Abstract:
A policy management method and system, which determines at least one functional model for the IT system; loads at least one pre-configured policy selection template that indicates at least one policy aspect applicable to the at least one IT system; generates at least one policy user interface that gathers a policy input; receives a policy input loaded from a data storage or a memory or entered by a user via a user interface; loads at least one pre-configured policy generation template that indicates at least one technical rule or configuration aspect of the policy that the policy template pertains to; generates at least one machine-enforceable rule/configuration compliant with the received input policy; transmits the at least one machine-enforceable rule and/or configuration to at least one policy implementation entity; and executes the transmitted at least one machine-enforceable rule/configuration.
Abstract:
A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model, and meta models of the models are read by a reader. A correspondence between the functional model, security implementation model, and the requirements model is analyzed, whereby the correspondence indicates that compliance/security/accreditation requirements defined in the requirement model match with security objectives implemented by controls defined by the security implementation model. Next, it is determined whether correspondence is or is not given based on the analysis of the correspondence and then evidence is generated based on the analysis of the correspondence and the determination and the impact of changes is analyzed.
Abstract:
A ring of a synchronizing device of a vehicle transmission includes a friction surface that interacts with a friction surface of another ring of the synchronizing device and at least one slide surface configured to slidably seat on an abutment surface of the synchronizing device. At least one curved groove is cut into the at least one slide surface by a whirling milling operation.
Abstract:
A system and method of managing security policies in an information technologies (IT) system are provided. In an example, the method includes receiving an input indicating a high-level security policy for the IT system, the received high-level security policy relating to non-functional system attributes for the IT system and received in a format that is not machine-enforceable at an enforcement entity of the IT system. A functional model for the IT system is determined, where the functional model indicates functional system attributes of the IT system. At least one pre-configured rule template is loaded, and at least one machine-enforceable rule is generated in a manner compliant with the received high-level security policy by iteratively filling the at least one pre-configured rule template with functional system attributes indicated by the functional model. After the generating step, the at least one machine-enforceable rule can be distributed (e.g., to an enforcement entity, an Intrusion Detection System (IDS), etc.). In another example, the receiving, determining, loading, generating and distributing steps can be performed at a policy node within an IT system.
Abstract:
The present invention is directed to a process for producing inorganic particulate material, the material obtainable by such process, a modified release delivery system comprising the material and the use of the material for the administration of a bioactive agent.
Abstract:
A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model, and meta models of the models are read by a reader. A correspondence between the functional model, security implementation model, and the requirements model is analyzed, whereby the correspondence indicates that compliance/security/accreditation requirements defined in the requirement model match with security objectives implemented by controls defined by the security implementation model. Next, it is determined whether correspondence is or is not given based on the analysis of the correspondence and then evidence is generated based on the analysis of the correspondence and the determination and the impact of changes is analyzed.
Abstract:
Disclosed are an apparatus for monitoring a process of joining components and for retracing quality, at least sections of an image which has been recorded by a camera and has been reproduced by a screen being able to be stored together with an identity number in a memory device, and a method for using such an apparatus.
Abstract:
The invention relates to a laying device which is used to lay wire windings on transponder units, wherein the wire is guided in an axial manner in the laying device, a contacting device is used place the wires in contact with an automatic thermal clamping arrangement, an advancing system is used to advance machining devices by means of a piezo-leg-motor, a production system is used to produce transponder units in a console structural manner. The invention also relates to a method for the production of transponder units with horizontal ultrasonic introduction and a transponder unit wherein the wire ends engage directly on the ends of the connection surfaces of the chip.
Abstract:
Methods and compositions for prophylaxis and/or treatment of diseases of the eye using antagonists of the integin receptors αvβ3 and/or αvβ5. The compositions can be nanoparticles and are administered to the eye by injection into the vitreous body of the eye.
Abstract:
A method of automating an agent for environment includes loading an action determination model that indicates an action option, determining whether the action determination model indicates a next action option, and if so, determining an action based on the action determination model, determining whether an execution data model has been stored, and if so, obtaining data pertaining to the determined action, executing the action, determining a result of the action, storing the data pertaining to the result in an execution data model. Then, until the environment or agent reach an end state, the following are repeated: determining whether the action determination model indicates the next action option, and if so, determining the action based on the action determination model, and determining whether the execution data model has been stored, and if so, obtaining the data pertaining to the determined action.