the interation of the omponents. A enrypts plaintext with a key and attahes a DF to the iphertext. The D reovers the plaintext using information ontained in the DF plus information provided by the E. Eah of these omponents is desribed in the following setions. ser eurity omponent The enrypts and derypts and performs funtions that support the reovery proess. It is haraterized by the following: Appliation Domain. A an support one or both of the following: ommuniations. This inludes phone alls, eletroni mail, and other types of onnetions. Emergeny deryption is used by law enforement in onjuntion with ourt-authorized intereption of ommuniations, also known as wiretaps. tored. tored an be simple files or more general objets. Emergeny deryption is used either by the owners of the to reover lost or damaged keys, or by law enforement offiials to derypt omputer files seized under a ourt order. Data Enryption Algorithm. The following attributes are partiularly relevant to esrowed enryption: Name and mode of operation. Mode of operation an affet exportability, so, for example, triple enryption modes may not be allowed under a general export liense. ey length. This an also affet exportability. lassifiation. An algorithm may be lassified or unlassified; if unlassified, it may be proprietary or li. tored Identifiers and eys. The stores identifiers and keys used for emergeny deryption: Identifiers. These an inlude a or identifier, identifiers for keys, and identifiers for the E or esrow agents. eys. These an inlude keys unique to the, keys belonging to its, or global system keys used by the E. They an be li or ate. opies of the keys or their ate ounterparts may be held in esrow. DF and Mehanism. When are enrypted with a key, the must bind the iphertext and to one or more reovery keys, normally by attahing a DF to the enrypted. The binding is haraterized by: Whose reovery keys. an be bound to keys held by the esrow agents of the sender, the reeiver, or both. The hoie affets reovery. ole in key distribution. The DF and binding mehanism an be integrated with the protools used to transmit to the intended reipient. In that ase, the sender must transmit a valid DF in order for the intended reipient to aquire the key. ontents of DF. Normally, the DF ontains enrypted under one or more reovery keys (e.g., a ut key, the li key of the sender or reeiver, or a li key of the E). plaintext key enrypt DF, iphertext key derypt plaintext Figure. ey esrow enryption system ser eurity omponent ser eurity omponent reovery keys ey Esrow omponent determine key derypt plaintext Data eovery omponent OMMNIATION OF TE AM Marh 996/Vol. 39, No. 3 35

3 Table. ummary harateristis of key esrow enryption systems and approahes ey Esrow ystem or Approah (* is ommerial ut) AT&T rypto Bakup Bankers eureee* Bell Atlanti Yaksha Blaze File rypto lipper hip (EE)* ylink ey Esrow Desmedt Traeable Fortezza ard* Fortress I ilian/leighton F-safe Leiberih TB-lipper Leighton/Miali Lenstra/Winkler/Yaobi Lotus Notes Int'l* Miali Fair rypto Miali Partial Esrow Miali/idney Es. Natiol AE Nehvatal Publi-ey Nortel Entrust* P e. toplok E* oyal olloway TTPs A eure* hamir Partial Esrow TEE VEIL* TE w ey Esrow ThresholdDeryption TI omm. ey Es.* TI oftware lipper f,,f f,f,f f,,f,f f f f, ser eurity omponent () App Ene Alg r r r r eys DF Imp ole Type none,k,k,k,k,k,k,k,k,k /, MI PI PI PI PI PI MI PI MI PI ey Esrow omponent (E) Es eys session dir partial system partial system plit,, n/n any ervie de rel rel de file rel /exp rel rel de rel rel /tb rel / rel V/tb de partial rel /tb t/u/n rel de n/n rel rel rel de rel rel rel th-de de rel Data eovery omponent (D) eys eq / / / / / / / / /? Per / / / / / / / /? ser eurity omponent () App = appliation: = ommuniations; f = files and other stored objets. En Alg = enryption algorithm: = lassified; = unlassified; r = proprietary unlassified. eys = stored keys used with key esrow funtion: = ate keys and optiolly li keys; = li keys only. DF = enryption keys used to ompute Data eovery Field: = ate keys (and, optiolly, i keys); = li keys; k = DF also used with key establishment/distribution; = not appliable. Imp = implementation: = some speial hardware required; / = hardware with a lok; = software with optiol hardware. ey Esrow omponent (E) ole = integration of key esrow into key magement infrastruture: MI = integrated with key magement infrastruture; PI = omponent of li key infrastruture administered by ertifiate authorities. Type = type of system: = keys held by ommerial or ate setor esrow agents; = keys held by government. Es eys = keys stored in esrow: dir = file enryption key used with entire diretory; = esrow agent key; partial = part of or appliation key; = ut unique key; session = session key; system = keys maged by system; = key. plit = splitting of keys with esrow agents: n/n = n out of n needed for deryption; = k out of n needed using threshold tehniques; t/u/n = allows t to onspire and ompromise key and n-u to withhold. ervie = servie provided to D: de = derypt enryption key ; rel = release from esrow; thd-de = use threshold deryption; de = derypt or ut key; rel = release from esrow; rel V = release keys used by pair of s and V; tb = time-bounded keys released; exp = keys released with expiration date. Data eovery omponent (D) eys eq = keys required for derypting : = keys assoiated with the sender or the sender s ; = keys assoiated with the reeiver or the reeiver s ; / = keys assoiated with either sender or reeiver. Per = frequeny with whih D must interat with E to get keys: = one per session/file key; = one per sender; = one per reeiver. Blanks in table denote open or unspeified elements. 36 Marh 996/Vol. 39, No. 3 OMMNIATION OF TE AM

4 A Taxonomy for ey Esrow Enryption ystems In some ases, only some of the bits of may be made available through the DF so the remaining bits must be determined through brute fore. The DF also ontains information identifying the reovery keys, the E or key esrow agents, the enryption algorithm and mode, or the DF reation method. The entire DF may be enrypted under a family key assoiated with the D in order to protet identifiers transmitted in the DF. ingle-key or li-key ryptography an be used. The length of the DF an affet the suitability of a partiular sheme to ertain appliations (e.g., radio ommuniations) where error rates are high. Transmission and frequeny. Normally, the DF preedes the iphertext in a message or file header. With open onnetions, it may be retransmitted at regular intervals. Validation. The DF may inlude an esrow authentiator verified by the reeiver to determine the integrity of the DF. Altertively, if li keys are used to reate the DF, the reeiver ould reompute the DF and ompare the result with the DF reeived. Interoperability. A may be designed to interoperate only with orretly funtioning s and not with s that have been tampered with or that do not support key esrow. Implementation. A may be implemented in hardware, software, firmware, or some ombition thereof. ardware is generally more seure and less vulnerable to modifiation than software. If lassified algorithms are used, they must be implemented in tamper-resistant hardware. ardware implementations may inlude speial-purpose ryptoproessors, random number generators, and/or a high-integrity lok. Produts that implement a are sometimes alled esrowed enryption uts (or devies). They have also been alled esrow-enhaned or esrow-ebled uts. Assurane. The may provide assurane that s annot irumvent or disable the key esrow mehanisms or other features. A that an be used or modified to heat is alled a rogue. The possibility of rogue s is strongly dependent on the reovery mehanism and implementation. We distinguish between single rogues, whih an interoperate with non-rogues, and dual rogues, whih interoperate only with other rogues. ingle rogues present the greatest threat to emergeny reovery beause they require no ollaboration on the part of the reeiver. ey Esrow omponent The E is responsible for storing all reovery keys and for assisting the D by providing required or servies. It has the following elements: ole in ey Magement Infrastruture. The E ould be a omponent of the key magement infrastruture, whih ould be a single-key infrastruture (e.g., a key distribution enter) or a likey infrastruture. With the latter, the esrow agents ould serve as the li-key ertifiate authorities. Esrow Agents. The esrow agents, also alled trusted parties, are responsible for operating the E. They may be registered with a key esrow enter that oordites their operation or serves as a point of ontat for the or D. Esrow agents are haraterized by: Type of agents. Esrow agents may be entities in the government or ate setor. The former ould restrit use of their servies to government agenies. The latter, whih are used with what are alled ommerial or ate key esrow systems, ould be interl to an organization or to independent ompanies offering ommerial servies, or to trusted third parties. Identifiability. This inludes me and loation. Aessibility. This is determined by the loation of the esrow agents (e.g., loal or foreign) and their hours of operation (e.g., 24 hours a day, 7 days a week). eurity. This refers to how well the E protets against ompromise, loss, or abuse of esrowed keys. It inludes reliability and resilieny, whih is a measure of the trust required of the esrow agents for proteting the esrowed keys from ompromise and for ebling reovery. Aountability. This assures identifiation of an esrow agent that sabotages reovery or that releases keys to uuthorized parties or releases them under uuthorized irumstanes. Liability. This haraterizes the liability of the esrow agents in ase keys are ompromised or beome uvailable. Esrow agents might be bonded to protet against liability. ertified/liensed. This indiates whether the esrow agents are ertified and liensed with a government. To qualify for a liense, esrow agents may be required to meet speified onditions. se of ertified agents may affet exportability. Data eovery eys. With esrowed enryption, all enrypted are bound to esrowed reovery keys that eble aess to the enryption keys. The reovery keys are haraterized by: ranularity of keys. Options inlude: a. Data enryption keys. This inludes session keys, network keys, and file keys. A key distribution enter ould generate, esrow, and distribute suh keys. b. Produt keys. These are unique to a.. ser keys. Normally, these would be liate-key pairs used to establish enryption keys. The E might serve as the s li-key ertifiate authority, issuing a ertifiate for the s li key. d. Master keys. These keys are assoiated with OMMNIATION OF TE AM Marh 996/Vol. 39, No. 3 37

5 the E and used by multiple s. plitting of keys (seret sharing, threshold shemes). A reovery key an be split into multiple key omponents, with eah omponent held by a separate agent. eys an be split so that all n esrow agents are needed to restore a given key or so that any k out of n for some k, where n is the number of agents, suffies. They an be split using a general monotone aess struture, allowing for the speifiation of arbitrary subsets of esrow agents that an work together to restore a key. Who generates and distributes keys. eys an be generated by the E, the, or a ombition of both. If generated by the, the keys may be split and esrowed using verifiable seret sharing shemes so that the esrow agents an hek the validity of their individual omponents without knowing the origil key. eys may be generated jointly so a annot hide a shadow key in an esrowed key and thereby irumvent the key esrow mehanism. Time of esrow. eys ould be esrowed during ut manufature, system or ut initialization, or registration. If a s ate key (of a li-ate key pair) is esrowed, it ould be esrowed when the orresponding li key goes into the li-key infrastruture and a ertifiate is issued. A might send enrypted only to s with li-key ertifiates signed by approved esrow agents. ey update. ome systems may allow reovery keys to be hanged. uh updates ould be performed on request or on a regular basis. omplete or partial. A portion of a key ould be esrowed instead of the omplete key. In this ase, the unesrowed portion of the key would be determined through a brute fore attak when it is needed for reovery. torage of keys. This ould be off-line (e.g., on floppy disks stored in safes or smartards) or on-line. Data eovery ervies. The E provides servies, inluding release of information, to the D haraterized by: Authorization proedures. The proedures under whih people operating or using the D an use the servies of the E may inlude establishing proof of identity and legal authority to aess the to be derypted. ervies provided. There are several possible options: a. elease reovery keys. This approah is normally used when the reovery keys are session keys or or ut keys ( keys are not released). The keys might be released with an expiration date, after whih they are automatially destroyed. b. elease derived keys. The E releases derivatives of reovery keys, suh as time-bounded keys that eble deryption only of enrypted during a speifi period of time.. Derypt key. This approah is normally used when reovery keys are used to enrypt enryption keys (or keys) in the DF so the E need not release the keys to the D. d. Perform threshold deryption. Eah esrow agent provides a piee of a deryption to the D, whih ombines the results to get the plaintext. Transmission of to and from the D, either manually or eletronially. afeguards for Esrowed eys. The E employs safeguards to protet against ompromise or loss of keys. These an inlude a ombition of tehnial, proedural, and legal safeguards. Examples are auditing, separation of duties, split knowledge, two-person ontrol, physial seurity, ryptography, redundany, omputer seurity, trusted systems, independent testing and validation, ertifiation, areditation, onfiguration magement, and laws with pelties for misuse. Data eovery omponent The D supports reovery of plaintext from enrypted using information supplied by the E and in the DF. It is haraterized by: apabilities. These inlude: Timely deryption. eal-time deryption of interepted ommuniations. Post-proessing. The D an derypt ommuniations previously interepted and reorded. Transpareny. Deryption is possible without the knowledge of the parties involved. Independene. One the keys are obtained, the D an derypt using its own resoures, that is, independently of the E. Data Enryption ey eovery. To derypt, the D must aquire the enryption key in the following ways: Aess through sender or reeiver. A ritial fator is whether k an be reovered using reovery keys assoiated with the sender, the reeiver, or either party. If aess is possible only through keys held by the sender s esrow agents, the D must obtain key esrow for all parties transmitting messages to a partiular, possibly preluding real-time deryption, espeially if the parties are in different ountries and using different esrow agents. Likewise, if aess is possible only through keys held by the reeiver s esrow agents, real-time deryption of all messages transmitted from a partiular may be impossible. If reovery is possible using keys held by either set of esrow agents, the D an derypt interepted ommuniations both to and from a partiular in real time one the key used by that is obtained. A system may provide this apability for two-way simultaneous ommuniations 38 Marh 996/Vol. 39, No. 3 OMMNIATION OF TE AM

6 A Taxonomy for ey Esrow Enryption ystems (e.g., phone alls) by requiring that the same be used for both ends of the onversation. Frequeny of interation with E. The D may be required to interat with the E one per enryption key or one per or. The former requires an on-line onnetion between the D and the E to support realtime deryption of ommuniations when the session key hanges per onversation. Need for brute fore. If the esrow agents return partial keys to the D, the D must use brute fore to determine the remaining bits. afeguards on Deryption. The D an use tehnial, proedural, and legal safeguards to ontrol what an be derypted. For example, reovery may be restrited to a partiular time period (e.g., as authorized by a ourt order). These safeguards supplement restritions imposed by the E in its release of keys. Authentiation mehanisms ould be used to prevent the D from using the keys it aquires to reate and substitute bogus messages. Aknowledgments We wish to thank Matt Blaze, Yvo Desmedt, arl Ellison, avi anesan, armi ressel, ans- Joahim nobloh, David Maher, ilvio Miali, Edward heidt, reg hanton, and Peer Wihmann for helpful omments on an earlier version of this taxonomy. About the Authors: DOOTY E. DENNIN is a professor of omputer iene at eorgetown niversity. Author s Present Address: eorgetown niversity, Department of omputer iene, 225 eiss iene Building, Washington, D 20057; [email protected] DENNI. BANTAD is Diretor of ryptographi tehnologies at Trusted Information ystems, In. Author s Present Address: Trusted Information ystems, 3060 Washington oad, lenwood, MD 2738; [email protected] Permission to make digital/hard opy of part or all of this work for persol or lassroom use is granted without fee provided that opies are not made or distributed for profit or ommerial advantage, the opyright notie, the title of the liation and its date appear, and notie is given that opying is by permission of AM, In. To opy otherwise, to relish, to post on servers, or to redistribute to lists requires prior speifi permission and/or a fee. AM /96/0300 $3.50 lossary and oures AT&T rypto Bakup. This is a proprietary design for a ommerial system that baks up doument keys through an esrowed key. ee David P. Maher, rypto Bakup and ey Esrow, in this issue of ommuniations of the AM. Bankers Trust eure ey Esrow Enryption ystem (eureee). Employees of a orporation register their enryption devies (e.g., smartards) and ate enryption keys with one or more ommerial esrow agents seleted by the orporation. ee eureee ut literature, erto, Bankers Trust o. Bell Atlanti Yaksha ystem. An on-line key seurity server generates and distributes session keys and file keys using a variant of the A algorithm. The server transmits the keys to authorized parties for reovery purposes. ee avi anesan, The Yaksha eurity ystem, in this issue of ommuniations of the AM. Blaze s martard-based ey Esrow File ystem. This is a prototype smartardbased key esrow system for use with the ryptographi File ystem. A esrows a file enryption key on a smartard entrusted with an esrow agent. ee Matt Blaze, ey Magement in an Enrypting File ystem, AT&T Bell Laboratories. The lipper/apstone hips. These tamper-resistant hips implement the Esrowed Enryption tandard (EE), whih uses the lassified kipjak algorithm. nique reovery keys, programmed onto eah hip, are split between two government agenies and restrited to government use. ee Dorothy E. Denning and Miles mid, ey Esrowing Today, IEEE ommuniations, Vol. 32, No. 9, ept. 994, pp ylink ey Esrow. This proposal uses Diffie-ellman tehniques for integrating key esrow servies into a li-key infrastruture. ee Jim Omura, Altertives to A sing Diffie-ellman with D, white paper, ylink, ept Desmedt Traeable iphertexts. This proposal binds the DF to iphertext in suh a way that the identity of the reeiver an be determined if the reeiver an determine the session key. ee Yvo Desmedt, euring Traeability of iphertexts Towards a eure oftware ey Esrow ystem, Proeedings of Eurorypt 95, aint-malo, Frane, May 2-25, 995, pp Fortezza ard. This ommerially available P ard ontains a apstone hip. A s li-ate enryption keys are stored on the ard and esrowed with the s li-key ertifiate authority. Fortress I: eep the Invaders (of Privay) oially ane. This proposed system uses tamper-resistant enryption hips and esrow agent reovery keys. ee armi ressel, an ranot, and Itai Dror, Intertiol ryptographi ommuniation Without ey Esrow. I: eep the Invaders (of Privay) oially ane, Intertiol ryptography Institute 995: lobal hallenges. ilian and Leighton Failsafe ey Esrow. With this proposal, a s keys are generated jointly by the and key esrow agents so the annot irumvent key esrow. ee Joseph ilian and Tom Leighton, Fair ryptosystems, evisited, Proeedings of YPTO 95, pp Leiberih Time-Bounded lipper with a lok. This proposed enhanement to lipper offers time-bounded reovery through a lok and date-dependent devie unique keys. Otto Leiberih, ate ommuniation, June 994. Leighton and Miali ey Esrow with ey Agreement. With this proposal, eah has an esrowed ate key. Any two s an ompute a shared seret key OMMNIATION OF TE AM Marh 996/Vol. 39, No. 3 39

7 from their own ate key and the identifier of the other. ee Tom Leighton and ilvio Miali, eret-ey Agreement without Publi-ey ryptography, Proeedings of rypto 93, pp Lenstra, Winkler, and Yaobi ey Esrow with Warrant Bounds. This proposal allows the esrow agents to release keys that restrit deryption to the ommuniations of a partiular or pair of s during a speifi time interval. ee Arjen. Lenstra, Peter Winkler, and Yaov Yaobi, A ey Esrow ystem with Warrant Bounds, Proeedings of rypto 95, pp Lotus Notes Intertiol Edition (Differential Workfator ryptography). Data are enrypted with 64-bit keys, 24 of whih are enrypted under a li key of the government and transmitted with the. The government an obtain the remaining 40 bits through brute fore. ee Lotus Bakgrounder, Differential Workfator ryptography, Lotus Development orp., 996. Miali and idney esilient lipper-like ey Esrow. This proposal allows keys to be split so reovery is possible even if some of the esrow agents ompromise or fail to ue their key omponents. ee ilvio Miali and ay idney, A imple Method for enerating and haring Pseudo-andom Funtions, with Appliations to lipper-like ey Esrow ystems, Proeedings of rypto 95, pp Miali Fair Publi ey ryptosystems. Verifiable seret sharing tehniques are proposed whereby s generate, split, and esrow their ate keys with esrow agents of their hoie as a prerequisite to putting their li keys in the li key infrastruture. ee ilvio Miali, Fair ryptosystems, MIT/L/T- 579., Laboratory for omputer iene, Massahusetts Institute of Tehnology, ambridge, Mass., Aug Miali uaranteed Partial ey-esrow. nder this proposal, the ate keys of s are partially esrowed. The esrow agents verify that the bits in their possession are orret and that only a relatively small number of bits are unesrowed. ee ilvio Miali, uaranteed Partial ey-esrow, MIT/L/TM- 537, Laboratory for omputer iene, Massahusetts Institute of Tehnology, ambridge, Mass., 995. Natiol emiondutor AE. This proposal ombines a Trusted Information ystem (TI) ommerial ey Esrow (E) with Natiol s Persoard. ee W.B. weet, ommerial Automated ey Esrow (AE): An Exportable trong Enryption Proposal, Natiol emiondutor, ipower Business nit, June 4, 995. Nehvatal Publi-ey Based ey Esrow ystem. This proposal uses Diffie-ellman li-key tehniques for esrowing keys and for reovery. ee James Nehvatal, A Publi-ey Based ey Esrow ystem, Jourl of ystems and oftware, to appear Ot Nortel Entrust. This ommerial ut arhives s ate enryption keys as part of the ertifiate authority funtion and li-key infrastruture support. ee Warwik Ford, Entrust Tehnial Overview, White Paper, Nortel eure Networks, Ot P eurity toplok E. This ommerial ut integrates ate key esrow into the key magement infrastruture. ee toplok Press, P eurity, Ltd., Marlow, Bukinghamshire,, Issue 3, Nov oyal olloway Trusted Third Party (TTP) ervies. This proposed arhiteture for a li key infrastruture requires that the trusted TTPs assoiated with pairs of ommuniating s share parameters and a seret key. ee Nigel Jefferies, hris Mithell, and Mihael Walker, A Proposed Arhiteture for Trusted Third Party ervies, oyal olloway, niversity of London, 995. A eure. This file enryption ut provides reovery through an esrowed li key, whih an be split among up to eight trustees using a threshold sheme. ee A eure, ut literature from A Data eurity, In. hamir Partial ey Esrow. This is a proposal to esrow all but 48 bits of a long (256-bit) key. The 48 bits, generated randomly for eah session or file, are determined by brute fore during reovery. ee Adi hamir, Partial ey Esrow: A New Approah to oftware ey Esrow, The Weizmann Institute, presentation at NIT ey Esrow tandards meeting, ept. 5, 995. TEE VEIL. This ommerial ut provides file (and objet) enryption. Private key esrow is built into the key magement infrastruture. ee Edward M. heidt and Jon L. oberts, Private Esrow ey Magement, TEE In., Vien, Va. ee also TEE VEIL, ut literature. TE with ey Esrow. The Exponential eurity ystem supports a general aess struture for key esrow. The D obtains a partiular session key by partiipating in the key establishment protool and aquiring the sender s or reeiver s ate key. ee Thomas Beth, ans- Joahim nobloh, and Marus Otten, Verifiable eret haring for Monotone Aess trutures, Proeedings of the st AM onf. on ommuniation and omputer eurity, 993; Thomas Beth, ans- Joahim nobloh, Marus Otten, ustavus J. immons, and Peer Wihmann, Towards Aeptable ey Esrow ystems, Proeedings of the 2nd AM onferene on ommuniation and omputer eurity, 994, pp Threshold Deryption. With threshold deryption, a seret key an be shared by a group of esrow agents in suh a way that through ollaboration of the agents, information an be derypted without the agents releasing their individual key omponents. ee Yvo Desmedt, Yair Frankel, and Moti Yung, A ientifi tatement on the lipper hip Tehnology and Altertives, 993. TI ommerial ey Esrow. This is a ommerial key esrow system for stored and file transfers. Data reovery is ebled through keys held by a Data eovery enter. ee tephen T. Walker, tephen B. Lipner, arl M. Ellison, and David M. Balenson, ommerial ey eovery, in this issue of ommuniations of the AM. TI oftware ey Esrow Paralleling lipper. This proposed design is similar to that of lipper, exept that it uses software rather than hardware and li key ryptography for reovery. ee tephen T. Walker, tephen B. Lipner, arl M. Ellison, and David M. Balenson, ommerial ey eovery, in this issue of ommuniations of the AM. For more detailed desriptions of these systems, see also Dorothy E. Denning s Desriptions of ey Esrow ystems at 40 Marh 996/Vol. 39, No. 3 OMMNIATION OF TE AM

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File

More information

EMS Air Ambulance License Application Packet

EMS Air Ambulance License Application Packet EMS Air Ambulane Liense Appliation Paket Contents: 1. 530-077... Contents List and Mailing Information...1 Page 2. 530-078... Appliation Instrutions Cheklist...3 Pages 3. 530-076... EMS Air Ambulane Liense

More information

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7 Export Finane Program Guidelines Table of Contents Setion I General...........................................................1 A. Introdution............................................................1

More information

Retirement Option Election Form with Partial Lump Sum Payment

Retirement Option Election Form with Partial Lump Sum Payment Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Transfer of Functions (Isle of Man Financial Services Authority) TRANSFER OF FUNCTIONS (ISLE OF MAN FINANCIAL SERVICES AUTHORITY) ORDER 2015

Transfer of Functions (Isle of Man Financial Services Authority) TRANSFER OF FUNCTIONS (ISLE OF MAN FINANCIAL SERVICES AUTHORITY) ORDER 2015 Transfer of Funtions (Isle of Man Finanial Servies Authority) Order 2015 Index TRANSFER OF FUNCTIONS (ISLE OF MAN FINANCIAL SERVICES AUTHORITY) ORDER 2015 Index Artile Page 1 Title... 3 2 Commenement...

More information

Account Contract for Card Acceptance

Account Contract for Card Acceptance Aount Contrat for Card Aeptane This is an Aount Contrat for the aeptane of debit ards and redit ards via payment terminals, on the website and/or by telephone, mail or fax. You enter into this ontrat with

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain Produtivity Marketpla e Software as a Servie Invoiing Ordering Domains Customer Reporting for SaaS Appliations Domain Basis Managing my Domain Managing Domains Helpful Resoures Managing my Domain If you

More information

Health Savings Account Application

Health Savings Account Application Health Savings Aount Appliation FOR BANK USE ONLY: ACCOUNT # CUSTOMER # Health Savings Aount (HSA) Appliation ALL FIELDS MUST BE COMPLETED. Missing fields may delay the aount opening proess and possibly

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Traitor Tracing Schemes for Protected Software Implementations

Traitor Tracing Schemes for Protected Software Implementations Published in S. Katzenbeisser and A.-R. Sadeghi, Eds, 11th ACM Workshop on Digital Rights Management (ACM DRM 2011), pp. 15-21, ACM Press, 2011. Traitor Traing Shemes for Proteted Software Implementations

More information

IT Essentials II: Network Operating Systems

IT Essentials II: Network Operating Systems Unit 13: IT Essentials II: Network Operating Systems Learning Outomes: A andidate following a programme of learning leading to this unit will be able to: demonstrate understanding of network operating

More information

F220 Series. Installation Instructions. Photoelectric Smoke/Heat Detectors

F220 Series. Installation Instructions. Photoelectric Smoke/Heat Detectors F0 Series EN Installation Instrutions Photoeletri Smoke/Heat Detetors F0 Series Installation Instrutions.0 General Information EN.0 General Information. F0-B6 Series Bases Use with the F0 Series Heat and

More information

AT 6 OF 2012 GAMBLING DUTY ACT 2012

AT 6 OF 2012 GAMBLING DUTY ACT 2012 i e AT 6 OF 2012 GAMBLING DUTY ACT 2012 Gambling Duty At 2012 Index i e GAMBLING DUTY ACT 2012 Index Setion Page PART 1 INTRODUCTORY 5 1 Short title... 5 2 Commenement... 5 3 General interpretation...

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

BENEFICIARY CHANGE REQUEST

BENEFICIARY CHANGE REQUEST Poliy/Certifiate Number(s) BENEFICIARY CHANGE REQUEST *L2402* *L2402* Setion 1: Insured First Name Middle Name Last Name Permanent Address: City, State, Zip Code Please hek if you would like the address

More information

Disability Discrimination (Services and Premises) Regulations 2016 Index DISABILITY DISCRIMINATION (SERVICES AND PREMISES) REGULATIONS 2016

Disability Discrimination (Services and Premises) Regulations 2016 Index DISABILITY DISCRIMINATION (SERVICES AND PREMISES) REGULATIONS 2016 Disability Disrimination (Servies and Premises) Regulations 2016 Index DISABILITY DISCRIMINATION (SERVICES AND PREMISES) REGULATIONS 2016 Index Regulation Page 1 Title... 3 2 Commenement... 3 3 Interpretation...

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

SOFTWARE ENGINEERING I

SOFTWARE ENGINEERING I SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation

More information

Electronic signatures in German, French and Polish law perspective

Electronic signatures in German, French and Polish law perspective Artile Eletroni signatures in German, Frenh and Polish law perspetive DR CHRISTIANE BIEREKOVEN, PHILIP BAZIN AND TOMASZ KOZLOWSKI This artile presents some signifiant issues on the reognition of eletroni

More information

i e AT 6 of 2001 REHABILITATION OF OFFENDERS ACT 2001

i e AT 6 of 2001 REHABILITATION OF OFFENDERS ACT 2001 i e AT 6 of 2001 REHABILITATION OF OFFENDERS ACT 2001 Rehabilitation of Offenders At 2001 Index i e REHABILITATION OF OFFENDERS ACT 2001 Index Setion Page 1 Rehabilitated persons and spent onvitions...

More information

i e AT 21 of 2006 EMPLOYMENT ACT 2006

i e AT 21 of 2006 EMPLOYMENT ACT 2006 i e AT 21 of 2006 EMPLOYMENT ACT 2006 Employment At 2006 Index i e EMPLOYMENT ACT 2006 Index Setion Page PART I DISCRIMINATION AT RECRUITMENT ON TRADE UNION GROUNDS 9 1 Refusal of employment on grounds

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

BUSINESS PRACTICE BULLETIN The School Board of Broward County, Florida

BUSINESS PRACTICE BULLETIN The School Board of Broward County, Florida PAGE: 1 OF 16 (ECE) GUIDELINES FOR INFANT, TODDLER AND PRE-K PROGRAMS TOPICS IN BULLETIN: I. GENERAL INFORMATION II. CRITERIA FOR OPENING PROGRAM III. ACCOUNTING AND FINANCIAL MANAGEMENT IV. OPERATIONAL

More information

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential)

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential) Plan Basis The D.C. Long Term Disability Insurane Plan Exlusively for NBAC members Issued by The Prudential Insurane Company of Ameria (Prudential) What does it over? The D.C. Long Term Disability Insurane

More information

i e AT 8 of 1938 THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939

i e AT 8 of 1938 THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939 i e AT 8 of 1938 THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939 The Personal Injuries (Emergeny Provisions) At 1939 Index i e THE PERSONAL INJURIES (EMERGENCY PROVISIONS) ACT 1939 Index Setion

More information

i e AT 1 of 2012 DEBT RECOVERY AND ENFORCEMENT ACT 2012

i e AT 1 of 2012 DEBT RECOVERY AND ENFORCEMENT ACT 2012 i e AT 1 of 2012 DEBT RECOVERY AND ENFORCEMENT ACT 2012 Debt Reovery and Enforement At 2012 Index i e DEBT RECOVERY AND ENFORCEMENT ACT 2012 Index Setion Page PART 1 INTRODUCTORY 5 1 Short title... 5

More information

MEMBER. Application for election MEMBER, NEW GRADUATE. psychology.org.au. April 2015

MEMBER. Application for election MEMBER, NEW GRADUATE. psychology.org.au. April 2015 MEMBER Appliation for eletion MEMBER, NEW GRADUATE April 2015 psyhology.org.au MEMBER Belonging to the Australian Psyhologial Soiety (APS) means you are part of an ative, progressive organisation whih

More information

Entrepreneur s Guide. Starting and Growing a Business in Pennsylvania FEBRUARY 2015. newpa.com

Entrepreneur s Guide. Starting and Growing a Business in Pennsylvania FEBRUARY 2015. newpa.com Entrepreneur s Guide Starting and Growing a Business in Pennsylvania FEBRUARY 2015 newpa.om The Entrepreneur s Guide: Starting and Growing a Business in Pennsylvania was prepared by the Pennsylvania Department

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

SCHEME FOR FINANCING SCHOOLS

SCHEME FOR FINANCING SCHOOLS SCHEME FOR FINANCING SCHOOLS UNDER SECTION 48 OF THE SCHOOL STANDARDS AND FRAMEWORK ACT 1998 DfE Approved - Marh 1999 With amendments Marh 2001, Marh 2002, April 2003, July 2004, Marh 2005, February 2007,

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

i e AT 35 of 1986 ALCOHOLIC LIQUOR DUTIES ACT 1986

i e AT 35 of 1986 ALCOHOLIC LIQUOR DUTIES ACT 1986 i e AT 35 of 1986 ALCOHOLIC LIQUOR DUTIES ACT 1986 Aloholi Liquor Duties At 1986 Index i e ALCOHOLIC LIQUOR DUTIES ACT 1986 Index Setion Page PART I PRELIMINARY 9 1 The aloholi liquors dutiable under

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Picture This: Molecular Maya Puts Life in Life Science Animations

Picture This: Molecular Maya Puts Life in Life Science Animations Piture This: Moleular Maya Puts Life in Life Siene Animations [ Data Visualization ] Based on the Autodesk platform, Digizyme plug-in proves aestheti and eduational effetiveness. BY KEVIN DAVIES In 2010,

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Annual Return/Report of Employee Benefit Plan

Annual Return/Report of Employee Benefit Plan Form 5500 Department of the Treasury Internal Revenue Servie Department of Labor Employee Benefits Seurity Administration Pension Benefit Guaranty Corporation Annual Return/Report of Employee Benefit Plan

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

i e AT 11 of 2006 INSURANCE COMPANIES (AMALGAMATIONS) ACT 2006

i e AT 11 of 2006 INSURANCE COMPANIES (AMALGAMATIONS) ACT 2006 i e AT 11 of 2006 INSURANCE COMPANIES (AMALGAMATIONS) ACT 2006 Insurane Companies (Amalgamations) At 2006 Index i e INSURANCE COMPANIES (AMALGAMATIONS) ACT 2006 Index Setion Page 1 Orders in respet of

More information

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING INTERMAN 7 TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING by Douglas A. Ready, Albert A. Viere and Alan F. White RECEIVED 2 7 MAY 1393 International Labour

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

BUILDING CODE SUMMARY GENERAL NOTES DESIGN BUILD ELECTRICAL DESIGN BUILD MECHANICAL & PLUMBING GENERAL NOTES GENERAL NOTES G101

BUILDING CODE SUMMARY GENERAL NOTES DESIGN BUILD ELECTRICAL DESIGN BUILD MECHANICAL & PLUMBING GENERAL NOTES GENERAL NOTES G101 D D BUILDING CODE SUMMARY GENERAL NOTES PROJECT DESCRIPTION: THIS PROJECT IS THE MINOR RENOVATION OF AN EXISTING OUTPATIENT CLINIC. SCOPE CONSISTS OF PAINT, CARPET, TILE, AND UPGRADE TO DIGITAL X-RAY BUILDING

More information

Application for Emergency/Minor Home Repair Program City of Coeur d'alene, CDBG Entitlement Program

Application for Emergency/Minor Home Repair Program City of Coeur d'alene, CDBG Entitlement Program FOR OFFICE USE ONLY Date Reeived Appliation omplete By Appliation for Emergeny/Minor Home Repair Program Panhandle Area Counil The City of Coeur d'alene Emergeny/Minor Repair Program is designed to assist

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

computer science Program Educational Objectives

computer science Program Educational Objectives omputer siene bahelor of siene minor ertifiates: managing information on the world wide web master of siene in omputer siene master of siene in software engineering advaned ertifiate programs: bioinformatis

More information

RELATED WORK 1.1 Our Contributions PROBLEM FORMULATIONS

RELATED WORK 1.1 Our Contributions PROBLEM FORMULATIONS Privay-Enhaning k-anonymization of Customer Data Sheng Zhong 1,2 Zhiqiang Yang 1 Rebea N. Wright 1 1 Computer Siene Department, Stevens Institute of Tehnology, Hoboken, NJ 07030, USA 2 DIMACS Center, Rutgers

More information

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association Petri nets for the verifiation of Ubiquitous Systems with Transient Seure Assoiation Fernando Rosa-Velardo Tehnial Report 2/07 Dpto. de Sistemas Informátios y Computaión Universidad Complutense de Madrid

More information

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors SUDOKU: Seure and Usable Deployment of Keys on Wireless Sensors Matthias Wilhelm, Ivan Martinovi, Ersin Uzun, and Jens B. Shmitt diso Distributed Computer Systems Lab, TU Kaiserslautern, Germany {wilhelm,

More information

Professional Certificate Training in Business Writing

Professional Certificate Training in Business Writing Professional Certifiate Training in Business Writing About Training in Business Writing ZeebraCross Centre for Management Exellene (ZCME) is an initiative of ZeebraCross (Unit of InfousRx Marketing and

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

FCC Form 471 Do not write in this area. Approval by OMB 3060-0806

FCC Form 471 Do not write in this area. Approval by OMB 3060-0806 FCC Form 471 Do not write in this area. Approval by OMB 3060-0806 Shools an Libraries Universal Servie Desription of Servies Orere an Certifiation Form 471 Estimate Average Buren Hours per Response: 4

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

i e AT 1 of 1892 THE BANKRUPTCY CODE 1892

i e AT 1 of 1892 THE BANKRUPTCY CODE 1892 i e AT 1 of 1892 THE BANKRUPTCY CODE 1892 The Bankrupty Code 1892 Index i e THE BANKRUPTCY CODE 1892 Index Setion Page PREAMBLE 9 Preliminary 10 1 Short title... 10 2 Commenement of At... 10 3 [Repealed]...

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

i e SD No. 2016/0058 HARBOUR DUES (MERCHANT VESSELS) REGULATIONS 2016

i e SD No. 2016/0058 HARBOUR DUES (MERCHANT VESSELS) REGULATIONS 2016 i e SD No. 2016/0058 HARBOUR DUES (MERCHANT VESSELS) REGULATIONS 2016 Harbour Dues (Merhant Vessels) Regulations 2016 Index HARBOUR DUES (MERCHANT VESSELS) REGULATIONS 2016 Index Regulation Page 1 Title...

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

the machine and check the components

the machine and check the components Quik Setup Guide Start Here MFC-7860DW Please read the Safety and Legal ooklet first efore you set up your mahine. Then, please read this Quik Setup Guide for the orret setup and installation. To view

More information

WATER CLOSET SUPPORTS TECHNICAL DATA

WATER CLOSET SUPPORTS TECHNICAL DATA WATER CLOSET SUPPORTS TECHNICAL DATA Smith engineers have developed an unusually omplete line of fixture supports for mounting all types of "off the floor" fixtures. Supports have been designed for water

More information

Masters Thesis- Criticality Alarm System Design Guide with Accompanying Alarm System Development for the Radioisotope Production L

Masters Thesis- Criticality Alarm System Design Guide with Accompanying Alarm System Development for the Radioisotope Production L PNNL-18348 Prepared for the U.S. Department of Energy under Contrat DE-AC05-76RL01830 Masters Thesis- Critiality Alarm System Design Guide with Aompanying Alarm System Development for the Radioisotope

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

MEDICATION MANAGEMENT ASSESSMENT

MEDICATION MANAGEMENT ASSESSMENT MEDICATION MANAGEMENT ASSESSMENT The Mediation Management Assessment provides evidene-based reommendations/standards for Minnesota hospitals in the development of a omprehensive mediation safety program.

More information

i e AT 28 of 1976 EMPLOYERS LIABILITY (COMPULSORY INSURANCE) ACT 1976

i e AT 28 of 1976 EMPLOYERS LIABILITY (COMPULSORY INSURANCE) ACT 1976 i e AT 28 of 1976 EMPLOYERS LIABILITY (COMPULSORY INSURANCE) ACT 1976 Employers' Liability (Compulsory Insurane) At 1976 Index i e EMPLOYERS LIABILITY (COMPULSORY INSURANCE) ACT 1976 Index Setion Page

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Condominium Project Questionnaire Full Form

Condominium Project Questionnaire Full Form Conominium Projet Questionnaire Full Form Instrutions Lener: Complete the irst table below an enter the ate on whih the orm shoul be returne to you. Homeowners' Assoiation (HOA) or Management Company:

More information

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion : SN-based ross-layer Multi-stream Management Protool for 3 Teleimmersion hsan refin Raoul Rivas Rehana Tabassum Klara Nahrstedt University of Illinois at Urbana-hampaign, Urbana, IL {marefin2, trivas,

More information