A Comparative Study for Open Document Formats R
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Why ODF?” - the Importance of Opendocument Format for Governments
“Why ODF?” - The Importance of OpenDocument Format for Governments Documents are the life blood of modern governments and their citizens. Governments use documents to capture knowledge, store critical information, coordinate activities, measure results, and communicate across departments and with businesses and citizens. Increasingly documents are moving from paper to electronic form. To adapt to ever-changing technology and business processes, governments need assurance that they can access, retrieve and use critical records, now and in the future. OpenDocument Format (ODF) addresses these issues by standardizing file formats to give governments true control over their documents. Governments using applications that support ODF gain increased efficiencies, more flexibility and greater technology choice, leading to enhanced capability to communicate with and serve the public. ODF is the ISO Approved International Open Standard for File Formats ODF is the only open standard for office applications, and it is completely vendor neutral. Developed through a transparent, multi-vendor/multi-stakeholder process at OASIS (Organization for the Advancement of Structured Information Standards), it is an open, XML- based document file format for displaying, storing and editing office documents, such as spreadsheets, charts, and presentations. It is available for implementation and use free from any licensing, royalty payments, or other restrictions. In May 2006, it was approved unanimously as an International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) standard. Governments and Businesses are Embracing ODF The promotion and usage of ODF is growing rapidly, demonstrating the global need for control and choice in document applications. For example, many enlightened governments across the globe are making policy decisions to move to ODF. -
TIBCO Businessconnect™ Ebxml Protocol User’S Guide — Ebms3/AS4 Standard
TIBCO BusinessConnect™ ebXML Protocol User’s Guide — ebMS3/AS4 Standard Software Release 6.1 August 2015 Two-Second Advantage® Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. This document contains confidential information that is subject to U.S. and international copyright laws and treaties. No part of this document may be reproduced in any form without the written authorization of TIBCO Software Inc. TIBCO, Two-Second Advantage, TIBCO ActiveMatrix BusinessWorks, TIBCO ActiveMatrix BusinessWorks Plug-in for BusinessConnect, TIBCO Administrator, TIBCO BusinessConnect, TIBCO BusinessConnect Palette, TIBCO Designer, TIBCO Enterprise Message Service, TIBCO Hawk, TIBCO Rendezvous, TIBCO Runtime Agent are either registered trademarks or trademarks of TIBCO Software Inc. -
Realization of the System for Access Management and Identity Federation with Use of Service Mojeid and the Product Dirx Access
MASARYKOVA UNIVERZITA FAKULTA}w¡¢£¤¥¦§¨ INFORMATIKY !"#$%&'()+,-./012345<yA| Realization of the system for access management and identity federation with use of service mojeID and the product DirX Access. DIPLOMA THESIS Jakub Šebök Brno, Autumn 2014 Declaration Hereby I declare, that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Jakub Šebök Advisor: RNDr. JUDr. Vladimír Šmíd, CSc. ii Acknowledgement I would like to thank firstly to my technical consultant Filip Höfer for his guidance. Secondly I thank to Mr. Šmíd for his advice about methodology and formal formatting of the thesis. And lastly I would like to thank all who survived by my side and cheered me up espe- cially during last months before the deadline. These are namely my mom, my girlfriend, Anton Gierlti, Matej Chrenko, Buddha and Bill Cosby. Thank you all again for enormous support. iii Abstract The aim of this thesis is implementation of a client program on the side of DirX Access which cooperates with the Czech identity provider mojeID. This cooperation consists of authenticating users by third party authority such that their credentials can be used for further processing in access management mechanism of DirX Access. iv Keywords security, SSO, OpenID, policies, RBAC, identity, mojeID, access man- agement, authentication, authorization v Contents 1 Introduction ............................3 2 Internet Security and Terminology ..............5 2.1 Identity ............................5 2.2 Identity Provider and Relying Party ...........6 2.3 Claims vs. -
Circular Economy and Standardization
G7 WORKSHOP, 20-21 MARCH 2019 TOOLS MAKING VALUE CHAINS MORE CIRCULAR AND RESOURCE EFFICIENT STANDARDIZATION STANDARDIZATION A FRAMEWORK FOR PROGRESS FOR ALL Olivier Peyrat ISO Board member Past ISO VP Finance AFNOR CEO SUCCESS STORIES OF STANDARDIZATION LIFE CYCLE ASSESSMENT 100 million mobile phones Forgotten in cupboards and drawers in France* € 124 million in gold lost due for failing to recycle 27,000 tons printed circuit boards in France in 2012* 3 YEARS average interval for replacing for mobile phones in Europe* ISO 14040 : Life Cycle Assessment the purpose of LCA is to identify ways of reducing environmental impact at each ones of these stages. It is important to decision-makers in the industry: • preservation of resources • energy choices • production modes Tool for implementing the Paris Agreement, LCA reveals that 70% of environmental impact is determined at the raw material stage. * Rapport n°850 du Sénat, 27 septembre 2016 Référence document Page 2 INTERNATIONAL ORGANIZATIONS International standards: volontary implementation International UIT ISO IEC level National level National standardization body (AFNOR, BSI, DIN, SAC, ANSI…) European ETSI CEN CENELEC level European standards: mandatory implementation Référence document Page 3 STANDARDIZATION STRATEGY ON CIRCULAR ECONOMY Climate change Resources New principles New paradigms Standards: Compilations of good practices New business models circular economy in standardization documents Page 4 STANDARDIZATION STRATEGY ON CIRCULAR ECONOMY What are the expected benefits of standards -
Trusted Computing Or Distributed Trust Management?
Trusted computing or distributed trust management? Michele Tomaiuolo Dipartimento di Ingegneria dell’Informazione Università di Parma Via Usberti, 181/A – 43100 Parma – Italy [email protected] Abstract Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures. In this field, trust management systems can play an important role, being based on a totally distributed architecture. The idea of distributed trust management can be confronted with the concept of trusted computing. Though having a confusingly similar denomination, the different interpretation of trust in these systems drives to divergent consequences with respect to system architectures and access policies, but also to law, ethics, politics. While trusted computing systems assure copyright holders and media producers that the hosting system will respect the access restrictions they defined, trust management systems, instead, allow users to grant trust to other users or software agents for accessing local resources. Keywords Data security, Security Management, Authentication, Authorization, Intellectual Property Rights, Information Access, Digital Books, Multimedia, Web Technologies Introduction A number of architectures and systems are being proposed as a ground for improved interoperability among diverse systems, mainly exploiting the idea of service-oriented architecture. Yet, some issues remain open. In fact, composition of services requires some delegation of goals and duties among partners. But these delegations cannot come into effect, if they’re not associated with a corresponding delegation of privileges, needed to access some resources and complete delegated tasks, or achieve desired goals. -
National and International Standardization of Radiation Dosimetry
National and International Standardization of Radiation Dosimetry PROCEEDINGS OF A SYMPOSIUM ATLANTA 5 -9 DECEMBER 1977 V tTj? INTERNATIONAL ATOMIC ENERGY AGENCY, VIENNA, 1978 >*___¿I? NATIONAL AND INTERNATIONAL STANDARDIZATION OF RADIATION DOSIMETRY VOL.II The following States are Members of the International Atomic Energy Agency: AFGHANISTAN HOLY SEE PHILIPPINES ALBANIA HUNGARY POLAND ALGERIA ICELAND PORTUGAL ARGENTINA INDIA QATAR AUSTRALIA INDONESIA ROMANIA AUSTRIA IRAN SAUDI ARABIA BANGLADESH IRAQ SENEGAL BELGIUM IRELAND SIERRA LEONE BOLIVIA ISRAEL SINGAPORE BRAZIL ITALY SOUTH AFRICA BULGARIA IVORY COAST SPAIN BURMA JAMAICA SRI LANKA BYELORUSSIAN SOVIET JAPAN SUDAN SOCIALIST REPUBLIC JORDAN SWEDEN CANADA KENYA SWITZERLAND CHILE KOREA, REPUBLIC OF SYRIAN ARAB REPUBLIC COLOMBIA KUWAIT THAILAND COSTA RICA LEBANON TUNISIA CUBA LIBERIA TURKEY CYPRUS LIBYAN ARAB JAMAHIRIYA UGANDA CZECHOSLOVAKIA LIECHTENSTEIN UKRAINIAN SOVIET SOCIALIST DEMOCRATIC KAMPUCHEA LUXEMBOURG REPUBLIC DEMOCRATIC PEOPLE’S MADAGASCAR UNION OF SOVIET SOCIALIST REPUBLIC OF KOREA MALAYSIA REPUBLICS DENMARK MALI UNITED ARAB EMIRATES DOMINICAN REPUBLIC MAURITIUS UNITED KINGDOM OF GREAT ECUADOR MEXICO BRITAIN AND NORTHERN EGYPT MONACO IRELAND EL SALVADOR MONGOLIA UNITED REPUBLIC OF ETHIOPIA MOROCCO CAMEROON FINLAND NETHERLANDS UNITED REPUBLIC OF FRANCE NEW ZEALAND TANZANIA GABON NICARAGUA UNITED STATES OF AMERICA GERMAN DEMOCRATIC REPUBLIC NIGER URUGUAY GERMANY, FEDERAL REPUBLIC OF NIGERIA VENEZUELA GHANA NORWAY VIET NAM GREECE PAKISTAN YUGOSLAVIA GUATEMALA PANAMA ZAIRE HAITI PARAGUAY ZAMBIA PERU The Agency’s Statute was approved on 23 October 1956 by the Conference on the Statute of the IAEA held at United Nations Headquarters, New York; it entered into force on 29 July 1957. The Headquarters of the Agency are situated in Vienna. Its principal objective is “ to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world” . -
XXX Format Assessment
Digital Preservation Assessment: Date: 20/09/2016 Preservation Open Document Text (ODT) Format Team Preservation Assessment Version: 1.0 Open Document Text (ODT) Format Preservation Assessment Document History Date Version Author(s) Circulation 20/09/2016 1.0 Michael Day, Paul Wheatley External British Library Digital Preservation Team [email protected] This work is licensed under the Creative Commons Attribution 4.0 International License. Page 1 of 12 Digital Preservation Assessment: Date: 20/09/2016 Preservation Open Document Text (ODT) Format Team Preservation Assessment Version: 1.0 1. Introduction This document provides a high-level, non-collection specific assessment of the OpenDocument Text (ODT) file format with regard to preservation risks and the practicalities of preserving data in this format. The OpenDocument Format is based on the Extensible Markup Language (XML), so this assessment should be read in conjunction with the British Library’s generic format assessment of XML [1]. This assessment is one of a series of format reviews carried out by the British Library’s Digital Preservation Team. Some parts of this review have been based on format assessments undertaken by Paul Wheatley for Harvard University Library. An explanation of the criteria used in this assessment is provided in italics below each heading. [Text in italic font is taken (or adapted) from the Harvard University Library assessment] 1.1 Scope This document will primarily focus on the version of OpenDocument Text defined in OpenDocument Format (ODF) version 1.2, which was approved as ISO/IEC 26300-1:2015 by ISO/IEC JTC1/SC34 in June 2015 [2]. Note that this assessment considers format issues only, and does not explore other factors essential to a preservation planning exercise, such as collection specific characteristics, that should always be considered before implementing preservation actions. -
OASIS Response to NSTC Request for Feedback on Standard Practices
OASIS RESPONSE TO NSTC REQUEST FOR FEEDBACK ON STANDARDS PRACTICES OASIS (Organization for the Advancement of Structured Information Standards) is pleased to respond to the request from the National Science and Technology Council's Sub-Committee on Standards published at 75 FR 76397 (2010), and extended by 76 FR 3877 (2011), for feedback and observations regarding the effectiveness of Federal agencies' participation in the development and implementation of standards and conformity assessment activities and programs. We have advised our own members about the Federal Register inquiry, in case they wish to respond. Of course, their opinions are their own, and this response does not represent the views of any members, but only the observations of OASIS professional staff. I. RESPONDENT'S BACKGROUND OASIS is one of the largest and oldest global open data standards consortia, founded in 1993 as SGML Open. OASIS has over 5000 active participants representing about 600 member organizations and individual members in over 80 countries. We host widely-used standards in multiple fields including • cybersecurity & access control (such as WS-Security, SAML, XACML, KMIP, DSS & XSPA) [/1], • office documents and smart semantic documents (such as OpenDocument, DITA, DocBook & CMIS) [/2], and • electronic commerce (including SOA and web services, such as BPEL, ebXML, WS-ReliableMessaging & the WS-Transaction standards) [/3] among other areas. Various specific vertical industries also fulfill their open standards requirements by initiating OASIS projects, resulting in mission-specific standards such as • UBL and Business Document Exchange (for e-procurement) [/4], • CAP and EDML (for emergency first-responder notifications) [/5], and • LegalXML (for electronic court filing data)[/6]. -
A SOAP-Based Model for Secure Messaging in a Global Context
A SOAP-Based Model for Secure Messaging in a Global Context by Johannes Jurie van Eeden A SOAP-based Model for Secure Messaging in a Global Context by Johannes Jurie van Eeden Dissertation submitted in fulfillment of the requirements for the degree Magister Technologiae in Information Technology in the School of Information and Communication Technology at the Nelson Mandela Metropolitan University Promoter: Dr Maree Pather December 2005 Table of Contents Declaration ............................................................................................................. v Abstract.................................................................................................................. vi Acknowledgements................................................................................................ vii Acronyms and Abbreviations used.......................................................................viii Part I ...................................................................................................................... 1 Introduction............................................................................................................. 1 Chapter 1 ............................................................................................................... 2 Introduction............................................................................................................. 2 1.1 Problem Statement........................................................................................ 3 1.2 Objectives .................................................................................................... -
(A/V Codecs) REDCODE RAW (.R3D) ARRIRAW
What is a Codec? Codec is a portmanteau of either "Compressor-Decompressor" or "Coder-Decoder," which describes a device or program capable of performing transformations on a data stream or signal. Codecs encode a stream or signal for transmission, storage or encryption and decode it for viewing or editing. Codecs are often used in videoconferencing and streaming media solutions. A video codec converts analog video signals from a video camera into digital signals for transmission. It then converts the digital signals back to analog for display. An audio codec converts analog audio signals from a microphone into digital signals for transmission. It then converts the digital signals back to analog for playing. The raw encoded form of audio and video data is often called essence, to distinguish it from the metadata information that together make up the information content of the stream and any "wrapper" data that is then added to aid access to or improve the robustness of the stream. Most codecs are lossy, in order to get a reasonably small file size. There are lossless codecs as well, but for most purposes the almost imperceptible increase in quality is not worth the considerable increase in data size. The main exception is if the data will undergo more processing in the future, in which case the repeated lossy encoding would damage the eventual quality too much. Many multimedia data streams need to contain both audio and video data, and often some form of metadata that permits synchronization of the audio and video. Each of these three streams may be handled by different programs, processes, or hardware; but for the multimedia data stream to be useful in stored or transmitted form, they must be encapsulated together in a container format. -
Schematron Overview Excerpted from Leigh Dodds’ 2001 XSLT UK Paper, “Schematron: Validating XML Using XSLT”
Schematron: validating XML using XSLT Schematron Overview excerpted from Leigh Dodds’ 2001 XSLT UK paper, “Schematron: validating XML using XSLT” Leigh Dodds, ingenta ltd, xmlhack.com April 2001 Abstract Schematron [Schematron] is a structural based validation language, defined by Rick Jelliffe, as an alternative to existing grammar based approaches. Tree patterns, defined as XPath expressions, are used to make assertions, and provide user-centred reports about XML documents. Expressing validation rules using patterns is often easier than defining the same rule using a content model. Tree patterns are collected together to form a Schematron schema. Schematron is a useful and accessible supplement to other schema languages. The open-source XSLT implementation is based around a core framework which is open for extension and customisation. Overview This paper provides an introduction to Schematron; an innovative XML validation language developed by Rick Jelliffe. This innovation stems from selecting an alternative approach to validation than existing schema languages: Schematron uses a tree pattern based paradigm, rather than the regular grammars used in DTDs and XML schemas. As an extensible, easy to use, open source tool Schematron is an extremely useful addition to the XML developers toolkit. The initial section of this paper conducts a brief overview of tree pattern validation, and some of the advantages it has in comparison to a regular grammar approach. This is followed by an outline of Schematron and the intended uses which have guided its design. The Schematron language is then discussed, covering all major elements in the language with examples of their 1 of 14 Schematron: validating XML using XSLT usage. -
Content Assembly Mechanism (CAM) Business Transaction Information Management
Content Assembly Mechanism (CAM) business transaction information management What CAM Is The CAM approach provides these three The CAM specification provides an open critical abilities: – XML based system for using business rules to • documentation of business interchange define, validate and compose specific business transactions, documents from generalized schema elements • design-time assembly support with and structures. verification, and A CAM rule set and document assembly • runtime checking of information content. template defines the specific business context, content requirement, and transactional function Next we consider the limitations of current of a document. A CAM template must be approaches and technologies and how the capable of consistently reproducing documents capabilities that CAM provides can address that can successfully carry out the specific these shortcomings. transactional function that they were designed for. CAM also provides the foundation for The Present Tools and Their Limitations for creating industry libraries and dictionaries Addressing the Problem of schema elements and business document structures to support business process needs. The advent of XML has also meant that other new tools are available to advance the technology of automatic transaction content Solving the Inherent Problem of Automated handling. These include formal structure Information Integration definitions using XML schema (XSD) with Automated information integration has content control at the element level using been the Holy Grail of e-Business systems datatyping; then XSLT rules and XPath since before XML was conceived. Early expressions and semantic tools such as RDF attempts centered on the use of industry and OWL to provide machine understanding of standard transaction formats typified by EDI the role and usage of the XML based messages1.