MODELING AUTHENTICITY Mariella Guercio – Giovanni Michetti September 2009.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

LEUCEMIA MIELOIDE AGUDA TIPO 0
Bellwork If you roll a die, what is the probability that you roll a 2 or an odd number? P(2 or odd) 2. Is this an example of mutually exclusive, overlapping,
PROCESSO DI INVESTIMENTO 1 CASE HISTORY. CASE HISTORY (1/1) 2.
Slide 1 Insert your own content. Slide 2 Insert your own content.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 4 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
1 of 17 Information Strategy The Features of an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy The.
Factors, Primes & Composite Numbers
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
ENQA seminar: Programme oriented and institutional oriented approaches to quality assurance - New developments and mixed approaches Berlin, 13/14 June.
1 State of play Evaluations undertaken for DG REGIO.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
Coordinate Plane Practice The following presentation provides practice in two skillsThe following presentation provides practice in two skills –Graphing.
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULTIPLICATION EQUATIONS 1. SOLVE FOR X 3. WHAT EVER YOU DO TO ONE SIDE YOU HAVE TO DO TO THE OTHER 2. DIVIDE BY THE NUMBER IN FRONT OF THE VARIABLE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING Think Distributive property backwards Work down, Show all steps ax + ay = a(x + y)
Addition Facts
ALGEBRAIC EXPRESSIONS
Year 6 mental test 5 second questions
BALANCING 2 AIM: To solve equations with variables on both sides.
ZMQS ZMQS
Photo Composition Study Guide Label each photo with the category that applies to that image.
Richmond House, Liverpool (1) 26 th January 2004.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
Test plans. Test Plans A test plan states: What the items to be tested are At what level they will be tested What sequence they are to be tested in How.
ABC Technology Project
TV Show Trivia Princeton Puzzle Hunt Do NOT flip over your answer sheet!
O X Click on Number next to person for a question.
© S Haughton more than 3?
VOORBLAD.
1 Directed Depth First Search Adjacency Lists A: F G B: A H C: A D D: C F E: C D G F: E: G: : H: B: I: H: F A B C G D E H I.
Twenty Questions Subject: Twenty Questions
Linking Verb? Action Verb or. Question 1 Define the term: action verb.
Squares and Square Root WALK. Solve each problem REVIEW:
Energy & Green Urbanism Markku Lappalainen Aalto University.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
Event 4: Mental Math 7th/8th grade Math Meet ‘11.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Doubles Facts Doubles with Pictures Doubles without Pictures Pictures Only.
11 = This is the fact family. You say: 8+3=11 and 3+8=11
Week 1.
1. 2 Easy-to-Use Administrator Features 3 Customisable Screen Cutoff Scores.
We will resume in: 25 Minutes.
1 Ke – Kitchen Elements Newport Ave. – Lot 13 Bethesda, MD.
1 Unit 1 Kinematics Chapter 1 Day
O X Click on Number next to person for a question.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Ch. 13: Supply Chain Performance Measurement: Introduction
Primary school Horvati w 3/26/2015copyright
Presentation transcript:

MODELING AUTHENTICITY Mariella Guercio – Giovanni Michetti September 2009

The model

3 Authenticity Protocol (AP)

4 Authenticity Step (AS)

5

6

7 Authenticity Recommendations

8 Authenticity Protocol Execution (APE) Authenticity Step Execution (ASE)

9 Authenticity Report

10 Authenticity Evaluation

11 (Authenticity) Event

12 Authenticity Protocol History

13 Overall Authenticity Model

14 Authenticity Model: Data Dictionary Authenticity Protocol A process designed to assess the authenticity of a resource. Any Authenticity Protocol: –is composed by (at least one) Authenticity Steps –is applied to an Object Type –is documented by an Authenticity Protocol History –is related to an Event Type, i.e. it refers to a specific type of fact and/or action having an impact on the resource –is instantiated through an Authenticity Protocol Execution –may be recursively used to design other Authenticity Protocols Authenticity Step A single phase of the Authenticity Protocol, aimed at analysing specific aspects of the resource. Accordingly, there are four different kind of Authenticity Steps: Reference Step, Provenance Step, Fixity Step, Context Step. Any Authenticity Step: –is performed by an Actor Type, i.e. a class of human or automatic agent –is based upon Authenticity recommendations, i.e. good practices, methodologies, rules, criteria, and any sort of control over the resource –is instantiated through an Authenticity Step Execution –is linked to other Authenticity Steps, in a set of relationships, according to an order established to design the specific Authenticity Protocol

15 Authenticity Model: Data Dictionary Authenticity Protocol Execution The execution of the process as modeled by the Authenticity Protocol The Authenticity Procotol Execution: –is composed by (at least one) Authenticity Step Execution –is triggered by an Event Occurrence –is documented by the Authenticity Protocol Execution Report Authenticity Protocol Execution Report The report providing evidence of the execution of an Authenticity Protocol It is a composed by joining together each report (Authenticity Step Execution Report) resulting from the execution of the Authenticity Steps defining the Authenticity Protocol It allows a human or automatic agent (Manual Actor and Automatic Actor) to make the final evaluation about the authenticity of the resource

16 Authenticity Model: Data Dictionary Authenticity Step Execution The execution of the single phase of the Authenticity Protocol, as modeled by the Authenticity Step. The Authenticity Step Execution: –is a phase of the Authenticity Protocol Execution –is documented by the Authenticity Step Execution Report –is executed by an Actor Occurrence, i.e. an instantiation of a human or automatic agent (Manual Actor and Automatic Actor) Authenticity Step Execution Report The report providing evidence of the execution of an Authenticity Step. It is a part of the Authenticity Protocol Execution Report Authenticity Protocol Execution Evaluation The final assessment about the authenticity of the resource, performed by an Actor Type on the basis of the Authenticity Protocol Execution Report. The evaluation may refer to either the identity of the resource (Identity Evaluation) or its integrity (Integrity Evaluation), or both

17 Authenticity Model: Data Dictionary Identity Evaluation The evaluation of the authenticity of the resource with special regard to its identity, performed by an Actor Type on the basis of the Authenticity Protocol Execution Report Integrity Evaluation The evaluation of the authenticity of the resource with special regard to its integrity, performed by an Actor Type on the basis of the Authenticity Protocol Execution Report Event Type Any act and/or fact related to a specific Authenticity Protocol, i.e. that needs for attention with regard to the authenticity of the resource. It is instantiated through an Event Occurrence Event Occurrence Any instantiation of an Event Type. It triggers the execution of an Authenticity Protocol Object Type A class of objects having uniform features with regard to the application of an Authenticity Protocol

18 Authenticity Model: Data Dictionary Reference Step An Authenticity Step devoted to gather information about the identification of the resource Provenance Step An Authenticity Step devoted to gather information about the history of the resource Fixity Step An Authenticity Step devoted to gather information about the bit integrity of the resource Context Step An Authenticity Step devoted to gather information about the relationships of the resource to its environment

19 Authenticity Model: Data Dictionary Authenticity Protocol History A report providing evidence of any changes of the Authenticity Protocols Actor Type Actor Occurrence Manual Actor Automatic Actor Authenticity Recommendations Experience Best Practice …. Applied To Association representing application Based Upon Association representing control Documented By Association representing documentation....